Cybersecurity Books

Showing 1-50 of 2,188
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Kindle Edition)
by (shelved 127 times as cybersecurity)
avg rating 4.34 — 10,367 ratings — published 2019
Rate this book
Clear rating
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (Hardcover)
by (shelved 111 times as cybersecurity)
avg rating 4.16 — 8,465 ratings — published 2014
Rate this book
Clear rating
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (Paperback)
by (shelved 100 times as cybersecurity)
avg rating 4.28 — 16,306 ratings — published 1989
Rate this book
Clear rating
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race This Is How They Tell Me the World Ends: The Cyberweapons Arms Race (Hardcover)
by (shelved 99 times as cybersecurity)
avg rating 4.31 — 11,526 ratings — published 2021
Rate this book
Clear rating
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (Hardcover)
by (shelved 88 times as cybersecurity)
avg rating 3.97 — 27,718 ratings — published 2011
Rate this book
Clear rating
Rate this book
Clear rating
The Art of Deception: Controlling the Human Element of Security The Art of Deception: Controlling the Human Element of Security (Paperback)
by (shelved 59 times as cybersecurity)
avg rating 3.76 — 7,283 ratings — published 2001
Rate this book
Clear rating
Social Engineering Social Engineering (Paperback)
by (shelved 54 times as cybersecurity)
avg rating 3.83 — 3,940 ratings — published 2010
Rate this book
Clear rating
Hacking: The Art of Exploitation w/CD Hacking: The Art of Exploitation w/CD (Paperback)
by (shelved 53 times as cybersecurity)
avg rating 4.17 — 2,522 ratings — published 2003
Rate this book
Clear rating
Dark Territory: The Secret History of Cyber War Dark Territory: The Secret History of Cyber War (Hardcover)
by (shelved 50 times as cybersecurity)
avg rating 3.90 — 3,219 ratings — published 2016
Rate this book
Clear rating
The Perfect Weapon: How the Cyber Arms Race Set the World Afire The Perfect Weapon: How the Cyber Arms Race Set the World Afire (Hardcover)
by (shelved 49 times as cybersecurity)
avg rating 4.25 — 3,498 ratings — published 2018
Rate this book
Clear rating
Permanent Record Permanent Record (Hardcover)
by (shelved 46 times as cybersecurity)
avg rating 4.30 — 58,807 ratings — published 2019
Rate this book
Clear rating
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World (Hardcover)
by (shelved 43 times as cybersecurity)
avg rating 3.75 — 2,464 ratings — published 2019
Rate this book
Clear rating
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws (Paperback)
by (shelved 43 times as cybersecurity)
avg rating 4.23 — 1,230 ratings — published 2007
Rate this book
Clear rating
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door (Hardcover)
by (shelved 43 times as cybersecurity)
avg rating 3.74 — 2,762 ratings — published 2014
Rate this book
Clear rating
The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats (Hardcover)
by (shelved 41 times as cybersecurity)
avg rating 4.01 — 826 ratings — published 2019
Rate this book
Clear rating
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)
by (shelved 41 times as cybersecurity)
avg rating 4.47 — 618 ratings — published 2011
Rate this book
Clear rating
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency (Hardcover)
by (shelved 40 times as cybersecurity)
avg rating 4.49 — 5,840 ratings — published
Rate this book
Clear rating
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Paperback)
by (shelved 40 times as cybersecurity)
avg rating 4.30 — 29,277 ratings — published 1999
Rate this book
Clear rating
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground (Hardcover)
by (shelved 38 times as cybersecurity)
avg rating 3.97 — 8,098 ratings — published 2011
Rate this book
Clear rating
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (Paperback)
by (shelved 37 times as cybersecurity)
avg rating 3.90 — 263 ratings — published 2019
Rate this book
Clear rating
Future Crimes Future Crimes (Hardcover)
by (shelved 37 times as cybersecurity)
avg rating 3.92 — 4,405 ratings — published 2015
Rate this book
Clear rating
Black Hat Python: Python Programming for Hackers and Pentesters Black Hat Python: Python Programming for Hackers and Pentesters (Paperback)
by (shelved 35 times as cybersecurity)
avg rating 4.11 — 619 ratings — published 2014
Rate this book
Clear rating
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali (Kindle Edition)
by (shelved 34 times as cybersecurity)
avg rating 4.12 — 602 ratings — published 2018
Rate this book
Clear rating
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World Click Here to Kill Everybody: Security and Survival in a Hyper-connected World (Paperback)
by (shelved 33 times as cybersecurity)
avg rating 3.82 — 1,119 ratings — published 2019
Rate this book
Clear rating
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback)
by (shelved 32 times as cybersecurity)
avg rating 3.91 — 3,615 ratings — published 2005
Rate this book
Clear rating
How to Measure Anything in Cybersecurity Risk How to Measure Anything in Cybersecurity Risk (Hardcover)
by (shelved 31 times as cybersecurity)
avg rating 4.07 — 386 ratings — published 2016
Rate this book
Clear rating
Security Engineering: A Guide to Building Dependable Distributed Systems Security Engineering: A Guide to Building Dependable Distributed Systems (Hardcover)
by (shelved 30 times as cybersecurity)
avg rating 4.21 — 706 ratings — published
Rate this book
Clear rating
Secrets and Lies: Digital Security in a Networked World Secrets and Lies: Digital Security in a Networked World (Paperback)
by (shelved 30 times as cybersecurity)
avg rating 3.93 — 1,798 ratings — published 2000
Rate this book
Clear rating
Cyberwar: The Next Threat to National Security & What to Do About It Cyberwar: The Next Threat to National Security & What to Do About It (Hardcover)
by (shelved 30 times as cybersecurity)
avg rating 3.73 — 2,470 ratings — published 2010
Rate this book
Clear rating
Penetration Testing: A Hands-On Introduction to Hacking Penetration Testing: A Hands-On Introduction to Hacking (Paperback)
by (shelved 29 times as cybersecurity)
avg rating 4.18 — 399 ratings — published 2014
Rate this book
Clear rating
The Hacker Playbook 3: Practical Guide To Penetration Testing The Hacker Playbook 3: Practical Guide To Penetration Testing (Kindle Edition)
by (shelved 28 times as cybersecurity)
avg rating 4.40 — 263 ratings — published
Rate this book
Clear rating
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World (Paperback)
by (shelved 28 times as cybersecurity)
avg rating 4.00 — 3,895 ratings — published 2015
Rate this book
Clear rating
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency (Hardcover)
by (shelved 26 times as cybersecurity)
avg rating 3.97 — 3,399 ratings — published 2012
Rate this book
Clear rating
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics (Hardcover)
by (shelved 25 times as cybersecurity)
avg rating 4.18 — 876 ratings — published 2020
Rate this book
Clear rating
Blue Team Field Manual (BTFM) (Field Manual Series) Blue Team Field Manual (BTFM) (Field Manual Series)
by (shelved 25 times as cybersecurity)
avg rating 4.19 — 361 ratings — published
Rate this book
Clear rating
Cybersecurity and Cyberwar: What Everyone Needs to Know Cybersecurity and Cyberwar: What Everyone Needs to Know (Paperback)
by (shelved 25 times as cybersecurity)
avg rating 3.83 — 1,420 ratings — published 2013
Rate this book
Clear rating
Threat Modeling: Designing for Security Threat Modeling: Designing for Security (Kindle Edition)
by (shelved 25 times as cybersecurity)
avg rating 4.07 — 288 ratings — published 2014
Rate this book
Clear rating
Metasploit: The Penetration Tester's Guide Metasploit: The Penetration Tester's Guide (Paperback)
by (shelved 24 times as cybersecurity)
avg rating 4.07 — 875 ratings — published 2011
Rate this book
Clear rating
Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks (Hardcover)
by (shelved 22 times as cybersecurity)
avg rating 3.93 — 2,039 ratings — published 2023
Rate this book
Clear rating
The Hacker Playbook 2: Practical Guide To Penetration Testing The Hacker Playbook 2: Practical Guide To Penetration Testing (Kindle Edition)
by (shelved 21 times as cybersecurity)
avg rating 4.24 — 446 ratings — published 2015
Rate this book
Clear rating
Applied Cryptography: Protocols, Algorithms, and Source Code in C Applied Cryptography: Protocols, Algorithms, and Source Code in C (Hardcover)
by (shelved 20 times as cybersecurity)
avg rating 4.21 — 2,138 ratings — published 1993
Rate this book
Clear rating
Real-World Bug Hunting: A Field Guide to Web Hacking Real-World Bug Hunting: A Field Guide to Web Hacking (Paperback)
by (shelved 19 times as cybersecurity)
avg rating 4.21 — 146 ratings — published
Rate this book
Clear rating
Hackers: Heroes of the Computer Revolution Hackers: Heroes of the Computer Revolution (Paperback)
by (shelved 19 times as cybersecurity)
avg rating 4.16 — 8,614 ratings — published 1984
Rate this book
Clear rating
Worm: The First Digital World War Worm: The First Digital World War (Hardcover)
by (shelved 19 times as cybersecurity)
avg rating 3.60 — 2,324 ratings — published 2011
Rate this book
Clear rating
Internet Internet (Hardcover)
by (shelved 18 times as cybersecurity)
avg rating 4.10 — 2,066 ratings — published 2021
Rate this book
Clear rating
The Pentester BluePrint: Starting a Career as an Ethical Hacker The Pentester BluePrint: Starting a Career as an Ethical Hacker (Paperback)
by (shelved 18 times as cybersecurity)
avg rating 4.16 — 229 ratings — published 2020
Rate this book
Clear rating
Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath (Hardcover)
by (shelved 18 times as cybersecurity)
avg rating 3.71 — 5,607 ratings — published 2015
Rate this book
Clear rating
The Hacker Playbook: Practical Guide to Penetration Testing The Hacker Playbook: Practical Guide to Penetration Testing (Kindle Edition)
by (shelved 18 times as cybersecurity)
avg rating 3.97 — 481 ratings — published 2014
Rate this book
Clear rating
Red Team Field Manual Red Team Field Manual (Paperback)
by (shelved 18 times as cybersecurity)
avg rating 4.23 — 1,008 ratings — published 2014
Rate this book
Clear rating


“Technology defends systems, and mindset defends security.”
Timsux Wales

Jason Hishmeh
“As recent analyses uncover over 2,000 vulnerabilities in apps built through vibe coding, technology leaders must weave security reviews into AI-assisted development to curb emerging threats.

It's like drafting a novel with an eager ghostwriter who captures the essence of the book but overlooks plot holes that could unravel the entire story.”
Jason Hishmeh, The 6 Startup Stages: How Non-technical Founders Create Scalable, Profitable Companies

More quotes...