Best Cybersecurity Books

83 books on the list
Sort by
Number of Articles
Layout
If they were a hall of fame or shame for computer hackers, a Kevin Mitnick plaque would be mounted the near the entrance. While other nerds were fumbling with password possibilities, this adept break-artist was penetrating the digital secrets of Sun Microsystems, Digital Equipment Corporation, Nokia, Motorola, Pacific Bell, and other mammoth enterp...
Featured in 10 articles
Recommended by
Mark RussinovichHarden the human firewall against the most current threatsSocial Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in...
Featured in 10 articles
A fully updated edition of the world's bestselling computer security book "Hacking Exposed 7: Network Security Secrets and Solutions" is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wirel...
Featured in 10 articles

Countdown to Zero Day
Stuxnet and the Launch of the World's First Digital Weapon
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that ...
Featured in 9 articles
Recommended by
Mark Russinovich
Practical Malware Analysis
The Hands-On Guide to Dissecting Malicious Software
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analys...
Featured in 8 articles

The Art of Invisibility
The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data.Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismis...
Featured in 8 articles

The Code Book
The Science of Secrecy from Ancient Egypt to Quantum Cryptography
In his first book since the bestselling Fermat’s Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, t...
Featured in 7 articles
Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory. The main purpose of this book is to answer questions as to why things are still broken. For instance...
Featured in 7 articles

Cybersecurity – Attack and Defense Strategies
Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals
Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT thre...
Featured in 7 articles
The book is chock-full of specific and actionable advice, without being tied to specific software, operating systems or languages. For security professionals, the book provides the easiest way to adopt a structured approach to threat modeling. This approach is being promoted by Microsoft, and the book will provide the easiest way to understand the ...
Featured in 7 articles
The Practice of Network Security Monitoring by Richard Bejtlich
Hacking by Jon Erickson
The Hacker Playbook by Peter Kim
Cybersecurity Essentials by Charles J. Brooks
Cybersecurity for Beginners by Raef Meeuwisse
Dark Territory by Fred Kaplan
The Art of Deception by Kevin Mitnick
The Secret to Cybersecurity by Scott Augenbaum
Hacked Again by Scott N. Schober
Applied Network Security Monitoring by Chris Sanders
Tribe of Hackers by Marcus J. Carey
Network Security Assessment by Chris McNab
We Are Anonymous by Parmy Olson
The CERT Guide to Insider Threats by Dawn M. Cappelli
Cult of the Dead Cow by Joseph Menn
Cyber War by Richard A. Clarke
The Cuckoo's Egg by Cliff Stoll
Sandworm by Andy Greenberg
CompTIA Security+ Get Certified Get Ahead by Darril Gibson
The Web Application Hacker's Handbook by Dafydd Stuttard
The Hacker Playbook 2 by Peter Kim
Penetration Testing by Georgia Weidman
The Art of Memory Forensics by Michael Hale Ligh
The Tao of Network Security Monitoring by Richard Bejtlich
Effective Cybersecurity by William Stallings
Protecting Your Internet Identity by Ted Claypoole
Windows Internals, Part 1 by Pavel Yosifovich
Kingpin by Kevin Poulsen
Cybersecurity Blue Team Toolkit by Nadean H. Tanner
Information Assurance Handbook by Schou Hernandez
The Fifth Domain by Richard A. Clarke, Robert K. Knake
Online Danger by Eric Cole
A Bug Hunter's Diary by Tobias Klein
Cybersecurity and Cyberwar by P. W. Singer
The Cyber Effect by Mary Aiken
Security Metrics, A Beginner's Guide by Caroline Wong
Worm by Mark Bowden
Permanent Record by Edward Snowden
The Phoenix Project by Gene Kim
The DevOps Handbook by Gene Kim
Cyber Minds by Shira Rubinoff
The Perfect Weapon by David E. Sanger
Applied Cryptography by Bruce Schneier
Blue Team Field Manual by Alan J White
Advanced Penetration Testing by Wil Allsopp
The IDA Pro Book by Chris Eagle
How to Measure Anything in Cybersecurity Risk by Douglas W. Hubbard
Black Hat Python by Justin Seitz
Reversing by Eldad Eilam
Attacking Network Protocols by James Forshaw
Women Know Cyber by Steve Morgan
Thinking Security by Steven M. Bellovin
Cybersecurity by Rob Arnold
Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado
The Social Engineer's Playbook by Jeremiah Talamantes
Defensive Security Handbook by Lee Brotherston
Alice and Bob Learn Application Security by Tanya Janca
The Computer Incident Response Planning Handbook by N. K. McCarthy
Data and Goliath by Bruce Schneier
Future Crimes by Marc Goodman
Blue Team Handbook by Don Murdoch GSE
The Smartest Person in the Room by Christian Espinosa
Cybersecurity by Dr. Erdal Ozkaya
Cyber Warfare – Truth, Tactics, and Strategies by Dr. Chase Cunningham
Cybersecurity Is Everybody's Business by Scott N. Schober, Craig W. Schober
Cybersecurity Ops with Bash by Paul Troncone, Carl Albing Ph. D.
Hackable by Ted Harrington
Cybersecurity Law by Shimon Brathwaite
The Art of Computer Virus Research and Defense by Peter Szor
Network Security Through Data Analysis by Michael Collins
DarkMarket by Misha Glenny
Move Fast and Break Things by Jonathan Taplin