Search for books, people and lists
Read This Twice
HomePeopleBooksMy Library 0Sign In

Best Cybersecurity Books

Recommendations from 27 articles, Casey Neistat, Ben Goldacre, Brian Armstrong and 18 others.
100 books on the list
Sort by
Number of Articles
Layout
Hacking Exposed 7
Network Security Secrets and Solutions
Stuart McClure - Aug 01, 2012 (first published in 2003)
Goodreads Rating
A fully updated edition of the world's bestselling computer security book "Hacking Exposed 7: Network Security Secrets and Solutions" is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wirel...
Countdown to Zero Day
Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter - Sep 01, 2015 (first published in 2014)
Goodreads Rating
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed tha...
Recommended by
Mark Russinovich
Ghost in the Wires
My Adventures as the World's Most Wanted Hacker
Kevin Mitnick - Apr 24, 2012 (first published in 2011)
Goodreads Rating
If they were a hall of fame or shame for computer hackers, a Kevin Mitnick plaque would be mounted the near the entrance. While other nerds were fumbling with password possibilities, this adept break-artist was penetrating the digital secrets of Sun Microsystems, Digital Equipment Corporation, Nokia, Motorola, Pacific Bell, and other mammoth enterp...
Recommended by
Mark Russinovich
Spam Nation
The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door
Brian Krebs - Nov 18, 2014
Goodreads Rating
There is a Threat Lurking Online with the Power to Destroy Your Finances, Steal Your Personal Data, and Endanger Your Life.In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise...
Practical Malware Analysis
The Hands-On Guide to Dissecting Malicious Software
Michael Sikorski - Feb 01, 2012 (first published in 2011)
Goodreads Rating
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analys...
The Hacker Playbook 3
Practical Guide To Penetration Testing
Peter Kim - May 02, 2018
Goodreads Rating
Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory. The main purpose of this book is to answer questions as to why things are still broken. For instanc...
Threat Modeling
Designing for Security
Adam Shostack - Feb 17, 2014
Goodreads Rating
The book is chock-full of specific and actionable advice, without being tied to specific software, operating systems or languages. For security professionals, the book provides the easiest way to adopt a structured approach to threat modeling. This approach is being promoted by Microsoft, and the book will provide the easiest way to understand the ...
Social Engineering
The Science of Human Hacking
Christopher Hadnagy - Jul 31, 2018 (first published in 2010)
Goodreads Rating
Harden the human firewall against the most current threatsSocial Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in...
The Practice of Network Security Monitoring
Understanding Incident Detection and Response
Richard Bejtlich - Jul 15, 2013
Goodreads Rating
Network security is not simply about building impenetrable walls — determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monit...
Dark Territory
The Secret History of Cyber War
Fred Kaplan - Mar 28, 2017
Goodreads Rating
The never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invented and employ the wars of the present and future - the cyber wars where every country can be a major power player and every hacker a mass destroyer, as reported by a Pulitzer Prize-winning security and defense journalist.In June 1983...
The Art of Deception
Controlling the Human Element of Security
Kevin Mitnick - Oct 17, 2003 (first published in 2001)
Goodreads Rating
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has t...
Recommended by
Ben Goldacre
The Code Book by Simon Singh
Hacked Again by Scott N. Schober
The Hacker Playbook by Peter Kim
The Art of Invisibility by Kevin Mitnick
We Are Anonymous by Parmy Olson
Cyber War by Richard A. Clarke
The Cuckoo's Egg by Cliff Stoll
Hacking by Jon Erickson
The Web Application Hacker's Handbook by Dafydd Stuttard
Penetration Testing by Georgia Weidman
The Secret to Cybersecurity by Scott Augenbaum
Applied Network Security Monitoring by Chris Sanders
Tribe of Hackers by Marcus J. Carey
Cybersecurity – Attack and Defense Strategies by Yuri Diogenes
Cybersecurity Essentials by Charles J. Brooks
Network Security Assessment by Chris McNab
Protecting Your Internet Identity by Ted Claypoole
Kingpin by Kevin Poulsen
A Bug Hunter's Diary by Tobias Klein
The CERT Guide to Insider Threats by Dawn M. Cappelli
The Phoenix Project by Gene Kim
The DevOps Handbook by Gene Kim
CompTIA Security+ Get Certified Get Ahead by Darril Gibson
Applied Cryptography by Bruce Schneier
The Hacker Playbook 2 by Peter Kim
Blue Team Field Manual by Alan J White
Windows Internals, Part 1 by Mark E. Russinovich
The IDA Pro Book by Chris Eagle
Black Hat Python by Justin Seitz
The Tao of Network Security Monitoring by Richard Bejtlich
Reversing by Eldad Eilam
Thinking Security by Steven M. Bellovin
Cybersecurity by Rob Arnold
Information Assurance Handbook by Corey Schou
Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado
The Social Engineer's Playbook by Jeremiah Talamantes
The Computer Incident Response Planning Handbook by N.K. McCarthy
Data and Goliath by Bruce Schneier
Cybersecurity Blue Team Toolkit by Nadean H. Tanner
Cybersecurity for Beginners by Raef Meeuwisse
Future Crimes by Marc Goodman
The Art of Computer Virus Research and Defense by Peter Szor
Online Danger by Dr. Eric Cole
American Kingpin by Nick Bilton
Team of Teams by Gen. Stanley McChrystal
Ready Player One by Ernest Cline
Cryptonomicon by Neal Stephenson
Sandworm by Andy Greenberg
Modern Operating Systems by Andrew S. Tanenbaum
Cyber Minds by Shira Rubinoff
Judgment Under Uncertainty by Daniel Kahneman
The Perfect Weapon by David E. Sanger
Rtfm by Ben Clark
One Plus One Equals Three by Dave Trott
The Codebreakers by David Kahn
Exploding the Phone by Phil Lapsley
TCP/IP Illustrated, Volume 1 by Kevin R. Fall
Bulletproof SSL and TLS by Ivan Ristic
The Art of Memory Forensics by Michael Hale Ligh
Silence on the Wire by Michal Zalewski
Advanced Penetration Testing by Wil Allsopp
CISSP All-in-One Exam Guide by Shon Harris
Understanding Cryptography by Christof Paar
Malware Analyst's Cookbook by Michael Ligh
How to Measure Anything in Cybersecurity Risk by Douglas W. Hubbard
Incident Response & Computer Forensics by Jason T. Luttgens
How to Hack Like a PORNSTAR by Sparc FLOW
The Shellcoder's Handbook by Chris Anley
Extrusion Detection by Richard Bejtlich
Metasploit by David Kennedy
Attacking Network Protocols by James Forshaw
How to Hack Like a GOD by Sparc FLOW
The Browser Hacker's Handbook by Wade Alcorn
You'll see this message when it is too late by Josephine Wolff
Women Know Cyber by Steve Morgan
Cybersecurity Leadership by Mansur Hasib
Magnetic Hiring by Renee Brown Small
CCNA Cyber OpsOfficial Cert Guide Library by Omar Santos
The Cybersecurity Dilemma by Ben Buchanan
Cryptography Apocalypse by Roger A. Grimes
Inside the Security Mind by Kevin Day
Learn Social Engineering by Dr. Erdal Ozkaya
Visible Ops Security by Gene Kim
CISO Desk Reference Guide by Bill Bonney
Wiring Up The Big Brother Machine...And Fighting It by Mark Klein
Cyber Security for Seniors by Dr. Steve Krantz
Zero Trust Networks by Evan Gilman
Practical Packet Analysis by Chris Sanders
World-Class Risk Management by Norman Marks