Search for books, people and lists
Read This Twice
HomePeopleBooksLibrariesSign In

Best Cybersecurity Books

Recommendations from 43 articles, Kara Swisher, Ben Goldacre, Alexis Ohanian and 14 others.
Best Cybersecurity Books
83 books on the list
Sort by
Number of Articles
Ghost in the Wires book cover
Ghost in the Wires
My Adventures as the World's Most Wanted Hacker
Kevin Mitnick - 2012-04-24 (first published in 2011)
Goodreads Rating
If they were a hall of fame or shame for computer hackers, a Kevin Mitnick plaque would be mounted the near the entrance. While other nerds were fumbling with password possibilities, this adept break-artist was penetrating the digital secrets of Sun Microsystems, Digital Equipment Corporation, Nokia, Motorola, Pacific Bell, and other mammoth enterp...
Recommended by
Mark Russinovich
Social Engineering book cover
Social Engineering
The Science of Human Hacking
Christopher Hadnagy - 2018-07-31 (first published in 2010)
Goodreads Rating
Harden the human firewall against the most current threatsSocial Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in...
Hacking Exposed 7 book cover
Hacking Exposed 7
Network Security Secrets and Solutions
Stuart McClure - 2012-08-01 (first published in 2003)
Goodreads Rating
A fully updated edition of the world's bestselling computer security book "Hacking Exposed 7: Network Security Secrets and Solutions" is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wirel...
Countdown to Zero Day book cover
Countdown to Zero Day
Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter - 2015-09-01 (first published in 2014)
Goodreads Rating
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that ...
Recommended by
Mark Russinovich
Practical Malware Analysis book cover
Practical Malware Analysis
The Hands-On Guide to Dissecting Malicious Software
Michael Sikorski - 2012-02-01 (first published in 2011)
Goodreads Rating
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analys...
The Art of Invisibility book cover
The Art of Invisibility
The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Kevin Mitnick - 2019-09-10
Goodreads Rating
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data.Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismis...
The Code Book book cover
The Code Book
The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Simon Singh - 2000-08-29 (first published in 1999)
Goodreads Rating
In his first book since the bestselling Fermat’s Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, t...
The Hacker Playbook 3 book cover
The Hacker Playbook 3
Practical Guide To Penetration Testing
Peter Kim - 2018-05-02
Goodreads Rating
Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory. The main purpose of this book is to answer questions as to why things are still broken. For instance...
Cybersecurity – Attack and Defense Strategies book cover
Cybersecurity – Attack and Defense Strategies
Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals
Yuri Diogenes, Erdal Ozkaya - 2018-01-30
Goodreads Rating
Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT thre...
Threat Modeling book cover
Threat Modeling
Designing for Security
Adam Shostack - 2014-02-17
Goodreads Rating
The book is chock-full of specific and actionable advice, without being tied to specific software, operating systems or languages. For security professionals, the book provides the easiest way to adopt a structured approach to threat modeling. This approach is being promoted by Microsoft, and the book will provide the easiest way to understand the ...
Spam Nation book cover
Spam Nation
Brian Krebs - 2014-11-18
The Practice of Network Security Monitoring by Richard Bejtlich
The Hacker Playbook by Peter Kim
Cybersecurity Essentials by Charles J. Brooks
Hacking by Jon Erickson
Cybersecurity for Beginners by Raef Meeuwisse
Dark Territory by Fred Kaplan
The Art of Deception by Kevin Mitnick
The Secret to Cybersecurity by Scott Augenbaum
Hacked Again by Scott N. Schober
Applied Network Security Monitoring by Chris Sanders
Tribe of Hackers by Marcus J. Carey
Network Security Assessment by Chris McNab
We Are Anonymous by Parmy Olson
The CERT Guide to Insider Threats by Dawn M. Cappelli
Cult of the Dead Cow by Joseph Menn
Cyber War by Richard A. Clarke
The Cuckoo's Egg by Cliff Stoll
Sandworm by Andy Greenberg
CompTIA Security+ Get Certified Get Ahead by Darril Gibson
The Web Application Hacker's Handbook by Dafydd Stuttard
The Hacker Playbook 2 by Peter Kim
Penetration Testing by Georgia Weidman
The Tao of Network Security Monitoring by Richard Bejtlich
Effective Cybersecurity by William Stallings
Protecting Your Internet Identity by Ted Claypoole
Windows Internals, Part 1 by Pavel Yosifovich
Kingpin by Kevin Poulsen
Cybersecurity Blue Team Toolkit by Nadean H. Tanner
Information Assurance Handbook by Schou Hernandez
The Fifth Domain by Richard A. Clarke, Robert K. Knake
The Art of Memory Forensics by Michael Hale Ligh
Online Danger by Eric Cole
A Bug Hunter's Diary by Tobias Klein
Cybersecurity and Cyberwar by P. W. Singer
The Cyber Effect by Mary Aiken
Security Metrics, A Beginner's Guide by Caroline Wong
Worm by Mark Bowden
Permanent Record by Edward Snowden
The Phoenix Project by Gene Kim
Cyber Minds by Shira Rubinoff
The Perfect Weapon by David E. Sanger
The DevOps Handbook by Gene Kim
Blue Team Field Manual by Alan J White
Advanced Penetration Testing by Wil Allsopp
The IDA Pro Book by Chris Eagle
How to Measure Anything in Cybersecurity Risk by Douglas W. Hubbard
Black Hat Python by Justin Seitz
Reversing by Eldad Eilam
Attacking Network Protocols by James Forshaw
Women Know Cyber by Steve Morgan
Thinking Security by Steven M. Bellovin
Cybersecurity by Rob Arnold
Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado
The Social Engineer's Playbook by Jeremiah Talamantes
Defensive Security Handbook by Lee Brotherston
Alice and Bob Learn Application Security by Tanya Janca
The Computer Incident Response Planning Handbook by N. K. McCarthy
Applied Cryptography by Bruce Schneier
Future Crimes by Marc Goodman
Blue Team Handbook by Don Murdoch GSE
Data and Goliath by Bruce Schneier
The Smartest Person in the Room by Christian Espinosa
Cybersecurity by Dr. Erdal Ozkaya
Cyber Warfare – Truth, Tactics, and Strategies by Dr. Chase Cunningham
Cybersecurity Is Everybody's Business by Scott N. Schober, Craig W. Schober
Cybersecurity Ops with Bash by Paul Troncone, Carl Albing Ph. D.
Hackable by Ted Harrington
Cybersecurity Law by Shimon Brathwaite
The Art of Computer Virus Research and Defense by Peter Szor
Network Security Through Data Analysis by Michael Collins
DarkMarket by Misha Glenny
Move Fast and Break Things by Jonathan Taplin