16 books
—
1 voter
Computer Security Books
Showing 1-50 of 606
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (Hardcover)
by (shelved 14 times as computer-security)
avg rating 3.97 — 27,247 ratings — published 2011
The Art of Deception: Controlling the Human Element of Security (Paperback)
by (shelved 14 times as computer-security)
avg rating 3.76 — 7,224 ratings — published 2001
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (Hardcover)
by (shelved 12 times as computer-security)
avg rating 4.17 — 8,216 ratings — published 2014
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (Paperback)
by (shelved 12 times as computer-security)
avg rating 4.28 — 15,693 ratings — published 1989
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws (Paperback)
by (shelved 10 times as computer-security)
avg rating 4.23 — 1,227 ratings — published 2007
Secrets and Lies: Digital Security in a Networked World (Paperback)
by (shelved 10 times as computer-security)
avg rating 3.93 — 1,793 ratings — published 2000
Digital Fortress (Paperback)
by (shelved 9 times as computer-security)
avg rating 3.70 — 662,652 ratings — published 1998
Hacking: The Art of Exploitation w/CD (Paperback)
by (shelved 9 times as computer-security)
avg rating 4.17 — 2,504 ratings — published 2003
Applied Cryptography: Protocols, Algorithms, and Source Code in C (Hardcover)
by (shelved 8 times as computer-security)
avg rating 4.21 — 2,135 ratings — published 1993
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground (Hardcover)
by (shelved 8 times as computer-security)
avg rating 3.97 — 8,049 ratings — published 2011
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Kindle Edition)
by (shelved 7 times as computer-security)
avg rating 4.35 — 9,859 ratings — published 2019
Hacking Exposed: Network Security Secrets & Solutions (Paperback)
by (shelved 7 times as computer-security)
avg rating 3.80 — 1,165 ratings — published 2000
Metasploit: The Penetration Tester's Guide (Paperback)
by (shelved 7 times as computer-security)
avg rating 4.07 — 867 ratings — published 2011
The Shellcoder's Handbook: Discovering and Exploiting Security Holes (Paperback)
by (shelved 7 times as computer-security)
avg rating 4.15 — 331 ratings — published 2004
Gray Hat Hacking : The Ethical Hacker's Handbook (Paperback)
by (shelved 6 times as computer-security)
avg rating 4.10 — 537 ratings — published 2004
Cyberwar: The Next Threat to National Security & What to Do About It (Hardcover)
by (shelved 6 times as computer-security)
avg rating 3.73 — 2,455 ratings — published 2010
Reversing: Secrets of Reverse Engineering (Paperback)
by (shelved 6 times as computer-security)
avg rating 4.09 — 545 ratings — published 2005
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World (Paperback)
by (shelved 5 times as computer-security)
avg rating 4.00 — 3,862 ratings — published 2015
Future Crimes (Hardcover)
by (shelved 5 times as computer-security)
avg rating 3.92 — 4,386 ratings — published 2015
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Paperback)
by (shelved 5 times as computer-security)
avg rating 4.30 — 28,788 ratings — published 1999
The Tangled Web: A Guide to Securing Modern Web Applications (Paperback)
by (shelved 5 times as computer-security)
avg rating 4.04 — 553 ratings — published 2011
Hacker's Delight (Hardcover)
by (shelved 5 times as computer-security)
avg rating 4.20 — 1,137 ratings — published 2002
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)
by (shelved 5 times as computer-security)
avg rating 4.48 — 604 ratings — published 2011
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback)
by (shelved 5 times as computer-security)
avg rating 3.91 — 3,591 ratings — published 2005
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.51 — 73 ratings — published
Security in Computing (Hardcover)
by (shelved 4 times as computer-security)
avg rating 3.72 — 195 ratings — published 1988
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.04 — 1,600 ratings — published 2001
Penetration Testing: A Hands-On Introduction to Hacking (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.17 — 391 ratings — published 2014
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door (Hardcover)
by (shelved 4 times as computer-security)
avg rating 3.75 — 2,744 ratings — published 2014
Black Hat Python: Python Programming for Hackers and Pentesters (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.12 — 610 ratings — published 2014
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.03 — 550 ratings — published 2012
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Paperback)
by (shelved 4 times as computer-security)
avg rating 3.92 — 724 ratings — published 2011
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.36 — 426 ratings — published 2009
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency (Hardcover)
by (shelved 4 times as computer-security)
avg rating 3.97 — 3,365 ratings — published 2012
Hacking APIs: Breaking Web Application Programming Interfaces (Paperback)
by (shelved 3 times as computer-security)
avg rating 4.24 — 95 ratings — published
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali (Kindle Edition)
by (shelved 3 times as computer-security)
avg rating 4.13 — 565 ratings — published 2018
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation (Paperback)
by (shelved 3 times as computer-security)
avg rating 3.90 — 125 ratings — published 2017
Permanent Record (Hardcover)
by (shelved 3 times as computer-security)
avg rating 4.30 — 57,474 ratings — published 2019
The Perfect Weapon: How the Cyber Arms Race Set the World Afire (Hardcover)
by (shelved 3 times as computer-security)
avg rating 4.25 — 3,428 ratings — published 2018
The Hacker Playbook 3: Practical Guide To Penetration Testing (Kindle Edition)
by (shelved 3 times as computer-security)
avg rating 4.40 — 252 ratings — published
Hacking For Dummies (Paperback)
by (shelved 3 times as computer-security)
avg rating 3.64 — 396 ratings — published 2004
The Dark Net: Inside the Digital Underworld (Hardcover)
by (shelved 3 times as computer-security)
avg rating 3.64 — 4,990 ratings — published 2014
Gray Hat Python: Python Programming for Hackers and Reverse Engineers (Paperback)
by (shelved 3 times as computer-security)
avg rating 3.94 — 323 ratings — published 2008
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder. (Paperback)
by (shelved 3 times as computer-security)
avg rating 4.12 — 286 ratings — published 2014
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet (Hardcover)
by (shelved 3 times as computer-security)
avg rating 4.18 — 1,511 ratings — published 1967
Black Code: Inside the Battle for Cyberspace (Hardcover)
by (shelved 3 times as computer-security)
avg rating 3.94 — 275 ratings — published 2011
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State (Hardcover)
by (shelved 3 times as computer-security)
avg rating 4.07 — 15,027 ratings — published 2014
The Browser Hacker's Handbook (Kindle Edition)
by (shelved 3 times as computer-security)
avg rating 4.14 — 76 ratings — published 2014
Cryptography Engineering: Design Principles and Practical Applications (Paperback)
by (shelved 3 times as computer-security)
avg rating 4.21 — 406 ratings — published 2010
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory (Paperback)
by (shelved 3 times as computer-security)
avg rating 4.34 — 125 ratings — published 2014
“Computer hacking was like a chemical bond holding us all together.”
― The Emotional Embodiment of Stars
― The Emotional Embodiment of Stars
“Dropbox users themselves may be the source of security problems. If you are sharing a folder with 100 users, a couple of them are bound to be using easily guessed passwords to guard their accounts (the names of pets or first-born children, 'password', etc.). Sharing links can also lead to problems, if the wrong link is shared or someone posts the link online or in some other public forum.”
― Dropbox In 30 Minutes
― Dropbox In 30 Minutes










