Infosec


Hacking: The Art of Exploitation w/CD
The Art of Deception: Controlling the Human Element of Security
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Social Engineering
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Red Team Field Manual
Penetration Testing: A Hands-On Introduction to Hacking
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Cities require connectivity rather than territory in order to drive their economic stability and growth.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

The hacker didn't succeed through sophistication. Rather he poked at obvious places, trying to enter through unlock doors. Persistence, not wizardry, let him through. ...more
Clifford Stoll, The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

More quotes...
OWASP OpenSAMM Book Club This group is not affiliated with OWASP. List of books to facilitate the implementation of Open…more
1 member, last active 9 years ago
Welcome to the Cyber Security Book Club — a community for infosec professionals, ethical hackers…more
2 members, last active 6 months ago
The Cybersecurity Book Club It's Goodreads' book club to discuss – online and in person – the best books on digital security…more
188 members, last active 3 months ago