Readers who enjoyed

Black Hat Python: Python Programming for Hackers and Pentesters
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Jus…
Rate it:

also enjoyed

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.…
Rate it:
The C Programming Language
4.44 avg. rating
· 10404 Ratings
This book is meant to help the reader learn how to program in C. It is the definitive reference guide, now in a second edition. Although the first edition was written in 1978, it continues to be a wor…
Rate it:
Black Hat Go: Go Programming For Hackers and Pentesters
Like the best-selling Black Hat Python , Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and autom…
Rate it:
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
Attacking Network Protocols is a deep dive into network protocol security from James -Forshaw, one of the world's leading bug -hunters. This comprehensive guide looks at networking from an attacker's …
Rate it:
Automate the Boring Stuff with Python: Practical Programming for Total Beginners
If you've ever spent hours renaming files or updating hundreds of spreadsheet cells, you know how tedious tasks like these can be. But what if you could have your computer do them for you?

In "Automate…
Rate it:
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking…
Rate it:
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
Stop manually analyzing binary! Practical Binary Analysis is the first book of its kind to present advanced binary analysis topics, such as binary instrumentation, dynamic taint analysis, and symbolic…
Rate it:
Penguin Random House Python Crash Course
4.35 avg. rating
· 2286 Ratings
Python Crash Course is a fast-paced, thorough introduction to programming with Python that will have you writing programs, solving problems, and making things that work in no time.

In the first half of…
Rate it:
Real-World Bug Hunting: A Field Guide to Web Hacking
Learn how people break websites and how you can, too.

Real-World Bug Hunting is the premier field guide to finding software bugs. Whether you're a cyber-security beginner who wants to make the internet…
Rate it:
Code: The Hidden Language of Computer Hardware and Software
What do flashlights, the British invasion, black cats, and seesaws have to do with computers? In CODE, they show us the ingenious ways we manipulate language and invent new means of communicating with…
Rate it:
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
Rootkits and Bootkits delivers a master class in malware evolution that will give you the techniques and tools necessary to counter sophisticated, advanced threats. We're talking hard stuff - attacks …
Rate it:
Designing Data-Intensive Applications
Data is at the center of many challenges in system design today. Difficult issues need to be figured out, such as scalability, consistency, reliability, efficiency, and maintainability. In addition, w…
Rate it:
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code ext…
Rate it:
Metasploit: The Penetration Tester's Guide
"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit ProjectThe Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painl…
Rate it:
Bug Bounty Bootcamp
4.51 avg. rating
· 106 Ratings
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You'll also learn how …
Rate it:
Malware Data Science: Attack Detection and Attribution
Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization.

Security has become a "big data" problem. The growth rate of malw…
Rate it:
The Linux Programming Interface: A Linux and UNIX System Programming Handbook
The Linux Programming Interface (TLPI) is the definitive guide to the Linux and UNIX programming interface—the interface employed by nearly every application that runs on a Linux or UNIX system.

In thi…
Rate it:
Grokking Algorithms An Illustrated Guide For Programmers and Other Curious People
An algorithm is nothing more than a step-by-step procedure for solving a problem. The algorithms you'll use most often as a programmer have already been discovered, tested, and proven. If you want to …
Rate it:
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teac…
Rate it:
Incident Response & Computer Forensics, Third Edition
The definitive guide to incident response--updated for the first time in a decade! Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensic…
Rate it:
The Pragmatic Programmer: From Journeyman to Master
Straight from the programming trenches, The Pragmatic Programmer cuts through the increasing specialization and technicalities of modern software development to examine the core process--taking a …
Rate it:
Hacking: The Art of Exploitation w/CD
4.16 avg. rating
· 1840 Ratings
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead…
Rate it:
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

If they were a hall of fame or shame for computer hackers, a Kevin Mitnick plaque would be mounted the near the entrance. While other nerds were fumbling with password possibilities, this adept break-…

Rate it:
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking A Practical Guide To Modern Web Pentesting emerges as an essential guide to mastering the art …
Rate it:
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide is both an encyclopedic and comprehensible guide to the TCP/IP protocol suite that will appeal to newcomers and the seasoned professional. It details the core protocols that make TCP/…
Rate it:
Penetration Testing: A Hands-On Introduction to Hacking
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate e…
Rate it:
The Pentester BluePrint: Starting a Career as an Ethical Hacker
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester Your Guide to Being a Pentester  offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hack…
Rate it:
HTTP: The Definitive Guide
4.14 avg. rating
· 271 Ratings
Behind every web transaction lies the Hypertext Transfer Protocol (HTTP) --- the language of web browsers and servers, of portals and search engines, of e-commerce and web services. Understanding HTTP…
Rate it:
Black Hat GraphQL: Attacking Next Generation APIs
Written by hackers for hackers, this hands-on book teaches penetration testers how to identify vulnerabilities in apps that use GraphQL, a data query and manipulation language for APIs adopted by majo…
Rate it:
Deep Learning with Python
4.55 avg. rating
· 1298 Ratings
Deep learning is applicable to a widening range of artificial intelligence problems, such as image classification, speech recognition, text classification, question answering, text-to-speech, and opti…
Rate it: