Discover new books on Goodreads
Meet your next favorite book
Ultimate Network Defender
The best books for defending a network.
DFIR, Threat Intelligence, Security Operations, Threat Hunting, NSM, Pentesting, Malware Analysis, Programming
DFIR, Threat Intelligence, Security Operations, Threat Hunting, NSM, Pentesting, Malware Analysis, Programming
Score
A book’s total score is based on multiple factors, including the number of people who have voted for it and how highly those voters ranked the book.
1 |
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
by
4.48 avg rating — 606 ratings
score: 199,
and
2 people voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
2 |
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
by
4.29 avg rating — 176 ratings
score: 180,
and
2 people voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
3 |
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
by
4.05 avg rating — 154 ratings
score: 169,
and
2 people voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
4 |
Incident Response & Computer Forensics, Third Edition
by
4.33 avg rating — 112 ratings
score: 100,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
5 |
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
by
Richard Bejtlich (Goodreads Author)
4.06 avg rating — 262 ratings
score: 98,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
6 |
Applied Network Security Monitoring: Collection, Detection, and Analysis
by
4.20 avg rating — 64 ratings
score: 97,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
7 |
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
by
4.03 avg rating — 550 ratings
score: 96,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
8 |
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
by
4.23 avg rating — 1,222 ratings
score: 95,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
9 |
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
by
3.94 avg rating — 324 ratings
score: 94,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
10 |
Social Engineering
by
3.83 avg rating — 3,841 ratings
score: 93,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
11 |
Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions
by
3.57 avg rating — 30 ratings
score: 92,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
12 |
Hacking Exposed 7: Network Security Secrets and Solutions
by
3.80 avg rating — 1,165 ratings
score: 91,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
13 |
Network Forensics: Tracking Hackers through Cyberspace
by
4.21 avg rating — 66 ratings
score: 90,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
14 |
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
by
4.21 avg rating — 467 ratings
score: 89,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
15 |
Agent Storm: My Life Inside al Qaeda and the CIA
by
4.01 avg rating — 1,957 ratings
score: 88,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
16 |
Terrorism and Counterintelligence: How Terrorist Groups Elude Detection
by
4.23 avg rating — 26 ratings
score: 87,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
17 |
Chinese intelligence operations
by
Nicholas Eftimiades (Goodreads Author)
3.72 avg rating — 102 ratings
score: 86,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
18 |
The Art of Intelligence
by
3.84 avg rating — 3,126 ratings
score: 85,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
19 |
The Black Banners: The Inside Story of 9/11 and the War Against al-Qaeda
by
4.27 avg rating — 2,858 ratings
score: 84,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
20 |
See No Evil: The True Story of a Ground Soldier in the CIA's War on Terrorism
by
3.94 avg rating — 5,180 ratings
score: 83,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
21 |
Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer
by
3.87 avg rating — 238 ratings
score: 82,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
22 |
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
by
4.11 avg rating — 120 ratings
score: 80,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
23 |
Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel
by
4.11 avg rating — 164 ratings
score: 79,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
24 |
Black Hat Python: Python Programming for Hackers and Pentesters
by
4.11 avg rating — 602 ratings
score: 78,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
25 |
Digital Forensics with Open Source Tools
by
4.23 avg rating — 61 ratings
score: 77,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
26 |
File System Forensic Analysis
by
4.28 avg rating — 186 ratings
score: 76,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
27 |
Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8
by
4.07 avg rating — 15 ratings
score: 75,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
28 |
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
by
4.18 avg rating — 44 ratings
score: 74,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
29 |
Offensive Countermeasures: The Art of Active Defense
by
4.14 avg rating — 103 ratings
score: 73,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
30 |
Real Digital Forensics: Computer Security and Incident Response
by
4.20 avg rating — 93 ratings
score: 72,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
31 |
The Tangled Web: A Guide to Securing Modern Web Applications
by
4.05 avg rating — 552 ratings
score: 71,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
32 |
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
by
4.34 avg rating — 125 ratings
score: 70,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
33 |
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
by
4.21 avg rating — 184 ratings
score: 68,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
34 |
Reversing: Secrets of Reverse Engineering
by
4.09 avg rating — 546 ratings
score: 67,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
35 |
Windows Internals: Covering Windows Server 2008 and Windows Vista
by
4.49 avg rating — 178 ratings
score: 66,
and
1 person voted
![]() |
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
People Who Voted On This List (3)
Anyone can add books to this list.
How to Vote
To vote on existing books from the list, beside each book there is a link vote for this book clicking it will add that book to your votes.
To vote on books not in the list or books you couldn't find in the list, you can click on the tab add books to this list and then choose from your books, or simply search.