Buscar libros, personas y listas
Read This Twice
InicioPersonasLibrosSonaBibliotecasIniciar sesión

Mejores libros de ciberseguridad

Mantente adelante de las amenazas digitales con los libros más autorizados sobre ciberseguridad. Descubre los títulos más recomendados por expertos de la industria y líderes de pensamiento en el campo.

Recomendaciones de 60 artículos, Kara Swisher, Ben Goldacre, Alexis Ohanian y 15 más.
Mejores libros de ciberseguridad
99 libros en la lista
Ordenar por
Cantidad de artículos
Ingeniería social book cover
Ingeniería social
El arte del hacking personal
Christopher Hadnagy - 2010-12-17
Calificación de Goodreads
La mayoría de ataques informáticos tienen un componente desafiante, doloroso, como un rugido. Sin embargo un ingeniero social experimentado es un arma letal contra la que resulta casi imposible defenderse. Su singularidad y arriesgadas soluciones pueden arreglar las vulnerabilidades técnicas más imprevistas. Chris Hadnagy h
Un fantasma en el sistema. Las aventuras del hacker más buscado del mundo. book cover
Un fantasma en el sistema. Las aventuras del hacker más buscado del mundo.
My Adventures as the World's Most Wanted Hacker
Kevin Mitnick - 2011-08-15
Calificación de Goodreads
Mitnick fue el hacker más escurridizo de la historia. Logró colarse en ordenadores y redes de las agencias y compañías más grandes del mundo, aparentemente impenetrables, como Motorola, Sun Microsystems o Pacific Bell. Para Kevin, hackear no iba solo de alcanzar avances tecnológicos: era un juego de confianza que requería burlar y confundir para acceder a información valiosa. Impulsado por un fuerte estímulo para lograr lo imposible, engañando a los empleados para obtener información privada y maniobrando a través de capas de seguridad, obtuvo acceso a datos que nadie podía ver. Cuando el FBI comenzó a acecharle, Kevin se dio a la fuga, en un juego de persecución cada vez más sofisticado, que le llevó a adoptar identidades falsas y muchos cambios de aspecto, a pasar temporadas en una gran cantidad de ciudades y a un enfrentamiento final con los federales, que no pararían hasta derribarlo. Una emocionante historia real de intriga, suspense e increíble evasión, y el retrato de un visionario cuya creatividad, habilidad y persistencia obligaron a las autoridades a replantearse la forma en que lo perseguían, inspirando cambios permanentes en el modo en que las personas y las empresas protegen su información más confidencial.
Countdown to Zero Day book cover
Countdown to Zero Day
Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter - 2014-11-11
Calificación de Goodreads
Countdown to Zero Day explores the world of cyber warfare and tells the gripping story of the Stuxnet virus that sabotaged Iran’s nuclear efforts. Author Kim Zetter shows how a digital attack can be as destructive as a nuclear bomb and how vulnerable our critical systems are to similar attacks from nation-state adversaries and anonymous hackers. This eye-opening book also takes readers inside the flourishing zero-day “grey markets,” where intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. A comprehensive and prescient read for anyone interested in technology and security.
Recomendado por
Mark Russinovich
El arte de la invisibilidad book cover
El arte de la invisibilidad
The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Kevin Mitnick - 2017-02-14
Calificación de Goodreads
Hacking book cover
The Art of Exploitation, 2nd Edition
Jon Erickson - 2004-10-11 (publicado por primera vez en 2003)
Calificación de Goodreads
Discover the art and science of hacking, from creative problem solving to exploiting programming weaknesses. This book teaches you the fundamentals of C programming from a hacker's perspective, while learning arcane hacking techniques. With access to a complete Linux programming and debugging environment, you'll dive into debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and even inventing new exploits. Learn to program computers, corrupt system memory, inspect processor registers, obstruct security measures, gain access to a remote server, and crack encrypted wireless traffic. Whether you're a seasoned hacker or new to programming, this book will take your skills to the next level.
Practical Malware Analysis book cover
Practical Malware Analysis
The Hands-On Guide to Dissecting Malicious Software
Michael Sikorski - 2012-02-01 (publicado por primera vez en 2011)
Calificación de Goodreads
Discover the tools and techniques used by professional analysts to safely analyze, debug, and disassemble any malicious software that comes your way. Practical Malware Analysis teaches you how to overcome malware tricks and analyze special cases of malware with real-life examples. Hands-on labs challenge you to practice and synthesize your skills, ensuring you have what it takes to succeed in the ever-changing world of malware analysis.
Hackers 2 - Secretos y Soluciones Para La Segurida book cover
Hackers 2 - Secretos y Soluciones Para La Segurida
Network Security Secrets and Solutions
Stuart McClure - 2005-04-19 (publicado por primera vez en 2000)
Calificación de Goodreads
The world's bestselling computer security book—fully expanded and updated "Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." —From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc. "For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'... Hacking Expose 6 defines both." —Patrick Heim, CISO, Kaiser Permanente "The definitive resource to understanding the hacking mindset and the defenses against it." —Vince Rossi, CEO & President, St. Bernard Software "Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." —Bill Loesch, CTO, Guard ID Systems "This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." —Kip Boyle, CISO, PEMCO Mutual Insurance Company "The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," —Jeff Moss, Founder of the popular Black Hat Security Conference Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal. New and updated New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits New wireless and RFID security tools, including multilayered encryption and gateways All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking Fully updated chapters on hacking the Internet user, web hacking, and securing code
Cult of the Dead Cow book cover
Cult of the Dead Cow
How the Original Hacking Supergroup Might Just Save the World
Joseph Menn - 2019-06-04
Calificación de Goodreads
Discover the untold story of America's most famous and respected hacker group - the Cult of the Dead Cow. These anonymous oddball characters invented hacktivism, created top password security tools, and contributed to developing the most important privacy tool on the net. Their members even include top executives walking the corridors of power in Washington and Silicon Valley, including Beto O'Rourke. This book delves into how governments and corporations came to have immense power over individuals and how we can fight back against them with technology.
Threat Modeling book cover
Threat Modeling
Designing for Security
Adam Shostack - 2014-02-12
Calificación de Goodreads
Learn how to adopt a structured approach to threat modeling with this comprehensive guide, which covers all methods and is up-to-date with the latest threats. Whether you're a security professional, software developer or systems manager with security responsibilities, this jargon-free and accessible introduction provides actionable advice without being tied to specific software, operating systems or languages. With tools, frameworks and examples to follow, you can break away from a technology-centered way of thinking and focus on threats and effective operational countermeasures. Don't view software security as an afterthought - make it a priority.
Los Códigos Secretos book cover
Los Códigos Secretos
The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Simon Singh - 2000-08-29 (publicado por primera vez en 1999)
Calificación de Goodreads
THE CODE BOOKb Lets look at the struggles of cryptography and decryption, the scientific legacy built up in the evolution of cryptography, the present of computer security, and the future of quantum computers b Combined with an interesting story about history and the secret achievements of cryptography that evolved through the struggles of production and decipherment, this book is another work by Simon Singh, who wrote `` The Last Theorem of Perma and `` The Big Bang. to be. Singh brings exciting life to the secret world of cryptographers and cryptographers, from the book to ancient Egyptians to the modern information society of the Internet age.
The Web Application Hacker's Handbook by Dafydd Stuttard
The Hacker Playbook 3 by Peter Kim
El huevo del cuco by Cliff Stoll
Cybersecurity Essentials by Charles J. Brooks
Sandworm by Andy Greenberg
Penetration Testing by Georgia Weidman
Cybersecurity – Attack and Defense Strategies by Yuri Diogenes, Erdal Ozkaya
Cybersecurity for Beginners by Raef Meeuwisse
The CERT Guide to Insider Threats by Dawn M. Cappelli
Spam Nation by Brian Krebs
Applied Cryptography by Bruce Schneier
The Practice of Network Security Monitoring by Richard Bejtlich
Dark Territory by Fred Kaplan
The Cyber Effect by Mary Aiken
The Hacker Playbook by Peter Kim
The Secret to Cybersecurity by Scott Augenbaum
Tribe of Hackers by Marcus J. Carey
The Art of Deception by Kevin Mitnick
Guerra en la Red by Richard A. Clarke
CompTIA Security+ Get Certified Get Ahead by Darril Gibson
Los delitos del futuro by Marc Goodman
The Pentester BluePrint by Phillip L. Wylie, Kim Crawley
The Fifth Domain by Richard A. Clarke, Robert K. Knake
Metasploit by David Kennedy
The Art of Memory Forensics by Michael Hale Ligh
Hacked Again by Scott N. Schober
Cybersecurity by Dr. Erdal Ozkaya
How to Measure Anything in Cybersecurity Risk by Douglas W. Hubbard
Applied Network Security Monitoring by Chris Sanders
Network Security Assessment by Chris McNab
We Are Anonymous by Parmy Olson
Mastering Hacking by Harsh Bothra
Vigilancia permanente by Edward Snowden
Kingpin by Kevin Poulsen
Windows Internals, Part 1 by Pavel Yosifovich
Blue Team Field Manual by Alan J White
The Hacker Playbook 2 by Peter Kim
The Smartest Person in the Room by Christian Espinosa
Data and Goliath by Bruce Schneier
Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado
Cybersecurity Is Everybody's Business by Scott N. Schober, Craig W. Schober
The Tao of Network Security Monitoring by Richard Bejtlich
Cyber Wars by Charles Arthur
Defensive Security Handbook by Lee Brotherston
Cybersecurity Ops with Bash by Paul Troncone, Carl Albing Ph. D.
Protecting Your Internet Identity by Ted Claypoole
Effective Cybersecurity by William Stallings
Information Assurance Handbook by Schou Hernandez
Cybersecurity Blue Team Toolkit by Nadean H. Tanner
A Bug Hunter's Diary by Tobias Klein
Cybersecurity and Cyberwar by P. W. Singer
Security Metrics, A Beginner's Guide by Caroline Wong
Worm by Mark Bowden
The Phoenix Project by Gene Kim
The DevOps Handbook by Gene Kim
The Perfect Weapon by David E. Sanger
Alice and Bob Learn Application Security by Tanya Janca
Cyber Minds by Shira Rubinoff
The Hacker and the State by Ben Buchanan
Cybersecurity For Dummies by Joseph Steinberg
Blue Team Handbook by Don Murdoch GSE
Reversing by Eldad Eilam
The IDA Pro Book by Chris Eagle
Cyber Warfare – Truth, Tactics, and Strategies by Dr. Chase Cunningham
Cybersecurity for Beginners by Sam Grubb
Cryptography and Network Security by William Stallings
Hackear al hacker. Aprende de los expertos que derrotan a los hackers by Roger A. Grimes
Hackable by Ted Harrington
Women Know Cyber by Steve Morgan
Comptia Security+ Guide to Network Security Fundamentals by Mark Ciampa
Advanced Penetration Testing by Wil Allsopp
Attacking Network Protocols by James Forshaw
Thinking Security by Steven M. Bellovin
The Social Engineer's Playbook by Jeremiah Talamantes
Android Security Internals by Nikolay Elenkov
Cybersecurity by Rob Arnold
Enterprise Cybersecurity in Digital Business by Ariel Evans
Cybersecurity Law by Shimon Brathwaite
The Art of Computer Virus Research and Defense by Peter Szor
The Computer Incident Response Planning Handbook by N. K. McCarthy
Network Security Through Data Analysis by Michael Collins
Gray Hat Hacking by Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, Moses Frost
Haz clic aquí para matarlos a todos by Bruce Schneier
Online Danger by Eric Cole
iOS Application Security by David Thiel
El lado oscuro de la red by Misha Glenny
Move Fast and Break Things by Jonathan Taplin
Guía De Hacking De Computadora Para Principiantes by Alan T. Norman