💾 Archived View for gnebbia.net › misc › books › security.gmi captured on 2023-04-26 at 13:13:24. Gemini links have been rewritten to link to archived content
View Raw
More Information
⬅️ Previous capture (2023-01-29)
➡️ Next capture (2024-08-18)
-=-=-=-=-=-=-
Books about Computer Security
This is a collection of very good (from my point of view) material to
start or get better in different computer security areas.
I did this because although Internet is an amazing thing where you can
find tons of material, we have to admit that sometimes it can be very
difficult to tell apart good resources from bad ones.
Most of the material is listed in order of proficiency (or difficulty) in
a specific subject, so the first suggestion is generally the recommended
starting point.
Theoritical Foundations
- The Basics of Information Security 2nd Edition by Jason Andres
- Information Security 2nd Edition by Mark Stamp
- Computer Security 2nd Edition by Matt Bishop
- Computer Security: Principles and Practice 4th Edition by William Stallings
- Network Security Essentials: Applications and Standards 6th Edition by William Stallings
Network Security
- Network Security Assessment 3rd Edition by Chris McNab
- The Hacker Playbook 3rd Edition by Kim
- Linux Firewalls by Michael Rash
- The Cyber Plumber's Handbook by Brennon Thomas
- Practical Packet Analysis 3rd Edition by Chris Sanders
- Nmap Network Scanning by Gordon Fyodor Lyon
- Rtfm: Red Team Field Manual by Ben Clark
- Hacking Windows: Ataques a sistemas y redes Microsoft by Carlos Garcia et al. (Spanish)
Web Application Security
- The Web Application Hacker's Handbook 2nd Edition by Stuttard and Pinto
- Mastering Modern Web Penetration Testing by Prakhad Prasar
- OWASP Testing Guide
- AppSec by Tanya Janca [AppSec: Pushing Left like a boss](https://medium.com/bugbountywriteup/pushing-left-like-a-boss-table-of-contents-42fd063a75bb)
Wireless Security
- Wireless Communication Networks and Systems, Global Edition Beard & Stallings
- Kali Linux Wireless Penetration Testing Beginner's Guide 3rd Edition by Buchanan and Ramachandran
- Kali Linux Wireless Penetration Testing Essentials by Marco Alamanni
- Wireless Network Security: 2nd Edition by Wolfgang Osterhage
Binary Exploitation
- The Art of Hacking 2nd Edition by Ericksson
- Gray Hat Hacking 5th Edition by Regalado et al.
- The Shellcoder's Handbook 2nd Edition by Chris Anley, John Heasman et al.
- Practical Binary Analysis by Dennis Andriesse
Other useful "web" resources:
Open Security Exploit 1
Open Security Exploit 2
SecurityTube Research Exploit
Exploit Dev Class
Reverse Engineering
- [Introduction to RE with r2](https://www.youtube.com/watch?v=LAkYW5ixvhg)
- [What can RE do for you? SHELLCON17](https://www.youtube.com/watch?v=rX7lIfQlqOo)
Malware Analysis
- Practical Malware Analysis
- The Malware Analyst's Cookbook
- Reversing: The Secrets of Reverse Engineering
Cryptography
- Serious Cryptography Jean-Philippe Aumasson
- Cryptography Engineering by Niels Ferguson
Cracking and Bruteforce
- Hash Crack: Password Cracking Manual (v3)
OSINT
- Open Source Intelligence Techniques by Michael Bazzell
- Hiding from the Internet: Eliminating Personal Online Information by Michael Bazzell
Social Engineering
- Social Engineering: The Art of Human Hacking by Christopher Hadnagy
- The Social Engineer's Playbook: A Practical Guide to Pretexting by Talamantes
- The Art of Intrusion by Kevin Mitnick and William L. Simon
- The Art of Deception by Kevin Mitnick and William L. Simon
IoT Security
- IoT Hackers Handbook by Aditya Gupta
- The Car Hacker's Handbook: A Guide for the Penetration Tester by Craig Smith
Other
- Threat Modeling: Designing for Security
- How to Measure Anything in Cybersecurity Risk by Hubbard et al.
- Effective Cybersecurity: A Guide to Using Best Practices and Standard by William Stallings
- Cybersecurity Blue Team Toolkit by Tanner