Discover new books on Goodreads
Meet your next favorite book
      The best books for defending a network.
DFIR, Threat Intelligence, Security Operations, Threat Hunting, NSM, Pentesting, Malware Analysis, Programming
  DFIR, Threat Intelligence, Security Operations, Threat Hunting, NSM, Pentesting, Malware Analysis, Programming
Score
A book’s total score is based on multiple factors, including the number of people who have voted for it and how highly those voters ranked the book.
| 1 | Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software by 
          
                 4.48 avg rating — 606 ratings
          
         
            
              score: 199,
              and
              2 people voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 2 | The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler by 
          
                 4.29 avg rating — 176 ratings
          
         
            
              score: 180,
              and
              2 people voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 3 | Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation by 
          
                 4.05 avg rating — 155 ratings
          
         
            
              score: 169,
              and
              2 people voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 4 | Incident Response & Computer Forensics, Third Edition by 
          
                 4.33 avg rating — 112 ratings
          
         
            
              score: 100,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 5 | The Practice of Network Security Monitoring: Understanding Incident Detection and Response by 
Richard Bejtlich (Goodreads Author)
 
          
                 4.06 avg rating — 262 ratings
          
         
            
              score: 98,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 6 | Applied Network Security Monitoring: Collection, Detection, and Analysis by 
          
                 4.20 avg rating — 64 ratings
          
         
            
              score: 97,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 7 | Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by 
          
                 4.03 avg rating — 549 ratings
          
         
            
              score: 96,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 8 | The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws by 
          
                 4.23 avg rating — 1,223 ratings
          
         
            
              score: 95,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 9 | Gray Hat Python: Python Programming for Hackers and Reverse Engineers by 
          
                 3.94 avg rating — 323 ratings
          
         
            
              score: 94,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 10 | Social Engineering by 
          
                 3.83 avg rating — 3,858 ratings
          
         
            
              score: 93,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 11 | Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions by 
          
                 3.57 avg rating — 30 ratings
          
         
            
              score: 92,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 12 | Hacking Exposed 7: Network Security Secrets and Solutions by 
          
                 3.80 avg rating — 1,164 ratings
          
         
            
              score: 91,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 13 | Network Forensics: Tracking Hackers through Cyberspace by 
          
                 4.21 avg rating — 68 ratings
          
         
            
              score: 90,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 14 | Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks by 
          
                 4.21 avg rating — 467 ratings
          
         
            
              score: 89,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 15 | Agent Storm: My Life Inside al Qaeda and the CIA by 
          
                 4.01 avg rating — 1,962 ratings
          
         
            
              score: 88,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 16 | Terrorism and Counterintelligence: How Terrorist Groups Elude Detection by 
          
                 4.23 avg rating — 26 ratings
          
         
            
              score: 87,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 17 | Chinese intelligence operations by 
Nicholas Eftimiades (Goodreads Author)
 
          
                 3.72 avg rating — 102 ratings
          
         
            
              score: 86,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 18 | The Art of Intelligence by 
          
                 3.84 avg rating — 3,144 ratings
          
         
            
              score: 85,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 19 | The Black Banners: The Inside Story of 9/11 and the War Against al-Qaeda by 
          
                 4.27 avg rating — 2,876 ratings
          
         
            
              score: 84,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 20 | See No Evil: The True Story of a Ground Soldier in the CIA's War on Terrorism by 
          
                 3.94 avg rating — 5,192 ratings
          
         
            
              score: 83,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 21 | Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer by 
          
                 3.87 avg rating — 239 ratings
          
         
            
              score: 82,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 22 | The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System by 
          
                 4.11 avg rating — 120 ratings
          
         
            
              score: 80,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 23 | Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel by 
          
                 4.11 avg rating — 164 ratings
          
         
            
              score: 79,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 24 | Black Hat Python: Python Programming for Hackers and Pentesters by 
          
                 4.12 avg rating — 607 ratings
          
         
            
              score: 78,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 25 | Digital Forensics with Open Source Tools by 
          
                 4.23 avg rating — 61 ratings
          
         
            
              score: 77,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 26 | File System Forensic Analysis by 
          
                 4.28 avg rating — 186 ratings
          
         
            
              score: 76,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 27 | Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8 by 
          
                 4.07 avg rating — 15 ratings
          
         
            
              score: 75,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 28 | Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry by 
          
                 4.22 avg rating — 46 ratings
          
         
            
              score: 74,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 29 | Offensive Countermeasures: The Art of Active Defense by 
          
                 4.14 avg rating — 103 ratings
          
         
            
              score: 73,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 30 | Real Digital Forensics: Computer Security and Incident Response by 
          
                 4.20 avg rating — 93 ratings
          
         
            
              score: 72,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 31 | The Tangled Web: A Guide to Securing Modern Web Applications by 
          
                 4.04 avg rating — 553 ratings
          
         
            
              score: 71,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 32 | The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory by 
          
                 4.34 avg rating — 125 ratings
          
         
            
              score: 70,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 33 | Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code by 
          
                 4.21 avg rating — 184 ratings
          
         
            
              score: 68,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 34 | Reversing: Secrets of Reverse Engineering by 
          
                 4.09 avg rating — 545 ratings
          
         
            
              score: 67,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | |
| 35 | Windows Internals: Covering Windows Server 2008 and Windows Vista by 
          
                 4.49 avg rating — 178 ratings
          
         
            
              score: 66,
              and
              1 person voted   | 
Error rating book. Refresh and try again.
 Rate this book Clear rating | 
People Who Voted On This List (3)
Anyone can add books to this list.
How to Vote
To vote on existing books from the list, beside each book there is a link vote for this book clicking it will add that book to your votes.
To vote on books not in the list or books you couldn't find in the list, you can click on the tab add books to this list and then choose from your books, or simply search.

 Sign in with Facebook
Sign in with Facebook
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 




