| 1 |  | Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software by
 
 
          
                 4.48 avg rating — 606 ratings
          
         |  | 
        
  
  
  
      | 2 |  | The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler by
 
 
          
                 4.29 avg rating — 176 ratings
          
         |  | 
        
  
  
  
      | 3 |  | Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation by
 
 
          
                 4.05 avg rating — 155 ratings
          
         |  | 
        
  
  
  
      | 4 |  | Incident Response & Computer Forensics, Third Edition by
 
 
          
                 4.33 avg rating — 112 ratings
          
         |  | 
        
  
  
  
      | 5 |  | The Practice of Network Security Monitoring: Understanding Incident Detection and Response by
 
 
          
                 4.06 avg rating — 262 ratings
          
         |  | 
        
  
  
  
      | 6 |  | Applied Network Security Monitoring: Collection, Detection, and Analysis by
 
 
          
                 4.20 avg rating — 64 ratings
          
         |  | 
        
  
  
  
      | 7 |  | Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by
 
 
          
                 4.03 avg rating — 549 ratings
          
         |  | 
        
  
  
  
      | 8 |  | The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws by
 
 
          
                 4.23 avg rating — 1,223 ratings
          
         |  | 
        
  
  
  
      | 9 |  | Gray Hat Python: Python Programming for Hackers and Reverse Engineers by
 
 
          
                 3.94 avg rating — 323 ratings
          
         |  | 
        
  
  
  
      | 10 |  | Social Engineering by
 
 
          
                 3.83 avg rating — 3,858 ratings
          
         |  | 
        
  
  
  
      | 11 |  | Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions by
 
 
          
                 3.57 avg rating — 30 ratings
          
         |  | 
        
  
  
  
      | 12 |  | Hacking Exposed 7: Network Security Secrets and Solutions by
 
 
          
                 3.80 avg rating — 1,164 ratings
          
         |  | 
        
  
  
  
      | 13 |  | Network Forensics: Tracking Hackers through Cyberspace by
 
 
          
                 4.21 avg rating — 68 ratings
          
         |  | 
        
  
  
  
      | 14 |  | Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks by
 
 
          
                 4.21 avg rating — 467 ratings
          
         |  | 
        
  
  
  
      | 15 |  | Agent Storm: My Life Inside al Qaeda and the CIA by
 
 
          
                 4.01 avg rating — 1,962 ratings
          
         |  | 
        
  
  
  
      | 16 |  | Terrorism and Counterintelligence: How Terrorist Groups Elude Detection by
 
 
          
                 4.23 avg rating — 26 ratings
          
         |  | 
        
  
  
  
      | 17 |  | Chinese intelligence operations by
 
 
          
                 3.72 avg rating — 102 ratings
          
         |  | 
        
  
  
  
      | 18 |  | The Art of Intelligence by
 
 
          
                 3.84 avg rating — 3,144 ratings
          
         |  | 
        
  
  
  
      | 19 |  | The Black Banners: The Inside Story of 9/11 and the War Against al-Qaeda by
 
 
          
                 4.27 avg rating — 2,876 ratings
          
         |  | 
        
  
  
  
      | 20 |  | See No Evil: The True Story of a Ground Soldier in the CIA's War on Terrorism by
 
 
          
                 3.94 avg rating — 5,192 ratings
          
         |  | 
        
  
  
  
      | 21 |  | Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer by
 
 
          
                 3.87 avg rating — 239 ratings
          
         |  | 
        
  
  
  
      | 22 |  | The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System by
 
 
          
                 4.11 avg rating — 120 ratings
          
         |  | 
        
  
  
  
      | 23 |  | Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel by
 
 
          
                 4.11 avg rating — 164 ratings
          
         |  | 
        
  
  
  
      | 24 |  | Black Hat Python: Python Programming for Hackers and Pentesters by
 
 
          
                 4.12 avg rating — 607 ratings
          
         |  | 
        
  
  
  
      | 25 |  | Digital Forensics with Open Source Tools by
 
 
          
                 4.23 avg rating — 61 ratings
          
         |  | 
        
  
  
  
      | 26 |  | File System Forensic Analysis by
 
 
          
                 4.28 avg rating — 186 ratings
          
         |  | 
        
  
  
  
      | 27 |  | Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8 by
 
 
          
                 4.07 avg rating — 15 ratings
          
         |  | 
        
  
  
  
      | 28 |  | Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry by
 
 
          
                 4.22 avg rating — 46 ratings
          
         |  | 
        
  
  
  
      | 29 |  | Offensive Countermeasures: The Art of Active Defense by
 
 
          
                 4.14 avg rating — 103 ratings
          
         |  | 
        
  
  
  
      | 30 |  | Real Digital Forensics: Computer Security and Incident Response by
 
 
          
                 4.20 avg rating — 93 ratings
          
         |  | 
        
  
  
  
      | 31 |  | The Tangled Web: A Guide to Securing Modern Web Applications by
 
 
          
                 4.04 avg rating — 553 ratings
          
         |  | 
        
  
  
  
      | 32 |  | The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory by
 
 
          
                 4.34 avg rating — 125 ratings
          
         |  | 
        
  
  
  
      | 33 |  | Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code by
 
 
          
                 4.21 avg rating — 184 ratings
          
         |  | 
        
  
  
  
      | 34 |  | Reversing: Secrets of Reverse Engineering by
 
 
          
                 4.09 avg rating — 545 ratings
          
         |  | 
        
  
  
  
      | 35 |  | Windows Internals: Covering Windows Server 2008 and Windows Vista by
 
 
          
                 4.49 avg rating — 178 ratings
          
         |  |