💾 Archived View for cldwrm.xyz › books › security.gmi captured on 2023-09-08 at 15:51:01. Gemini links have been rewritten to link to archived content
View Raw
More Information
⬅️ Previous capture (2023-01-29)
-=-=-=-=-=-=-
Computer Security
Back to book index
Assorted computing books
Security book lists
Andrew Case (@attrc) [http]
I've shamelessly borrowed quite a few entries from this one.
Easy Readin'
- 2014 - Singer - Cybersecurity and Cyberwar: What Everyone Needs to Know - For those who are really clueless
- 2019 - Andress - Foundations of Information Security
General
- 2021 - Chapple & Seidl - CompTIA Security+ Study Guide - Sybex
- 2020 - Andersson - Security Engineering
- 2018 - Bishop - Computer Security: Art and Science - Security research companion
- 2015 - Pfleeger et al. - Security in Computing
Crypto
- 2018 - Aumasson - Serious Cryptography
- 2010 - Ferguson et al. - Cryptography Engineering
Network Security
- 1994 - Cheswick & Bellovin - Firewalls and Internet Security
SSH
- 2005 - Barnett et al. - SSH, The Secure Shell
Web and AppSec
- 2020 - McDonald - Web Security for Developers
Cloud Security
- 2021 - Neto et al. - AWS Certified Security Study Guide - Sybex
- 2020 - Thompson - CCSK: Certified Cloud Security Knowledge - McGraw-Hill
- 2019 - Carter - CCSP: Certified Cloud Security Professional - McGraw-Hill
Software Security
- 2013 - Seacord - Secure Coding in C and C++
- 2006 - Dowd et al. - The Art of Software Security Assessment
- 2006 - McGraw - Software Security: Building Security In
- 2004 - Hoglund & McGraw - Exploting Software
- 2002 - Viega & McGraw - Building Secure Software
H4xx0ring books
General or Entry Level
- 2021 - Li - Bug Bounty Bootcamp
- 2020 - Hickey & Arcuri - Hands on Hacking
- 2018 - Kim - The Hacker Playbook 3: Practical Guide to Penetration Testing
- 2014 - Weidman - Penetration Testing: A Hands-On Introduction to Hacking
- 2011 - Kennedy et al. - Metasploit: The Penetration Tester's Guide
- 2006 - Skoudis & Liston - Counter Hack Reloaded
Learn You Some Linux
See the same heading in my computing list
- 2019 - OccupyTheWeb - Linux Basicis for Hackers
PoC || GTFO
- 2021 - Laphroaig - PoC || GTFO Vol. 3
- 2018 - Laphroaig - PoC || GTFO Vol. 2
- 2017 - Laphroaig - PoC || GTFO Vol. 1
Hacker Handbooks
- 2016 - Smith - The Car Hacker's Handbook
- 2014 - Alcorn et al - The Browser Hacker's Handbook
- 2011 - Stuttard & Pinto - The Web Application Hacker's Handbook
- 2007 - Anley et al - The Shellcoder's Handbook
- 2005 - Litchfield et al - The Database Hacker's Handbook
How to Hack Like X
The latest print editions I found.
- 2022 - Sparc Flow - How to Hack Like a Legend
- 2021 - Sparc Flow - How to Hack Like a Ghost
- 2021 - Sparc Flow - How to Hack Like a Pornstar
- 2017 - Sparc Flow - How to Hack Like a God
- 2017 - Sparc Flow - How to Investigate Like a Rockstar
Field Manuals
- 2017 - Clark & White - BTFM: Blue Team Field Manual (Blue not h4xx0r enough?)
- 2014 - Clark - RTFM: Red Team Field Manual
Coding
- 2016 - Andress - Coding for Penetration Testers
... of the Violent Sort
- 2021 - Seitz & Arnold - Black Hat Python
- 2020 - Steele et al. - Black Hat Go
- 2012 - O'Connor - Violent Python
Networks
- 2018 - Forshaw - Attacking Network Protocols
- 2017 - Sanders - Practical Packet Analysis
- 2016 - McNab - Network Security Assessment
- 2009 - Gordon - Nmap Network Scanning
- 2005 - Zalewski - Silence on the Wire
Web and AppSec
- 2021 - Madden - API Security in Action - Also applies to cloud hacking
- 2019 - Yaworski - Real-world Bug Hunting
Cloud Hacking
- 2020 - Helmus - AWS Penetration Testing - Packt, YMMV
- 2018 - Burrough - Pentesting Azure
Check out API security and web hacking as well.
Reversing, Binaries, and Similar Geekery
- 2022 - Harper et al. - Gray Hat Hacking
- 2020 - Eagle & Nance - The Ghidra Book
- 2019 - Andriesse - Practical Binary Analysis
- 2008 - Erickson - Hacking: The Art of Exploitation
- 2006 - Eilam - Reversing: Secrets of Reverse Engineering
Malware and Malware Analysis
- 2019 - Matrosov et al - Rootkits and Bootkits
- 2018 - Saxe & Sanders - Malware Data Science
- 2012 - Sikorksi & Honig - Practical Malware Analysis
Hardware
- 2017 - Huang - The Hardware Hacker
Social Engineering
- 2018 - Hadnagy - Social Engineering: The Science of Human Hacking
- 2002 - Mitnick & Simon - The Art of Deception