Security Books

Showing 1-50 of 7,780
The Art of Deception: Controlling the Human Element of Security The Art of Deception: Controlling the Human Element of Security (Paperback)
by (shelved 80 times as security)
avg rating 3.76 — 7,242 ratings — published 2001
Rate this book
Clear rating
Hacking: The Art of Exploitation w/CD Hacking: The Art of Exploitation w/CD (Paperback)
by (shelved 78 times as security)
avg rating 4.17 — 2,511 ratings — published 2003
Rate this book
Clear rating
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws (Paperback)
by (shelved 78 times as security)
avg rating 4.23 — 1,228 ratings — published 2007
Rate this book
Clear rating
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (Hardcover)
by (shelved 74 times as security)
avg rating 3.97 — 27,366 ratings — published 2011
Rate this book
Clear rating
Security Engineering: A Guide to Building Dependable Distributed Systems Security Engineering: A Guide to Building Dependable Distributed Systems (Hardcover)
by (shelved 70 times as security)
avg rating 4.21 — 702 ratings — published
Rate this book
Clear rating
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (Hardcover)
by (shelved 68 times as security)
avg rating 4.17 — 8,295 ratings — published 2014
Rate this book
Clear rating
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (Paperback)
by (shelved 64 times as security)
avg rating 4.28 — 15,886 ratings — published 1989
Rate this book
Clear rating
Secrets and Lies: Digital Security in a Networked World Secrets and Lies: Digital Security in a Networked World (Paperback)
by (shelved 63 times as security)
avg rating 3.93 — 1,794 ratings — published 2000
Rate this book
Clear rating
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Kindle Edition)
by (shelved 55 times as security)
avg rating 4.34 — 10,016 ratings — published 2019
Rate this book
Clear rating
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Paperback)
by (shelved 55 times as security)
avg rating 4.30 — 28,935 ratings — published 1999
Rate this book
Clear rating
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World (Paperback)
by (shelved 54 times as security)
avg rating 4.00 — 3,871 ratings — published 2015
Rate this book
Clear rating
Applied Cryptography: Protocols, Algorithms, and Source Code in C Applied Cryptography: Protocols, Algorithms, and Source Code in C (Hardcover)
by (shelved 53 times as security)
avg rating 4.21 — 2,136 ratings — published 1993
Rate this book
Clear rating
Threat Modeling: Designing for Security Threat Modeling: Designing for Security (Kindle Edition)
by (shelved 52 times as security)
avg rating 4.07 — 287 ratings — published 2014
Rate this book
Clear rating
Rate this book
Clear rating
The Tangled Web: A Guide to Securing Modern Web Applications The Tangled Web: A Guide to Securing Modern Web Applications (Paperback)
by (shelved 51 times as security)
avg rating 4.04 — 554 ratings — published 2011
Rate this book
Clear rating
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)
by (shelved 51 times as security)
avg rating 4.47 — 604 ratings — published 2011
Rate this book
Clear rating
Metasploit: The Penetration Tester's Guide Metasploit: The Penetration Tester's Guide (Paperback)
by (shelved 51 times as security)
avg rating 4.07 — 869 ratings — published 2011
Rate this book
Clear rating
Social Engineering Social Engineering (Paperback)
by (shelved 50 times as security)
avg rating 3.83 — 3,900 ratings — published 2010
Rate this book
Clear rating
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback)
by (shelved 47 times as security)
avg rating 3.91 — 3,598 ratings — published 2005
Rate this book
Clear rating
Hacking Exposed: Network Security Secrets & Solutions Hacking Exposed: Network Security Secrets & Solutions (Paperback)
by (shelved 42 times as security)
avg rating 3.80 — 1,165 ratings — published 2000
Rate this book
Clear rating
Axel (Corps Security, #1) Axel (Corps Security, #1)
by (shelved 42 times as security)
avg rating 4.08 — 39,607 ratings — published 2013
Rate this book
Clear rating
Liars and Outliers: Enabling the Trust that Society Needs to Thrive Liars and Outliers: Enabling the Trust that Society Needs to Thrive (Hardcover)
by (shelved 39 times as security)
avg rating 3.78 — 1,469 ratings — published 2012
Rate this book
Clear rating
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground (Hardcover)
by (shelved 38 times as security)
avg rating 3.97 — 8,070 ratings — published 2011
Rate this book
Clear rating
Cryptography Engineering: Design Principles and Practical Applications Cryptography Engineering: Design Principles and Practical Applications (Paperback)
by (shelved 36 times as security)
avg rating 4.22 — 406 ratings — published 2010
Rate this book
Clear rating
Beyond Fear: Thinking Sensibly About Security in an Uncertain World. Beyond Fear: Thinking Sensibly About Security in an Uncertain World. (Hardcover)
by (shelved 36 times as security)
avg rating 3.99 — 706 ratings — published 2003
Rate this book
Clear rating
Penetration Testing: A Hands-On Introduction to Hacking Penetration Testing: A Hands-On Introduction to Hacking (Paperback)
by (shelved 35 times as security)
avg rating 4.18 — 397 ratings — published 2014
Rate this book
Clear rating
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (Paperback)
by (shelved 33 times as security)
avg rating 4.04 — 550 ratings — published 2012
Rate this book
Clear rating
Reversing: Secrets of Reverse Engineering Reversing: Secrets of Reverse Engineering (Paperback)
by (shelved 33 times as security)
avg rating 4.09 — 545 ratings — published 2005
Rate this book
Clear rating
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks (Paperback)
by (shelved 33 times as security)
avg rating 4.21 — 472 ratings — published 2005
Rate this book
Clear rating
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race This Is How They Tell Me the World Ends: The Cyberweapons Arms Race (Hardcover)
by (shelved 32 times as security)
avg rating 4.32 — 11,175 ratings — published 2021
Rate this book
Clear rating
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door (Hardcover)
by (shelved 32 times as security)
avg rating 3.74 — 2,749 ratings — published 2014
Rate this book
Clear rating
Black Hat Python: Python Programming for Hackers and Pentesters Black Hat Python: Python Programming for Hackers and Pentesters (Paperback)
by (shelved 30 times as security)
avg rating 4.12 — 614 ratings — published 2014
Rate this book
Clear rating
Digital Fortress Digital Fortress (Paperback)
by (shelved 29 times as security)
avg rating 3.71 — 664,725 ratings — published 1998
Rate this book
Clear rating
The Practice of Network Security Monitoring: Understanding Incident Detection and Response The Practice of Network Security Monitoring: Understanding Incident Detection and Response (Paperback)
by (shelved 28 times as security)
avg rating 4.06 — 266 ratings — published 2013
Rate this book
Clear rating
Red Team Field Manual Red Team Field Manual (Paperback)
by (shelved 27 times as security)
avg rating 4.22 — 998 ratings — published 2014
Rate this book
Clear rating
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (Volume 1 of 2) The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (Volume 1 of 2)
by (shelved 27 times as security)
avg rating 4.42 — 170 ratings — published 2006
Rate this book
Clear rating
Serious Cryptography: A Practical Introduction to Modern Encryption Serious Cryptography: A Practical Introduction to Modern Encryption (Kindle Edition)
by (shelved 26 times as security)
avg rating 4.28 — 378 ratings — published
Rate this book
Clear rating
Dark Territory: The Secret History of Cyber War Dark Territory: The Secret History of Cyber War (Hardcover)
by (shelved 26 times as security)
avg rating 3.90 — 3,184 ratings — published 2016
Rate this book
Clear rating
Gray Hat Hacking : The Ethical Hacker's Handbook Gray Hat Hacking : The Ethical Hacker's Handbook (Paperback)
by (shelved 25 times as security)
avg rating 4.09 — 539 ratings — published 2004
Rate this book
Clear rating
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World (Hardcover)
by (shelved 25 times as security)
avg rating 3.74 — 2,387 ratings — published 2019
Rate this book
Clear rating
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World Click Here to Kill Everybody: Security and Survival in a Hyper-connected World (Paperback)
by (shelved 25 times as security)
avg rating 3.83 — 1,109 ratings — published 2019
Rate this book
Clear rating
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State (Hardcover)
by (shelved 25 times as security)
avg rating 4.07 — 15,063 ratings — published 2014
Rate this book
Clear rating
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security (Paperback)
by (shelved 25 times as security)
avg rating 3.93 — 249 ratings — published 2011
Rate this book
Clear rating
Hackers: Heroes of the Computer Revolution Hackers: Heroes of the Computer Revolution (Paperback)
by (shelved 24 times as security)
avg rating 4.16 — 8,563 ratings — published 1984
Rate this book
Clear rating
Writing Secure Code Writing Secure Code (Paperback)
by (shelved 24 times as security)
avg rating 4.01 — 373 ratings — published 2001
Rate this book
Clear rating
The Shellcoder's Handbook: Discovering and Exploiting Security Holes The Shellcoder's Handbook: Discovering and Exploiting Security Holes (Paperback)
by (shelved 23 times as security)
avg rating 4.15 — 332 ratings — published 2004
Rate this book
Clear rating
Permanent Record Permanent Record (Hardcover)
by (shelved 22 times as security)
avg rating 4.30 — 57,865 ratings — published 2019
Rate this book
Clear rating
The Hacker Playbook 2: Practical Guide To Penetration Testing The Hacker Playbook 2: Practical Guide To Penetration Testing (Kindle Edition)
by (shelved 22 times as security)
avg rating 4.24 — 441 ratings — published 2015
Rate this book
Clear rating
Future Crimes Future Crimes (Hardcover)
by (shelved 22 times as security)
avg rating 3.92 — 4,395 ratings — published 2015
Rate this book
Clear rating
Beck (Corps Security, #3) Beck (Corps Security, #3)
by (shelved 22 times as security)
avg rating 4.27 — 21,973 ratings — published 2013
Rate this book
Clear rating


Jaachynma N.E. Agu
“Don't blow off another's candle for it won't make yours shine brighter.”
Jaachynma N.E. Agu, The Prince and the Pauper

Rainer Maria Rilke
“most people come to know only one corner of their room, one spot near the window, one narrow strip on which they keep walking back and forth.”
Rainer Maria Rilke, Letters to a Young Poet

More quotes...