💾 Archived View for gnebbia.net › misc › books › security.gmi captured on 2024-08-18 at 17:05:00. Gemini links have been rewritten to link to archived content
View Raw
More Information
⬅️ Previous capture (2023-01-29)
🚧 View Differences
-=-=-=-=-=-=-
Books about Computer Security
This is a collection of very good (from my point of view) material to
start or get better in different computer security areas.
I did this because although Internet is an amazing thing where you can
find tons of material, we have to admit that sometimes it can be very
difficult to tell apart good resources from bad ones.
Most of the material is listed in order of proficiency (or difficulty) in
a specific subject, so the first suggestion is generally the recommended
starting point.
Theoritical Foundations
- Security in Computing by Pfleeger et al.
- Foundations of Information Security by Jason Andress
- The Basics of Information Security by Jason Andress
- Security in Computing by Pfleeger
- Information Security by Mark Stamp
- Computer Security by Matt Bishop
- Computer Security: Principles and Practice by William Stallings
- Network Security Essentials: Applications and Standards by William Stallings
Network Security
- Network Security Assessment by Chris McNab
- The Hacker Playbook by Kim
- Linux Firewalls by Michael Rash
- The Cyber Plumber's Handbook by Brennon Thomas
- Practical Packet Analysis by Chris Sanders
- Nmap Network Scanning by Gordon Fyodor Lyon
- Rtfm: Red Team Field Manual by Ben Clark
- Hacking Windows: Ataques a sistemas y redes Microsoft by Carlos Garcia et al. (Spanish)
Web Application Security
- The Web Application Hacker's Handbook by Stuttard and Pinto
- Mastering Modern Web Penetration Testing by Prakhad Prasar
- OWASP Testing Guide
- AppSec by Tanya Janca [AppSec: Pushing Left like a boss](https://medium.com/bugbountywriteup/pushing-left-like-a-boss-table-of-contents-42fd063a75bb)
Wireless Security
- Wireless Communication Networks and Systems, Global Edition Beard & Stallings
- Kali Linux Wireless Penetration Testing Beginner's Guide by Buchanan and Ramachandran
- Kali Linux Wireless Penetration Testing Essentials by Marco Alamanni
- Wireless Network Security by Wolfgang Osterhage
Binary Exploitation
- The Art of Hacking by Ericksson
- Gray Hat Hacking by Regalado et al.
- The Shellcoder's Handbook by Chris Anley, John Heasman et al.
- Practical Binary Analysis by Dennis Andriesse
Other useful "web" resources:
Open Security Exploit 1
Open Security Exploit 2
SecurityTube Research Exploit
Exploit Dev Class
Reverse Engineering
- [Introduction to RE with r2](https://www.youtube.com/watch?v=LAkYW5ixvhg)
- [What can RE do for you? SHELLCON17](https://www.youtube.com/watch?v=rX7lIfQlqOo)
Malware Analysis
- Practical Malware Analysis
- The Malware Analyst's Cookbook
- Reversing: The Secrets of Reverse Engineering
Cryptography
- Serious Cryptography Jean-Philippe Aumasson
- Cryptography Engineering by Niels Ferguson
Cracking and Bruteforce
- Hash Crack: Password Cracking Manual (v3)
OSINT
- Open Source Intelligence Techniques by Michael Bazzell
- Hiding from the Internet: Eliminating Personal Online Information by Michael Bazzell
Social Engineering
- Social Engineering: The Art of Human Hacking by Christopher Hadnagy
- The Social Engineer's Playbook: A Practical Guide to Pretexting by Talamantes
- The Art of Intrusion by Kevin Mitnick and William L. Simon
- The Art of Deception by Kevin Mitnick and William L. Simon
IoT Security
- IoT Hackers Handbook by Aditya Gupta
- The Car Hacker's Handbook: A Guide for the Penetration Tester by Craig Smith
Other
- Threat Modeling: Designing for Security
- How to Measure Anything in Cybersecurity Risk by Hubbard et al.
- Effective Cybersecurity: A Guide to Using Best Practices and Standard by William Stallings
- Cybersecurity Blue Team Toolkit by Tanner