It Security Books

Showing 1-50 of 161
The Art of Deception: Controlling the Human Element of Security The Art of Deception: Controlling the Human Element of Security (Paperback)
by (shelved 6 times as it-security)
avg rating 3.76 — 7,265 ratings — published 2001
Rate this book
Clear rating
Threat Modeling: Designing for Security Threat Modeling: Designing for Security (Kindle Edition)
by (shelved 5 times as it-security)
avg rating 4.07 — 286 ratings — published 2014
Rate this book
Clear rating
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (Hardcover)
by (shelved 5 times as it-security)
avg rating 3.97 — 27,566 ratings — published 2011
Rate this book
Clear rating
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback)
by (shelved 5 times as it-security)
avg rating 3.91 — 3,609 ratings — published 2005
Rate this book
Clear rating
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws (Paperback)
by (shelved 4 times as it-security)
avg rating 4.23 — 1,229 ratings — published 2007
Rate this book
Clear rating
Security Engineering: A Guide to Building Dependable Distributed Systems Security Engineering: A Guide to Building Dependable Distributed Systems (Hardcover)
by (shelved 4 times as it-security)
avg rating 4.21 — 705 ratings — published
Rate this book
Clear rating
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (Paperback)
by (shelved 4 times as it-security)
avg rating 4.28 — 16,152 ratings — published 1989
Rate this book
Clear rating
Hacking: The Art of Exploitation w/CD Hacking: The Art of Exploitation w/CD (Paperback)
by (shelved 4 times as it-security)
avg rating 4.17 — 2,517 ratings — published 2003
Rate this book
Clear rating
Applied Cryptography: Protocols, Algorithms, and Source Code in C Applied Cryptography: Protocols, Algorithms, and Source Code in C (Hardcover)
by (shelved 4 times as it-security)
avg rating 4.21 — 2,135 ratings — published 1993
Rate this book
Clear rating
Social Engineering Social Engineering (Paperback)
by (shelved 3 times as it-security)
avg rating 3.83 — 3,919 ratings — published 2010
Rate this book
Clear rating
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (Hardcover)
by (shelved 3 times as it-security)
avg rating 4.17 — 8,387 ratings — published 2014
Rate this book
Clear rating
Security Metrics: Replacing Fear, Uncertainty, and Doubt Security Metrics: Replacing Fear, Uncertainty, and Doubt (Paperback)
by (shelved 3 times as it-security)
avg rating 3.80 — 109 ratings — published 2007
Rate this book
Clear rating
Practical UNIX & Internet Security Practical UNIX & Internet Security (Paperback)
by (shelved 3 times as it-security)
avg rating 3.87 — 220 ratings — published 1991
Rate this book
Clear rating
Stealing The Network: How to Own the Box Stealing The Network: How to Own the Box (Paperback)
by (shelved 2 times as it-security)
avg rating 4.04 — 358 ratings — published 2003
Rate this book
Clear rating
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age (Paperback)
by (shelved 2 times as it-security)
avg rating 4.04 — 1,611 ratings — published 2001
Rate this book
Clear rating
Stealing the Network: How to Own a Continent Stealing the Network: How to Own a Continent (Paperback)
by (shelved 2 times as it-security)
avg rating 4.03 — 271 ratings — published 2004
Rate this book
Clear rating
Rate this book
Clear rating
Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan (Kindle Edition)
by (shelved 2 times as it-security)
avg rating 3.95 — 64 ratings — published 2015
Rate this book
Clear rating
Securing DevOps: Security in the Cloud Securing DevOps: Security in the Cloud (Paperback)
by (shelved 2 times as it-security)
avg rating 4.37 — 82 ratings — published
Rate this book
Clear rating
The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations (Paperback)
by (shelved 2 times as it-security)
avg rating 4.29 — 5,914 ratings — published 2015
Rate this book
Clear rating
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems (Paperback)
by (shelved 2 times as it-security)
avg rating 4.10 — 431 ratings — published 2007
Rate this book
Clear rating
Zero Day (Jeff Aiken, #1) Zero Day (Jeff Aiken, #1)
by (shelved 2 times as it-security)
avg rating 3.57 — 5,913 ratings — published 2011
Rate this book
Clear rating
Cyberpunk: Outlaws and Hackers on the Computer Frontier Cyberpunk: Outlaws and Hackers on the Computer Frontier (Paperback)
by (shelved 2 times as it-security)
avg rating 3.85 — 846 ratings — published 1991
Rate this book
Clear rating
Android Hacker's Handbook Android Hacker's Handbook (Paperback)
by (shelved 2 times as it-security)
avg rating 3.96 — 120 ratings — published 2013
Rate this book
Clear rating
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys (Kindle Edition)
by (shelved 2 times as it-security)
avg rating 4.19 — 274 ratings — published 2012
Rate this book
Clear rating
Secrets and Lies: Digital Security in a Networked World Secrets and Lies: Digital Security in a Networked World (Paperback)
by (shelved 2 times as it-security)
avg rating 3.93 — 1,794 ratings — published 2000
Rate this book
Clear rating
Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet (Hardcover)
by (shelved 2 times as it-security)
avg rating 3.95 — 113 ratings — published 1999
Rate this book
Clear rating
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Paperback)
by (shelved 2 times as it-security)
avg rating 4.30 — 29,137 ratings — published 1999
Rate this book
Clear rating
Building Internet Firewalls: Internet and Web Security Building Internet Firewalls: Internet and Web Security (Paperback)
by (shelved 2 times as it-security)
avg rating 3.79 — 89 ratings — published 1995
Rate this book
Clear rating
Enterprise Security Architecture: A Business-Driven Approach Enterprise Security Architecture: A Business-Driven Approach (Hardcover)
by (shelved 2 times as it-security)
avg rating 3.95 — 64 ratings — published 2004
Rate this book
Clear rating
Snow Crash Snow Crash (Hardcover)
by (shelved 1 time as it-security)
avg rating 4.01 — 299,427 ratings — published 1992
Rate this book
Clear rating
Penguin Random House Python Crash Course Penguin Random House Python Crash Course (Paperback)
by (shelved 1 time as it-security)
avg rating 4.35 — 3,168 ratings — published 2015
Rate this book
Clear rating
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race This Is How They Tell Me the World Ends: The Cyberweapons Arms Race (Hardcover)
by (shelved 1 time as it-security)
avg rating 4.31 — 11,386 ratings — published 2021
Rate this book
Clear rating
Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance (Hardcover)
by (shelved 1 time as it-security)
avg rating 3.68 — 659 ratings — published 2014
Rate this book
Clear rating
Unauthorised Access: Physical Penetration Testing for IT Security Teams Unauthorised Access: Physical Penetration Testing for IT Security Teams (Paperback)
by (shelved 1 time as it-security)
avg rating 3.85 — 136 ratings — published 2009
Rate this book
Clear rating
Privacy on the Line: The Politics of Wiretapping and Encryption Privacy on the Line: The Politics of Wiretapping and Encryption (Paperback)
by (shelved 1 time as it-security)
avg rating 3.98 — 44 ratings — published 1998
Rate this book
Clear rating
Approaching Zero: Data Crime and the Computer Underworld Approaching Zero: Data Crime and the Computer Underworld (Paperback)
by (shelved 1 time as it-security)
avg rating 3.73 — 22 ratings — published 1992
Rate this book
Clear rating
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning (Paperback)
by (shelved 1 time as it-security)
avg rating 4.36 — 428 ratings — published 2009
Rate this book
Clear rating
Guide to Network Defense and Countermeasures Guide to Network Defense and Countermeasures (Paperback)
by (shelved 1 time as it-security)
avg rating 3.68 — 28 ratings — published 2006
Rate this book
Clear rating
The Newtonian Casino The Newtonian Casino (Paperback)
by (shelved 1 time as it-security)
avg rating 4.07 — 100 ratings — published 1990
Rate this book
Clear rating
Real-World Bug Hunting: A Field Guide to Web Hacking Real-World Bug Hunting: A Field Guide to Web Hacking (Paperback)
by (shelved 1 time as it-security)
avg rating 4.20 — 143 ratings — published
Rate this book
Clear rating
Cryptography Engineering: Design Principles and Practical Applications Cryptography Engineering: Design Principles and Practical Applications (Paperback)
by (shelved 1 time as it-security)
avg rating 4.22 — 407 ratings — published 2010
Rate this book
Clear rating
Wireless Security: Know It All (Newnes Know It All) Wireless Security: Know It All (Newnes Know It All)
by (shelved 1 time as it-security)
avg rating 4.00 — 3 ratings — published 2008
Rate this book
Clear rating
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security (Paperback)
by (shelved 1 time as it-security)
avg rating 3.93 — 249 ratings — published 2011
Rate this book
Clear rating
How To Think Like A Manager for the CISSP Exam How To Think Like A Manager for the CISSP Exam (Kindle Edition)
by (shelved 1 time as it-security)
avg rating 4.59 — 157 ratings — published
Rate this book
Clear rating
(Isc)2 Cissp Certified Information Systems Security Professional Official Study Guide 9th Edition (Isc)2 Cissp Certified Information Systems Security Professional Official Study Guide 9th Edition
by (shelved 1 time as it-security)
avg rating 3.43 — 7 ratings — published
Rate this book
Clear rating
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (Paperback)
by (shelved 1 time as it-security)
avg rating 4.04 — 554 ratings — published 2012
Rate this book
Clear rating
CRISC Review Manual 7th Edition CRISC Review Manual 7th Edition (Paperback)
by (shelved 1 time as it-security)
avg rating 3.80 — 15 ratings — published
Rate this book
Clear rating
Pegasus: How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy Pegasus: How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy (Hardcover)
by (shelved 1 time as it-security)
avg rating 3.89 — 1,605 ratings — published 2023
Rate this book
Clear rating
Het is oorlog maar niemand die het ziet Het is oorlog maar niemand die het ziet (Mass Market Paperback)
by (shelved 1 time as it-security)
avg rating 4.25 — 4,592 ratings — published 2019
Rate this book
Clear rating