Hacking: The Art of Exploitation
The Art of Deception: Controlling the Human Element of Security
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Metasploit: The Penetration Tester's Guide
Rtfm: Red Team Field Manual
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Social Engineering: The Art of Human Hacking
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Secrets and Lies: Digital Security in a Networked World
Penetration Testing: A Hands-On Introduction to Hacking
The Hacker Playbook 2: Practical Guide To Penetration Testing
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
Security Engineering: A Guide to Building Dependable Distributed Systems
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
We’ve gone from a planet ruled by natural geography to political geography to kinetically functional geography to a cyber geography that is ruled by ideological variation rather than politically constructed boarders.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

Your ideas are bound to forces of which you have no control due to the fact that you've voluntarily submitted your freedom of though to the perception steering censorship of Google, Facebook and other dragnet surveillance capitalists.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

More quotes...
OWASP OpenSAMM Book Club This group is not affiliated with OWASP. List of books to facilitate the implementation of OpenS…more

2 members, last active one year ago

InfoSec Book Club A non-fiction book club for ethical hackers, infosec professionals and software engineers.

39 members, last active 6 months ago