Top 200 Cy63r 53c/3th!c4L h4ck!9/P3nT35t!ng 600k5

The Hacker’s Playbook: Book 3 (2018) | Peter Kim

Advanced Penetration Testing (2017) | Wil Allsopp

The Art of Invisibility (2017) | Kevin Mitnick

How to Hack Like a GOD (2017) | Sparc FLOW

Unmasking Maskirovka (2019) | Dan Bagge

 

 

The topics include:


Network Pentesting

Defensive Security


Offensive Security


Programming Languages


Reverse Engineering


Virus Botnet and Malware


Misc

 

Hacking-Security-Ebooks

Top 100 Hacking & Security E-Books (Free Download)

S.No E-Book (PDF Link) Total Pages
1. Advanced Penetration Testing 269 Pages
2. The Basics of Web Hacking 179 Pages
3. The Basics of Hacking and Penetration Testing 178 Pages
4. The Art of Deception by Kevin Mitnick 577 Pages
5. SQL Injection Attacks and Defense 761 Pages
6. Metasploit – The Penetration Tester’s Guide 332 Pages
7. Ethical Hacking and Penetration Testing Guide 523 Pages
8. Network Attacks and Exploitation – A Framework 219 Pages
9. Python Web Penetration Testing Cookbook 224 Pages
10. Wireshark for Security Professionals 391 Pages
11. Mastering Modern Web Penetration Testing 298 Pages
12. The Shellcoder’s Handbook 745 Pages
13. The Little Black Book of Computer Viruses 183 Pages
14. XSS Attacks – Cross Site Scripting Exploits and Defense 482 Pages
15. The Web Application Hacker’s Handbook 771 Pages
16. Ethical Hacking and Countermeasures 239 Pages
17. Reversing – Secrets of Reverse Engineering 619 Pages
18. Network Security Bible 697 Pages
19. Hacking Web Applications – Hacking Exposed 416 Pages
20. Hacking for Dummies 387 Pages
21. Hacking Wireless Network for Dummies 387 Pages
22. Ninja Hacking – Unconventional Penetration Testing Tacting and Techniques 314 pages
23. Professional Penetration Testing 525 Pages
24. Gray Hat Hacking – The Ethical Hacker’s Handbook 577 Pages
25. Hack Attacks Testing 561 Pages
26. Basic Security Testing with Kali Linux 242 Pages
27. Mastering Kali Linux for Advanced Penetration Testing 356 Pages
28. Kali Linux CTF Blueprints 190 Pages
29. Kali Linux Cookbook 261 Pages
30. Kali Linux – Assuring Security by Penetration Testing 454 Pages
31. Information Security Management Handbook 3206 Pages
32. Computer and Information Security Handbook 877 Pages
33. CISSP – Certified Information Systems Security Professional 804 Pages
34. Computer Security and Cryptography 542 Pages
35. Python for Kids 348 Pages
36. End to End Network Security – Defense-in-Depth 469 Pages
37. A Guide to Computer Network Security 483 Pages
38. Essential Computer Security 321 Pages
39. Security in Wireless Mesh Networks 548 Pages
40. Hacking Windows XP (OLD) 379 Pages
41. Hacking Exposed – Windows Security, Secrets and Solutions 482 Pages
42. Hacking Exposed – Network Security, Secrets and Solutions 736 Pages
43. Information Security – Principles and Pratice 413 Pages
44. Nessus, Snort and Ethereal Power Tools 472 Pages
45. Active Defense – A Comprehensive Guide to Network Security 374 Pages
46. Information Security Fundamentals 262 Pages
47. Wireless Network Security 422 Pages
48. Red Hat Linux Security and Optimization 721 Pages
49. Windows Forensics Analysis 386 Pages
50. Mobile and Wireless Network Security and Privacy 232 Pages
51. Firewalls and Internet Security 456 Pages
52. An Introduction to Computer Security – The NIST Handbook 290 Pages
53. Unauthorized Access – Physical Penetration Testing for IT Security Teams 309 Pages
54. Testing Web Security 297 Pages
55. Maximum Security – A Hacker’s Guide to Protecting Your Internet Site and Network 670 Pages
56. Information Resource Guide – Computer, Internet and Network Systems Security 325 Pages
57. The Hacker’s Underground Handbook 116 Pages
58. Guide to SCADA and Industrial Control Systems Security 164 Pages
59. The International Handbook of Computer Security 274 Pages
60. The Code Book – How to Make It, Break It, Hack It, Crack It 273 Pages
61. Linux 101 Hacks 271 Pages
62. Introduction to Linux – A Hands on Guide 223 Pages
63. Bluetooth Security 222 Pages
64. IT Governance – A Manager’s Guide to Data Security and ISO 27001/27002 385 Pages
65. Batch File Programming 155 Pages
66. Cracking the Coding Interview 310 Pages
67. Dictionary of Networking 465 Pages
68. Hacking Gmail 310 Pages
69. Linux Complete Command Reference 1528 Pages
70. Practical Hacking Techniques and Countermeasures 752 Pages
71. The Art of Intrusion by Kevin Mitnick 291 Pages
72. Hack Notes – Windows Security Portable Reference 289 Pages
73. Hacking – The Next Generation 298 Pages
74. Hacking the Cable Modem 330 Pages
75. Hackers Beware – Defending Your Network From The Wiley Hacker 817 Pages
76. Hack Proofing Your Network 826 Pages
77. Hack Attacks Revealed 837 Pages
78. Dissecting the Hack – The F0rb1dd3n Network 441 Pages
79. TCP/IP Guide 1671 Pages
80. Offensive Security – Wireless Attacks – WiFu 385 Pages
81. Google Hacking – For Penetration Testers 529 Pages
82. Computer Forensics Investigating Network Intrusions and Cyber Crime 394 Pages
83. Hakin9 Bible 207 Pages
84. Network Forensics – Tracking Hackers Through Cyberspace 574 Pages
85. Computer Forensics – Investigating Data and Image Files 227 Pages
86. Penetration Testing and Network Defense 625 Pages
87. Hacking Exposed – Malware and Rootkits 401 Pages
88. Malware Analyst’s Cookbook 746 Pages
89. Mobile Malware – Attacks and Defense 386 Pages
90. Java 2 Network Security 702 Pages
91. A Bug Hunter’s Diary 212 Pages
92. Viruses Revealed – Undestand and Counter Malicious Software 721 Pages
93. Figital Forensics With Open Source Tools 289 Pages
94. SSH, The Secure Shell – The Definitive Guide 438 Pages
95. Pro PHP Security 369 Pages
96. Zero Day Exploit – Countdown to Darkness 363 Pages
97. Metasploit Penetration Testing Cookbook 269 Pages
98. 24 Deadly Sins of Software Securtiy 433 Pages
99. Botnets – The Killer Web App 482 Pages
100. Hacker Highschool – Hack School for Beginners (ZIP) 12 Books

________________________________________________________________________________________

1. CEH v9: Certified Ethical Hacker Version 9 Study Guide

Certified Ethical Hacker Version 9 Study Guide
Certified Ethical Hacker Version 9 Study Guide

CEH v9: Certified Ethical Hacker Version 9 Study Guide is for those who are searching for an ideal companion for CEH v9 exam preparation. The eBook can help you to review all CEH v9 topics systematically. The book can help you cover cryptography, scanning, system hacking, network sniffing, etc.

Buy From Amazon

2. The Basics of Hacking and Penetration Testing

The Basics of Hacking and Penetration Testing
The Basics of Hacking and Penetration Testing

Well, if you are searching for an ebook to learn about penetration testing and ethical hacking, then The Basics of Hacking and Penetration Testing might be the best pick for you. The great thing about The Basics of Hacking and Penetration Testing is that it’s written by an author who works in the field of ethical hacking, penetration testing, offensive security, etc.

Buy from Amazon

3. Hacking Revealed

Hacking Revealed
Hacking Revealed

Hacking Revealed is not a book to learn ethical hacking, but its meant to aware of each and every individual about the current scenario of the cyber world. The eBook can help you to learn about the importance of digital lives, privacy, and security. So, Hacking Revealed is another best Hacking book that you can read right now.

Buy From Amazon

4. Hacking: The Practical Guide to Become a Hacker

Hacking: The Practical Guide to Become a Hacker
Hacking: The Practical Guide to Become a Hacker

Hacking: The Practical Guide to Become a Hacker is written by the author Jim Kou who has twenty years of experience in the Cybersecurity and Ethical hacking field. The book contains lots of valuable information that could help you understand dozens of things related to ethical hacking.

Buy From Amazon

5. Ethical Hacking for Beginners

Ethical Hacking for Beginners
Ethical Hacking for Beginners

Ethical Hacking for Beginners is for those who have been searching for an introductory book to learn about the practices of ethical hacking. The book has lots of guides that could help you understand how Linux works and utilize the terminal directions. For beginners, the book also offers step by step techniques and tips to the simple hacking process.

Buy From Amazon

6. The Unrevealed Secrets of Hacking and Cracking

The Unrevealed Secrets of Hacking and Cracking
The Unrevealed Secrets of Hacking and Cracking

Well, if you are searching for a book to get valuable information on various forms of security like IT Security, Data Security, Network Security, Internet Security, etc, then The Unrevealed Secrets of Hacking and Cracking might be the best pick for you. The book throws lights on tools and methods used by the ethical hackers to hack or crack the securities.

Buy From Amazon

7. Web Hacking

Web Hacking
Web Hacking

If you are searching for a powerful guide to staying updated with the latest web attacks and defense, then you need to read the Web Hacking book. The book briefly explains about the web and what hackers go after. Along with that, the book also has a detailed analysis of various hacking techniques as well.

Buy From Amazon

8. Gray Hat Hacking The Ethical Hackers Handbook

Gray Hat Hacking The Ethical Hackers Handbook
Gray Hat Hacking The Ethical Hackers Handbook

Gray Hat Hacking The Ethical Hackers Handbook is for those who have been searching for a book on advanced pentesting techniques. The book can help you learn and write your own exploits, buffer overflow, malware analysis, etc. So, Gray Hat Hacking The Ethical Hackers Handbook is another best hacking book that you can read right now.

Buy From Amazon

Best Free Hacking E-Books In PDF Format


  1. Black Belt Hacking & Complete Hacking Book
  2. Hackers High School 13 Complete Hacking Ebooks
  3. Penetration Testing With Backtrack 5
  4. A Beginners Guide To Hacking Computer Systems
  5. Black Book of Viruses and Hacking
  6. Secrets of Super and Professional Hackers
  7. Dangerous Google Hacking Database and Attacks
  8. Internet Advanced Denial of Service (DDOS) Attack
  9. Computer Hacking & Malware Attacks for Dummies
  10. G-mail Advance Hacking Guides and Tutorials
  11. Vulnerability Exploit & website Hacking for Dummies
  12. Web App Hacking (Hackers Handbook)
  13. Security Cryptic Networks and Hacking
  14. Botnets The Killer Web Applications Hacking
  15. Hacking attacks and Examples Test
  16. Network Hacking and Shadows Hacking Attacks
  17. Gray Hat Hacking and Complete Guide to Hacking
  18. Advance Hacking Exposed Tutorials
  19. 501 Website Hacking Secrets
  20. Internet Security Technology and Hacking
  21. CEH Certified Ethical Hacker Study Guide
  22. Advanced SQL Injection Hacking and Guide
  23. Web Hacking & Penetration Testing
  24. OWASP Hacking Tutorials and Web App Protection
  25. CEH – Hacking Database Secrets and Exploit
  26. Ethical Hacking Value and Penetration testing
  27. Hack any Website, Complete Web App Hacking
  28. Beginners Hackers and tutorials 
  29. Ethical Hacking Complete E-book for Beginners
  30. Backtrack: Advance Hacking Tutorials
  31. SQL Injection attacks and tutorials by Exploit-DB
  32. XSS + Vulnerability Exploitation & Website Hacking
  33. Cross-Site Scripting and Hacking Websites
  34. Hacking Website Database and owning systems
  35. Reverse Engineering for Beginners 
  36. Reverse Engineering (The Real Hacking)
  37. Computer Hacking
  38. Reverse Engineering Hacking and Cracking
  39. Hacking into Computer Systems
  40. Blind SQL Injection Discovery & Exploitation

Also Read: Best Android Hacking Apps

Topics Covered In the Hacking eBooks


  • Linux
  • BackTrack (Kali Linux)
  • AirCrack
  • SQLi
  • Pishing
  • CEH (Certified Ethical Hackers) 2010V8.
  • Hacking Wireless Networks For Dummies.
  • H gray hat hacking.
  • Zero-Day Exploit
  • Information Gathering
  • DDOS Attack
  • Social Engg.
  • Black Hat and White Hat Hackers.
  • Wireless Hacking
  • IP Spoofing
  • Packet Sniffing
  • Seven Deadliest Network Attack
  • Logic Bomb
  • Anonymous
  • XSS – Cross-Site Scripting
  • Passive Wiretapping

Ankit Fadia Best Hacking EBooks Free Download


  • Untold Windows Tips And Secrets
  • Ankit Fadia Hacking Guide
  • Batch File Programming – Ankit Fadia
  • Defacing Websites A Step By Step Process By Ankit Fadia Hacking Truths_ FTP Exploits
  • DOS Attacked
  • Fadia, Ankit – Encryption Algorithms Explained
  • Tracing IP, DN S, WHOIS-DNS lookup
  • Transparent Proxies With Squid By Ankit Fadia
  • Truths!!!–What they Don’t teach in Manuals!!!
  • Base64 Encoding Torn Apart
  • Algorithms Explained
  • Closing Open Holes
  • Firewalls
  • FTP Exploits By Ankit Fadia
  • Gathering Info on Remote Host
  • Getting geographical Information using an IP Address
  • Hacking into Linux
  • More Password Cracking Decrypted
  • Removing Banners from your site
  • Sendmail and Beyond
  • SSL Torn Apart
  • TCP Wrappers Unwrapped
  • Transparent Proxies for Squid
  • Untold Windows Tips and Secrets
  • Windows Password Files Torn Apart

Download

_______________________________________________________________________________________________________

Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

Popular Cyber Security Books

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Threat Modeling: Designing for SecurityThreat Modeling: Designing for Security (ebook)
by

Adam Shostack (Goodreads Author)

(shelved 7 times as cyber-security)
avg rating 4.09 — 163 ratings — published 2014

 

 

 

 

____________________________________________________________________________________________

 

Information Security, Penetration Testing, Social Engineering, Counter-Intelligence, Hacker/Hacking Culture and History.

Goodreads list focused on Pentesting with some other InfoSec related stuff mixed in.
1
Ghost in the Wires: My Adve...
Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
by

 3.98 avg rating — 19,344 ratings
2
Social Engineering: The Art...
Social Engineering: The Art of Human Hacking
by

 3.82 avg rating — 2,507 ratings
3
The Art of Deception: Contr...
The Art of Deception: Controlling the Human Element of Security
by

 3.76 avg rating — 5,599 ratings
4
The Web Application Hacker'...
The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws
by

 4.18 avg rating — 976 ratings
5
Liars and Outliers: Enablin...
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
by

 3.79 avg rating — 1,312 ratings
6
Countdown to Zero Day: Stux...
Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon
by

 4.14 avg rating — 4,453 ratings
7
Penetration Testing: A Hand...
Penetration Testing: A Hands-On Introduction to Hacking
by

 4.17 avg rating — 219 ratings
8
This Machine Kills Secrets:...
This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World’s Information
by

really liked it 4.00 avg rating — 956 ratings
9
The Art of Intrusion: The R...
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
by

 3.88 avg rating — 2,925 ratings
10
The Cuckoo's Egg: Tracking ...
The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage
by

 4.23 avg rating — 9,382 ratings
11
Hackers: Heroes of the Comp...
Hackers: Heroes of the Computer Revolution
by

Steven Levy (Goodreads Author)
 4.13 avg rating — 6,891 ratings
12
Exploding the Phone: The Un...
Exploding the Phone: The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell
by

Phil Lapsley (Goodreads Author)
 4.17 avg rating — 1,337 ratings
13
We Are Anonymous: Inside th...
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
by

 3.96 avg rating — 2,954 ratings
14
Kingpin: How One Hacker Too...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
by

 3.95 avg rating — 7,044 ratings
15
Hackers: Heroes of the Comp...
Hackers: Heroes of the Computer Revolution
by

Steven Levy (Goodreads Author)
 4.13 avg rating — 6,891 ratings
16
The Linux Command Line
The Linux Command Line
by

 4.37 avg rating — 1,095 ratings
17
Snow Crash
Snow Crash
by

Neal Stephenson (Goodreads Author)
 4.03 avg rating — 225,033 ratings
18
Security Engineering: A Gui...
Security Engineering: A Guide to Building Dependable Distributed Systems 2ed
by

 4.21 avg rating — 513 ratings
19
The Art of Intelligence
The Art of Intelligence
by

 3.82 avg rating — 2,246 ratings
20
Hacking: The Art of Exploit...
Hacking: The Art of Exploitation
by

 4.15 avg rating — 2,002 ratings
21
Breaking and Entering: The ...
Breaking and Entering: The Extraordinary Story of a Hacker Called “Alien”
by

Jeremy N. Smith (Goodreads Author)
 3.75 avg rating — 759 ratings
22
Underground: Tales of Hacki...
Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier
by

 4.16 avg rating — 566 ratings
23
Metasploit: The Penetration...
Metasploit: The Penetration Tester’s Guide
by

 4.05 avg rating — 776 ratings
24
Applied Network Security Mo...
Applied Network Security Monitoring: Collection, Detection, and Analysis
by

 4.29 avg rating — 51 ratings
25
The Code Book: The Science ...
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
by

 4.29 avg rating — 20,224 ratings
26
Black Hat Python: Python Pr...
Black Hat Python: Python Programming for Hackers and Pentesters
by

 4.05 avg rating — 360 ratings
27
Neuromancer (Sprawl, #1)
Neuromancer (Sprawl, #1)
by

 3.90 avg rating — 250,339 ratings
28
Future Crimes: Everything I...
Future Crimes: Everything Is Connected, Everyone Is Vulnerable, and What We Can Do About It
by

Marc Goodman (Goodreads Author)
 3.94 avg rating — 3,464 ratings
29
The Perfect Weapon: How the...
The Perfect Weapon: How the Cyber Arms Race Set the World Afire
by

 4.31 avg rating — 1,625 ratings
30
Julian Assange - The Unauth...
Julian Assange – The Unauthorised Autobiography
by

 3.74 avg rating — 730 ratings
30
Mirrorshades: The Cyberpunk...
Mirrorshades: The Cyberpunk Anthology
by

Bruce Sterling (Editor)
 3.95 avg rating — 8,203 ratings
30
Spam Nation: The Inside Sto...
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
by

 3.73 avg rating — 2,135 ratings
33
Nmap Network Scanning: The ...
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
by

 4.31 avg rating — 364 ratings
34
Chinese Intelligence Operat...
Chinese Intelligence Operations
by

Nicholas Eftimiades (Goodreads Author)
 3.68 avg rating — 80 ratings
35
Alif the Unseen
Alif the Unseen
by

G. Willow Wilson (Goodreads Author)
 3.84 avg rating — 15,469 ratings
36
Network Forensics: Tracking...
Network Forensics: Tracking Hackers Through Cyberspace
by

 4.38 avg rating — 55 ratings
37
Trojan Horse
Trojan Horse
by

 3.77 avg rating — 2,006 ratings
38
Hacking the Human: Social E...
Hacking the Human: Social Engineering Techniques and Security Countermeasures
by

 3.67 avg rating — 33 ratings
38
Blue Team Handbook: Inciden...
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
by

 4.06 avg rating — 207 ratings
38
Rethinking IT Security: Wha...
Rethinking IT Security: What needs to be said. How can we solve the IT security problem long term?
by

 4.67 avg rating — 3 ratings
38
Moral Panic
Moral Panic
by

K.M. Ecke (Goodreads Author)
 4.18 avg rating — 49 ratings
38
Computer Incident Response ...
Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response
by

 4.33 avg rating — 6 ratings
38
ZX Spectrum Games Code Club...
ZX Spectrum Games Code Club: Twenty fun games to code and learn
by

Gary Plowman (Goodreads Author)
 4.64 avg rating — 11 ratings
38
The Soul Snatchers
The Soul Snatchers
by

Richard Sanford (Goodreads Author)
 4.71 avg rating — 7 ratings
38
DNA Nation: How the Interne...
DNA Nation: How the Internet of Genes is Changing your Life
by

Sergio Pistoi (Goodreads Author)
 4.38 avg rating — 13 ratings
38
Best Practices for Protecti...
Best Practices for Protecting Your Small or Medium Size Business from Phishing
by

it was amazing 5.00 avg rating — 1 rating
38
The CPA Cybersecurity Survi...
The CPA Cybersecurity Survival Guide
by

it was amazing 5.00 avg rating — 1 rating
48
Crafting the InfoSec Playbo...
Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan
by

 4.08 avg rating — 39 ratings
49
The Hacker Playbook: Practi...
The Hacker Playbook: Practical Guide To Penetration Testing
by

 3.98 avg rating — 381 ratings
49
Obfuscation: A User's Guide...
Obfuscation: A User’s Guide for Privacy and Protest
by

 3.55 avg rating — 224 ratings
51
Red Team Field Manual
Red Team Field Manual
by

 4.23 avg rating — 684 ratings
51
Tribe of Hackers: Cybersecu...
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
by

Marcus J. Carey (Goodreads Author)
 4.21 avg rating — 94 ratings
51
Practical Reverse Engineeri...
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
by

 3.95 avg rating — 107 ratings
54
This Machine Kills Secrets:...
This Machine Kills Secrets: How WikiLeakers, Hacktivists, and Cypherpunks Are Freeing the World’s Information
by

really liked it 4.00 avg rating — 956 ratings
54
Click Here to Kill Everybod...
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
by

 3.83 avg rating — 512 ratings
56
Nightwork: A History of Hac...
Nightwork: A History of Hacks and Pranks at MIT
by

 3.74 avg rating — 148 ratings
57
Cyberpunk: Outlaws and Hack...
Cyberpunk: Outlaws and Hackers on the Computer Frontier
by

Katie Hafner (Goodreads Author)
 3.83 avg rating — 733 ratings
58
The Best of 2600: A Hacker ...
The Best of 2600: A Hacker Odyssey
by

 4.16 avg rating — 374 ratings
59
Zero Day: China's Cyber War...
Zero Day: China’s Cyber Wars (Logan Alexander #3)
by

T.L. Williams (Goodreads Author)
 3.52 avg rating — 33 ratings
59
Cult of the Dead Cow: How t...
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
by

Joseph Menn (Goodreads Author)
 3.73 avg rating — 710 ratings
61
Lucky Ghost
Lucky Ghost
by

Matthew Blakstad (Goodreads Author)
 3.65 avg rating — 71 ratings
62
Practical Lock Picking: A P...
Practical Lock Picking: A Physical Penetration Tester’s Training Guide
by

 4.24 avg rating — 117 ratings
63
Rogue Code
Rogue Code
by

 3.87 avg rating — 1,058 ratings
64
Violent Python: A Cookbook ...
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
by

 4.02 avg rating — 493 ratings
65
How to Look for Trouble: A ...
How to Look for Trouble: A Stratfor Guide to Protective Intelligence
by

 3.44 avg rating — 18 ratings
66
The Human Skills: Elicitati...
The Human Skills: Elicitation & Interviewing
by

Frank Stopa (Goodreads Author)
 3.96 avg rating — 23 ratings
67
It's Not All About Me: The ...
It’s Not All About Me: The Top Ten Techniques for Building Quick Rapport with Anyone
by

 3.88 avg rating — 1,508 ratings
68
The Shellcoder's Handbook: ...
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes
by

 4.13 avg rating — 287 ratings
69
Secrets and Lies: Digital S...
Secrets and Lies: Digital Security in a Networked World
by

 3.90 avg rating — 1,683 ratings
70
Thwarting Enemies at Home a...
Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer
by

William R. Johnson (Foreword)
 3.81 avg rating — 182 ratings
71
Terrorism and Counterintell...
Terrorism and Counterintelligence: How Terorist Groups Elude Detection
by

 4.25 avg rating — 24 ratings
72
Fatal System Error: The Hun...
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
by

Joseph Menn (Goodreads Author)
 3.69 avg rating — 1,003 ratings
73
Cyberwar: The Next Threat t...
Cyberwar: The Next Threat to National Security & What to Do About It
by

 3.73 avg rating — 2,088 ratings
74
Where Wizards Stay Up Late:...
Where Wizards Stay Up Late: The Origins of the Internet
by

Katie Hafner (Goodreads Author)
 3.90 avg rating — 3,882 ratings
75
Masters of Doom: How Two Gu...
Masters of Doom: How Two Guys Created an Empire and Transformed Pop Culture
by

 4.27 avg rating — 12,678 ratings
76
Psychology of Intelligence ...
Psychology of Intelligence Analysis
by

 4.30 avg rating — 538 ratings
77
Counterintelligence: Theory...
Counterintelligence: Theory & Ppb
by

really liked it 4.00 avg rating — 25 ratings
78
Masters of Deception: The G...
Masters of Deception: The Gang That Ruled Cyberspace
by

 3.91 avg rating — 920 ratings
79
America the Vulnerable: Ins...
America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare
by

 3.85 avg rating — 296 ratings
80
The Rootkit Arsenal: Escape...
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
by

 4.05 avg rating — 110 ratings
81
Practical Cryptography
Practical Cryptography
by

 4.17 avg rating — 306 ratings
82
The Art of Software Securit...
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
by

 4.47 avg rating — 145 ratings
83
Hacking: The Next Generation
Hacking: The Next Generation
by

Nitesh Dhanjani (Goodreads Author)
 3.62 avg rating — 95 ratings
84
The Myths of Security: What...
The Myths of Security: What the Computer Security Industry Doesn’t Want You to Know
by

 3.20 avg rating — 74 ratings
85
Spec Ops: Case Studies in S...
Spec Ops: Case Studies in Special Operations Warfare: Theory and Practice
by

 4.13 avg rating — 537 ratings
86
Agent Storm: My Life Inside...
Agent Storm: My Life Inside al Qaeda and the CIA
by

really liked it 4.00 avg rating — 1,480 ratings
87
Cybersecurity and Cyberwar:...
Cybersecurity and Cyberwar: What Everyone Needs to Know?
by

P.W. Singer (Goodreads Author)
 3.85 avg rating — 926 ratings
88
Inside Cyber Warfare: Mappi...
Inside Cyber Warfare: Mapping the Cyber Underworld
by

 3.33 avg rating — 194 ratings
89
The Analyst's Cookbook, Vol...
The Analyst’s Cookbook, Volume 2
by

 3.11 avg rating — 9 ratings

____________________________________________________________________________________________

1.) CYBER WAR: THE NEXT THREAT TO NATIONAL SECURITY AND WHAT TO DO ABOUT IT

1.cyber war

Written by former New York Times Bestselling author, former presidential advisor and counter-terrorism expert Richard A. Clarke, Cyber War is a personal look into the role that cyber attacks play in geopolitical conflict. Taking readers right into the “Situation Room” of the White House, where cyber ploys feature as a constant in todays warzones. Starting with the integral role a cyber attack played in jamming of radars in an Insraeli bombing run over Syria, the tone is from the start both conversational and action packed. A non-jargon filled text, Cyber War does a great job at showing the real world impacts of cyber attacks and defense, as well as show the extent to which cyber warfare is a major threat to the United States.

Amazon Rating: 4.6/5
Number of Reviews: 991

Good For: General Public, IA Policy Geeks

2.) COMPTIA SECURITY+: GET CERTIFIED GET AHEAD: SY0-401 STUDY GUIDE

2.comp tia
The CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide is the update to the long running series that has aided thousands of IT and information security professionals pass the Security+ exam. While not necessarily light reading, the inclusion of the study guide makes sense for cyber security community members. Security+ certification is one of the most popular certifications for cyber security professionals, listed as a preferred certification on close to 20% of cyber security job openings. The book is broken into 11 chapters that break down core security concepts and applications in real world contexts. The study guide also includes over 400 realistic practice test questions, with questions at the end of every chapter. A 100 question pre test and 100 question post test help to track progress through the preparation process.

Amazon Rating: 4.7/5
Number of Reviews: 756

Good For: Cyber Security Professionals

3.) RTFM: RED TEAM FIELD MANUAL

3.rtfm e1501014757801
Red Team Field Manual is a no-fluff reference manual meant for (surprise) red team members in cyber attack exercises. For team members who may not have access to Google or who need solid well-documented red team techniques at their fingertips, the book functions as a reference page for common linux and Windows command line tools. Essentially a table of contents and page after page of commands and tips, the book works through *NIX, Windows, Networking, Tips and Tricks, Tool Syntax, WFB, Databases, Programming, Wireless. Users note that the book is essentially years of notation from an experienced penetration tester or network security engineer. With that said, mostly already advanced information security professionals will feel at home at all in what is essentially an index of 2000 commands, sometimes hardly notated.

Amazon Rating: 4.4/5
Number of Reviews: 423
Good For: Incident Response, Penetration Testers, Advanced Information Security Learners

4.) THE BASICS OF HACKING AND PENETRATION TESTING: ETHICAL HACKING AND PENETRATION TESTING MADE EASY

4.basics
Much more of a “how-to” book than something like the Red Team Field Manual, The Basics of Hacking and Penetration Testing helps beginner penetration testers (or ambitious complete novices) to set up the tools and complete their first penetration test. Coverage of the book includes a four-step methodology for performing a penetration test or hack, as well as introduction to a number of tools that are integral in this process. Tools covered include (with some newly included in the second edition) Google reconnaissance, MetaGooFil, Backtrack and Kali Linux, Nmap, Nessus, DNS interrogation, Metasploit, w3af, the Social Engineer Toolkit, Netcat, post exploitation tactics, and the Hacker Defender rootkit. After an introduction to all of the tools, users will see how they can utilize each to help better inform their process of using other hacking tools. Potential readers should note that this is a great book for a beginner looking to be stepped through a “typical” penetration test. With that said, it is shorter than some guides on the subject, and while this probably leads to it being a great starting point for a beginner, it also treats some subjects in broad strokes. A great jumping-off point.
Amazon Rating: 4.8/5
Number of Reviews: 189
Good For: Aspiring Information Security Practioners, those who are curious

5.) FUTURE CRIMES: INSIDE THE DIGITAL UNDERGROUND AND THE BATTLE FOR OUR CONNECTED WORLD

5.future
This Wall Street Journal and New York Times Bestseller delves into the now massive wave of connected devices — that while largely beneficial — can all be hacked. Author Marc Goodman draws on his extensive experience in law enforcement and counter terrorism to provide insightful and harrying stories from the dark side of the internet and connected devices. This “futurist-in-residence with the FBI” provides enough examples of the inventiveness and maliciousness of cyber criminals to invigorate the general public, the potential security professional, and the seasoned pro. Good for all audiences, this book is exciting and offers practical advice for both policy makers and the layman on how to protect their own data. For tales of hacked pacemakers, remotely landed planes, and shut down power grids, look no farther!

Amazon Rating: 4.5
Number of Reviews: 331
Good For: General Public, Information Security Professionals

6.) HACKING: THE ART OF EXPLOITATION, 2ND EDITION

6.hacking
Hacking: the Art of Exploitation by Jon Erickson is a versatile and well measured book great for those with some programming knowledge looking to transition to cyber security, as well as early and mid-education cyber security students. The book centers around the solid technical foundation that is needed to excel in many cyber security roles, and fittingly introduces the C programming language for beginners. The unique part of the foundations in this book is that foundational programming is presented from the hackers perspective, something that could take months (or longer) to get exposed to in a typical programming foundations track. A number of common hacks are explained in depth and in a way you can follow along. Software is also included to create your own Linux programming and debugging environment without messing with your current operating system. A great read for those still in the educational process or self teaching in an effort to become cyber security professionals.
Amazon Rating: 4.5/5
Number of Reviews: 224
Good For: Cyber Security Students, Aspiring Hackers

7.) CISSP (ISC)2 CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL OFFICIAL STUDY GUIDE

7.cissp
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition is an authoritative source for CISSP preparation featuring walk throughs and strategy for all sections of the exam. Additionally, purchasers recieve access to Sybex’s interactive learning environment, featuring four 250 question practice exams, 650 flash cards, and a searcheable pdf glossery. Coverage areas in this tried and true study guide include Security and Risk Management, Asset Security, Security Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security.Authors include some of the best in the business, and all three fellow CISSP’s: James Michael Stewart, CISSP, CEH, CHFI, Security+; Mike Chapple, PhD, CISSP; Darril Gibson, CISSP.
Amazon Rating: 4.4
Number of Reviews: 211
Good For: Current Information Security Professionals preparing for their CISSP exam

8.) DARK TERRITORY: THE SECRET HISTORY OF CYBER WAR

8.dark
Dark Territory: the Secret History of Cyber War by Fred Kaplan presents the surprising, exciting, wacky, and terrifying history of the American government’s efforts to manage national cyber security. From 1983, when President Reagan watched War Games (the movie in which a teenager hacked the Pentagon), and issued America’s first cyber security directive, the book starts at the very beginning of America’s cyber security infrastructure. This novel draws from Fred Kaplan’s experience as a Pulitzer-Prize Winning Journalist, long-term columnist on cyber security, and PhD in Political Science from MIT to provide breadth and depth to cyber war escapades throughout the late 20th century. A must read for anyone who wants a comprehensive and incredibly well-researched history of cyber security.

Amazon Rating: 4.4/5
Number of Reviews: 137
Good For: General Public, Students of Information Assurance Policy, IA Professionals

9.) BLUE TEAM HANDBOOK: INCIDENT RESPONSE EDITION: A CONDENSED FIELD GUIDE FOR THE CYBER SECURITY INCIDENT RESPONDER.

9.blue team
Now in version 2.2, the Blue Team Handbook is a “no fluff” reference guide similar to the Red Team Handbook above, but for the “good guys.” Topics covered include an overview of how attackers work, tools for incident response, overall incident response process, network analysis tools and methods, common indicators of comprimise (new for V.2.2.), analysis processes for Windows and Linux, tcpdump usage examples, Snort IDS usage, and packet headers. It’s noted for essentially being a condensed reference by those with years of experience in incident response and cyber defense, good for both new and veteran incident responders and cyber security engineers. While perhaps too dry for light reading, the book provides clear and concise reference materials that can be accessed in seconds.

Amazon Rating: 4.5/5
Number of Reviews: 94
Good For: “Blue Team” members, Incident Responders, Cyber Security Architects and Engineers, those Learning about Cyber Security

10.) CEH CERTIFIED ETHICAL HACKER STUDY GUIDE

10.ceh
The CEH v9: Certified Ethical Hacker Version 9 Study Guide is an authoritative preperation guide for the CEH v9 exam. Coming in at 648 pages, this guide — and the second on our list by the publisher Cybex — packs in a ton of preparatory materials. Furthermore, access to interactive online elements including two complete practice tests, over 100 electronic flash cards, and a searcheable glossery help to extend the studying experience. Topics covered in the book include cryptography, malware, SQL Injection, cloud security and more. For those looking to pass their Certified Ethical Hacker exam and move into penetration testing or hacking, this is the indispensible study guide.

GoodReads Rating: 3.81
Number of Reviews: 137
Good For: Those seeking to pass their CEH Exam

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.