Information Security

Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical).

The Art of Deception: Controlling the Human Element of Security
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Secrets and Lies: Digital Security in a Networked World
Social Engineering
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Security Engineering: A Guide to Building Dependable Distributed Systems
CISSP All-in-One Exam Guide
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
Hacking Exposed: Network Security Secrets & Solutions
Web Hacking Arsenal by Rafay  BalochSecurity Engineering by Ross J. AndersonIntroduction to Security and Applied Cryptography by Bruce SchneierPractical Malware Analysis by Michael SikorskiThe Web Application Hacker's Handbook by Dafydd Stuttard
Information Security
80 books — 79 voters

Web Hacking Arsenal by Rafay  BalochWeb Penetration Testing by Shubham  MishraConceal Reveal by Julie WillisShades of Mercy by Bruce BorgosThe Smartest Person in the Room by Christian Espinosa
Cyber security
10 books — 34 voters
Web Hacking Arsenal by Rafay  BalochAttacking Network Protocols by James ForshawPractical Malware Analysis by Michael SikorskiGame Hacking by Nick CanoHacking by Jon Erickson
No Starch Press
103 books — 24 voters


Every breach of security begins with a silent compromise of my trust.
Timsux Wales

Cyberthreat does not recognize socioeconomic discrimination.
Bradley B Dalina

More quotes...
A place for Security Weekly hosts, employees, and listeners to share book's that they have read.…more
5 members, last active 4 years ago
OWASP OpenSAMM Book Club This group is not affiliated with OWASP. List of books to facilitate the implementation of Open…more
1 member, last active 9 years ago