40 books
—
42 voters
Security Books
Showing 1-50 of 7,565
The Art of Deception: Controlling the Human Element of Security (Paperback)
by (shelved 80 times as security)
avg rating 3.76 — 7,223 ratings — published 2001
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws (Paperback)
by (shelved 79 times as security)
avg rating 4.24 — 1,225 ratings — published 2007
Hacking: The Art of Exploitation w/CD (Paperback)
by (shelved 76 times as security)
avg rating 4.17 — 2,505 ratings — published 2003
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (Hardcover)
by (shelved 73 times as security)
avg rating 3.97 — 27,230 ratings — published 2011
Security Engineering: A Guide to Building Dependable Distributed Systems (Hardcover)
by (shelved 69 times as security)
avg rating 4.21 — 701 ratings — published
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (Hardcover)
by (shelved 67 times as security)
avg rating 4.17 — 8,212 ratings — published 2014
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (Paperback)
by (shelved 63 times as security)
avg rating 4.28 — 15,673 ratings — published 1989
Secrets and Lies: Digital Security in a Networked World (Paperback)
by (shelved 63 times as security)
avg rating 3.93 — 1,793 ratings — published 2000
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Paperback)
by (shelved 55 times as security)
avg rating 4.30 — 28,775 ratings — published 1999
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Kindle Edition)
by (shelved 54 times as security)
avg rating 4.35 — 9,847 ratings — published 2019
Applied Cryptography: Protocols, Algorithms, and Source Code in C (Hardcover)
by (shelved 54 times as security)
avg rating 4.21 — 2,135 ratings — published 1993
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World (Paperback)
by (shelved 53 times as security)
avg rating 4.00 — 3,859 ratings — published 2015
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data (Hardcover)
by (shelved 51 times as security)
avg rating 3.98 — 5,409 ratings — published 2017
Threat Modeling: Designing for Security (Kindle Edition)
by (shelved 51 times as security)
avg rating 4.08 — 287 ratings — published 2014
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)
by (shelved 51 times as security)
avg rating 4.48 — 606 ratings — published 2011
Metasploit: The Penetration Tester's Guide (Paperback)
by (shelved 51 times as security)
avg rating 4.07 — 866 ratings — published 2011
The Tangled Web: A Guide to Securing Modern Web Applications (Paperback)
by (shelved 50 times as security)
avg rating 4.04 — 553 ratings — published 2011
Social Engineering (Paperback)
by (shelved 49 times as security)
avg rating 3.83 — 3,872 ratings — published 2010
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback)
by (shelved 47 times as security)
avg rating 3.91 — 3,591 ratings — published 2005
Hacking Exposed: Network Security Secrets & Solutions (Paperback)
by (shelved 42 times as security)
avg rating 3.80 — 1,165 ratings — published 2000
Axel (Corps Security, #1)
by (shelved 41 times as security)
avg rating 4.08 — 39,600 ratings — published 2013
Liars and Outliers: Enabling the Trust that Society Needs to Thrive (Hardcover)
by (shelved 39 times as security)
avg rating 3.78 — 1,467 ratings — published 2012
Penetration Testing: A Hands-On Introduction to Hacking (Paperback)
by (shelved 37 times as security)
avg rating 4.17 — 391 ratings — published 2014
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground (Hardcover)
by (shelved 37 times as security)
avg rating 3.97 — 8,046 ratings — published 2011
Beyond Fear: Thinking Sensibly About Security in an Uncertain World. (Hardcover)
by (shelved 36 times as security)
avg rating 4.00 — 704 ratings — published 2003
Cryptography Engineering: Design Principles and Practical Applications (Paperback)
by (shelved 35 times as security)
avg rating 4.21 — 406 ratings — published 2010
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (Paperback)
by (shelved 33 times as security)
avg rating 4.03 — 550 ratings — published 2012
Reversing: Secrets of Reverse Engineering (Paperback)
by (shelved 33 times as security)
avg rating 4.09 — 545 ratings — published 2005
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race (Hardcover)
by (shelved 32 times as security)
avg rating 4.32 — 10,999 ratings — published 2021
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks (Paperback)
by (shelved 32 times as security)
avg rating 4.21 — 468 ratings — published 2005
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door (Hardcover)
by (shelved 31 times as security)
avg rating 3.75 — 2,744 ratings — published 2014
Digital Fortress (Paperback)
by (shelved 29 times as security)
avg rating 3.70 — 662,489 ratings — published 1998
Black Hat Python: Python Programming for Hackers and Pentesters (Paperback)
by (shelved 29 times as security)
avg rating 4.12 — 611 ratings — published 2014
The Practice of Network Security Monitoring: Understanding Incident Detection and Response (Paperback)
by (shelved 28 times as security)
avg rating 4.06 — 264 ratings — published 2013
Red Team Field Manual (Paperback)
by (shelved 27 times as security)
avg rating 4.22 — 996 ratings — published 2014
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (Volume 1 of 2)
by (shelved 27 times as security)
avg rating 4.42 — 170 ratings — published 2006
Serious Cryptography: A Practical Introduction to Modern Encryption (Kindle Edition)
by (shelved 25 times as security)
avg rating 4.27 — 376 ratings — published
Dark Territory: The Secret History of Cyber War (Hardcover)
by (shelved 25 times as security)
avg rating 3.90 — 3,164 ratings — published 2016
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State (Hardcover)
by (shelved 25 times as security)
avg rating 4.07 — 15,025 ratings — published 2014
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security (Paperback)
by (shelved 25 times as security)
avg rating 3.92 — 248 ratings — published 2011
Gray Hat Hacking : The Ethical Hacker's Handbook (Paperback)
by (shelved 24 times as security)
avg rating 4.10 — 537 ratings — published 2004
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World (Hardcover)
by (shelved 24 times as security)
avg rating 3.75 — 2,370 ratings — published 2019
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World (Paperback)
by (shelved 24 times as security)
avg rating 3.83 — 1,104 ratings — published 2019
Hackers: Heroes of the Computer Revolution (Paperback)
by (shelved 24 times as security)
avg rating 4.16 — 8,537 ratings — published 1984
Writing Secure Code (Paperback)
by (shelved 24 times as security)
avg rating 4.01 — 373 ratings — published 2001
The Shellcoder's Handbook: Discovering and Exploiting Security Holes (Paperback)
by (shelved 23 times as security)
avg rating 4.15 — 331 ratings — published 2004
Permanent Record (Hardcover)
by (shelved 22 times as security)
avg rating 4.30 — 57,435 ratings — published 2019
The Hacker Playbook 2: Practical Guide To Penetration Testing (Kindle Edition)
by (shelved 22 times as security)
avg rating 4.24 — 436 ratings — published 2015
Beck (Corps Security, #3)
by (shelved 22 times as security)
avg rating 4.27 — 21,977 ratings — published 2013
Bulletproof SSL and TLS: The Complete Guide to Deploying Secure Servers and Web Applications (Paperback)
by (shelved 21 times as security)
avg rating 4.56 — 128 ratings — published 2014
“As people are retracting into their snail shell's security of “stay home, stay safe,” distrust has become the top concern on the list. A climate of suspicion or denunciation is taking hold, gradually destroying the strings of sociability. In the aftermath, every singular person must find out how to reweave the ties of trust and confidence in their community's social tissue. ("What do they think behind their dirty aprons?" )”
―
―
“If you have built castles in the air, your work need not be lost; that is where they should be. Now put the foundations under them.”
― Walden or, Life in the Woods
― Walden or, Life in the Woods












