| 1 |
|
Red Team Field Manual
by
4.23 avg rating — 1,004 ratings
|
|
| 2 |
|
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
by
4.16 avg rating — 8,433 ratings
|
|
| 3 |
|
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
by
4.28 avg rating — 16,240 ratings
|
|
| 4 |
|
Blue Team Field Manual (BTFM) (Field Manual Series)
by
4.19 avg rating — 362 ratings
|
|
| 4 |
|
The Florentine Deception
by
3.78 avg rating — 362 ratings
|
|
| 6 |
|
Hackers: Heroes of the Computer Revolution
by
4.16 avg rating — 8,609 ratings
|
|
| 7 |
|
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
by
3.97 avg rating — 27,634 ratings
|
|
| 8 |
|
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
by
3.94 avg rating — 251 ratings
|
|
| 9 |
|
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
by
4.47 avg rating — 617 ratings
|
|
| 10 |
|
Hacking Exposed 7: Network Security Secrets and Solutions
by
3.80 avg rating — 1,164 ratings
|
|
| 11 |
|
Zero Ri$k
by
4.42 avg rating — 225 ratings
|
|
| 12 |
|
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
by
3.97 avg rating — 3,394 ratings
|
|
| 13 |
|
Zero Day (Jeff Aiken, #1)
by
3.57 avg rating — 5,914 ratings
|
|
| 14 |
|
Trojan Horse (Jeff Aiken, #2)
by
3.79 avg rating — 2,281 ratings
|
|
| 15 |
|
Rogue Code (Jeff Aiken, #3)
by
3.91 avg rating — 1,260 ratings
|
|
| 16 |
|
The World's Most Dangerous Geek: And More True Hacking Stories
by
3.59 avg rating — 2,061 ratings
|
|
| 17 |
|
Thinking Security: Stopping Next Year's Hackers (Addison-Wesley Professional Computing Series)
by
4.22 avg rating — 23 ratings
|
|
| 18 |
|
Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
by
3.71 avg rating — 3,102 ratings
|
|
| 19 |
|
The Tao Of Network Security Monitoring: Beyond Intrusion Detection
by
4.24 avg rating — 139 ratings
|
|
| 20 |
|
The Computer Incident Response Planning Handbook: Executable Plans For Protecting Information At Risk
by
3.80 avg rating — 15 ratings
|
|
| 21 |
|
Data-Driven Security: Analysis, Visualization and Dashboards
by
4.05 avg rating — 80 ratings
|
|
| 22 |
|
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
by
4.06 avg rating — 267 ratings
|
|
| 23 |
|
IT Auditing: Using Controls to Protect Information Assets
by
3.88 avg rating — 43 ratings
|
|
| 24 |
|
Network Security Through Data Analysis: Building Situational Awareness
by
3.88 avg rating — 50 ratings
|
|
| 25 |
|
Applied Network Security Monitoring: Collection, Detection, and Analysis
by
4.18 avg rating — 65 ratings
|
|
| 26 |
|
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
by
4.12 avg rating — 287 ratings
|
|
| 27 |
|
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies
by
4.14 avg rating — 28 ratings
|
|
| 28 |
|
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations
by
4.03 avg rating — 29 ratings
|
|
| 29 |
|
Cybersecurity and Cyberwar: What Everyone Needs to Know
by
3.83 avg rating — 1,417 ratings
|
|
| 30 |
|
Operation Desolation: The Case of the Anonymous Bank Defacement
by
3.82 avg rating — 416 ratings
|
|
| 31 |
|
In the Plex: How Google Thinks, Works, and Shapes Our Lives
by
3.84 avg rating — 30,006 ratings
|
|
| 32 |
|
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age
by
4.04 avg rating — 1,615 ratings
|
|