Best Cybersecurity Books
Stay ahead of digital threats with the most authoritative books on cybersecurity. Discover the titles most frequently recommended by industry experts and thought leaders in the field.
99 books on the list
Sort by
Number of Articles
Layout
Discover the crafty side of hacking with "Social Engineering: The Science of Human Hacking." Expert Christopher Hadnagy explains techniques used to gain access to sensitive spaces, relying on human faults rather than traditional hacking methods. Updated in the second edition with current methods and scientific studies, learn how to recognize, predict, and prevent social engineering tactics. Protect yourself and your company with effective counter-measures and stay ahead of even the most malicious social engineers with this essential guide.
Featured in 17 articles
Follow the escapades of a legendary hacker as he bypasses the security measures of big corporations like Sun Microsystems, Digital Equipment Corporation, and Nokia. In Ghost in the Wires, the author provides a first-hand account of his passion for trickery and adventure. This memoir offers a complete retelling of his exploits and is the most comprehensive book on the subject to date.
Featured in 16 articles
Countdown to Zero Day
Stuxnet and the Launch of the World's First Digital Weapon
Countdown to Zero Day explores the world of cyber warfare and tells the gripping story of the Stuxnet virus that sabotaged Iran’s nuclear efforts. Author Kim Zetter shows how a digital attack can be as destructive as a nuclear bomb and how vulnerable our critical systems are to similar attacks from nation-state adversaries and anonymous hackers. This eye-opening book also takes readers inside the flourishing zero-day “grey markets,” where intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. A comprehensive and prescient read for anyone interested in technology and security.
Featured in 15 articles
Recommended by
Mark RussinovichThe Art of Invisibility
The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Learn to protect yourself in the age of Big Brother and Big Data. In this explosive yet practical book, the world's most famous hacker illustrates what is happening without your knowledge, and teaches you "the art of invisibility." He provides both online and real life tactics and inexpensive methods to protect you and your family, including advanced "elite" techniques to maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.
Featured in 15 articles
Discover the art and science of hacking, from creative problem solving to exploiting programming weaknesses. This book teaches you the fundamentals of C programming from a hacker's perspective, while learning arcane hacking techniques. With access to a complete Linux programming and debugging environment, you'll dive into debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and even inventing new exploits. Learn to program computers, corrupt system memory, inspect processor registers, obstruct security measures, gain access to a remote server, and crack encrypted wireless traffic. Whether you're a seasoned hacker or new to programming, this book will take your skills to the next level.
Featured in 14 articles
Practical Malware Analysis
The Hands-On Guide to Dissecting Malicious Software
Discover the tools and techniques used by professional analysts to safely analyze, debug, and disassemble any malicious software that comes your way. Practical Malware Analysis teaches you how to overcome malware tricks and analyze special cases of malware with real-life examples. Hands-on labs challenge you to practice and synthesize your skills, ensuring you have what it takes to succeed in the ever-changing world of malware analysis.
Featured in 13 articles
This computer security book is a must-read for businesses and consumers alike. "Hacking Exposed 7" covers advanced persistent threats, wireless security, malware, and more to keep you up-to-date on the latest security measures. The book uses technical rigor and from-the-trenches experience to make computer technology usage and deployments safer and more secure. With a new "5 Deployments" approach and updated information on Microsoft Windows Server 2010, Cisco, and data theft, this book is a valuable tool for anyone interested in computer security.
Featured in 12 articles
Cult of the Dead Cow
How the Original Hacking Supergroup Might Just Save the World
Discover the untold story of America's most famous and respected hacker group - the Cult of the Dead Cow. These anonymous oddball characters invented hacktivism, created top password security tools, and contributed to developing the most important privacy tool on the net. Their members even include top executives walking the corridors of power in Washington and Silicon Valley, including Beto O'Rourke. This book delves into how governments and corporations came to have immense power over individuals and how we can fight back against them with technology.
Featured in 10 articles
Learn how to adopt a structured approach to threat modeling with this comprehensive guide, which covers all methods and is up-to-date with the latest threats. Whether you're a security professional, software developer or systems manager with security responsibilities, this jargon-free and accessible introduction provides actionable advice without being tied to specific software, operating systems or languages. With tools, frameworks and examples to follow, you can break away from a technology-centered way of thinking and focus on threats and effective operational countermeasures. Don't view software security as an afterthought - make it a priority.
Featured in 10 articles
The Code Book
The Science of Secrecy from Ancient Egypt to Quantum Cryptography
This fascinating book delves into the history of encryption, outlining its evolution and revealing the profound effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, to the Navajo Code Talkers, to the breakthrough that made internet commerce secure, The Code Book tells the story of secrecy as the most powerful intellectual weapon ever known. With in-depth technical explanations and portraits of notable figures, this book is both accessible and gripping, forever changing the reader's view of history and what drives it. It will make you wonder just how private your messages truly are.
Featured in 10 articles
The Web Application Hacker's Handbook by Dafydd Stuttard
The Hacker Playbook 3 by Peter Kim
The Cuckoo's Egg by Cliff Stoll
Cybersecurity Essentials by Charles J. Brooks
Sandworm by Andy Greenberg
Penetration Testing by Georgia Weidman
Cybersecurity – Attack and Defense Strategies by Yuri Diogenes, Erdal Ozkaya
Cybersecurity for Beginners by Raef Meeuwisse
The CERT Guide to Insider Threats by Dawn M. Cappelli
Spam Nation by Brian Krebs
Applied Cryptography by Bruce Schneier
The Practice of Network Security Monitoring by Richard Bejtlich
Dark Territory by Fred Kaplan
The Cyber Effect by Mary Aiken
The Hacker Playbook by Peter Kim
The Secret to Cybersecurity by Scott Augenbaum
Tribe of Hackers by Marcus J. Carey
The Art of Deception by Kevin Mitnick
Cyber War by Richard A. Clarke
CompTIA Security+ Get Certified Get Ahead by Darril Gibson
Future Crimes by Marc Goodman
The Pentester BluePrint by Phillip L. Wylie, Kim Crawley
The Fifth Domain by Richard A. Clarke, Robert K. Knake
Metasploit by David Kennedy
The Art of Memory Forensics by Michael Hale Ligh
Hacked Again by Scott N. Schober
Cybersecurity by Dr. Erdal Ozkaya
How to Measure Anything in Cybersecurity Risk by Douglas W. Hubbard
Applied Network Security Monitoring by Chris Sanders
Network Security Assessment by Chris McNab
We Are Anonymous by Parmy Olson
Mastering Hacking by Harsh Bothra
Permanent Record by Edward Snowden
Kingpin by Kevin Poulsen
Windows Internals, Part 1 by Pavel Yosifovich
Blue Team Field Manual by Alan J White
The Hacker Playbook 2 by Peter Kim
The Smartest Person in the Room by Christian Espinosa
Data and Goliath by Bruce Schneier
Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado
Cybersecurity Is Everybody's Business by Scott N. Schober, Craig W. Schober
The Tao of Network Security Monitoring by Richard Bejtlich
Cyber Wars by Charles Arthur
Defensive Security Handbook by Lee Brotherston
Cybersecurity Ops with Bash by Paul Troncone, Carl Albing Ph. D.
Protecting Your Internet Identity by Ted Claypoole
Effective Cybersecurity by William Stallings
Information Assurance Handbook by Schou Hernandez
Cybersecurity Blue Team Toolkit by Nadean H. Tanner
A Bug Hunter's Diary by Tobias Klein
Cybersecurity and Cyberwar by P. W. Singer
Security Metrics, A Beginner's Guide by Caroline Wong
Worm by Mark Bowden
The Phoenix Project by Gene Kim
The DevOps Handbook by Gene Kim
The Perfect Weapon by David E. Sanger
Alice and Bob Learn Application Security by Tanya Janca
Cyber Minds by Shira Rubinoff
The Hacker and the State by Ben Buchanan
Cybersecurity For Dummies by Joseph Steinberg
Blue Team Handbook by Don Murdoch GSE
Reversing by Eldad Eilam
The IDA Pro Book by Chris Eagle
Cyber Warfare – Truth, Tactics, and Strategies by Dr. Chase Cunningham
Cybersecurity for Beginners by Sam Grubb
Cryptography and Network Security by William Stallings
Hacking the Hacker by Roger A. Grimes
Hackable by Ted Harrington
CYBERSECURITY INCIDENT MANAGEMENT MASTERS GUIDE by Colby A Clark
Women Know Cyber by Steve Morgan
Comptia Security+ Guide to Network Security Fundamentals by Mark Ciampa
Advanced Penetration Testing by Wil Allsopp
Attacking Network Protocols by James Forshaw
Thinking Security by Steven M. Bellovin
The Social Engineer's Playbook by Jeremiah Talamantes
Android Security Internals by Nikolay Elenkov
Cybersecurity by Rob Arnold
Enterprise Cybersecurity in Digital Business by Ariel Evans
Cybersecurity Law by Shimon Brathwaite
The Art of Computer Virus Research and Defense by Peter Szor
The Computer Incident Response Planning Handbook by N. K. McCarthy
Network Security Through Data Analysis by Michael Collins
Gray Hat Hacking by Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, Moses Frost
Click Here to Kill Everybody by Bruce Schneier
Online Danger by Eric Cole
iOS Application Security by David Thiel
DarkMarket by Misha Glenny
Move Fast and Break Things by Jonathan Taplin
Hacking by Alan T. Norman