Challenge Faves
  • Home
  • My Books
  • Browse ▾
    • Recommendations
    • Choice Awards
    • Genres
    • Giveaways
    • New Releases
    • Lists
    • Explore
    • News & Interviews
    Genres
    • Art
    • Biography
    • Business
    • Children's
    • Christian
    • Classics
    • Comics
    • Cookbooks
    • Ebooks
    • Fantasy
    • Fiction
    • Graphic Novels
    • Historical Fiction
    • History
    • Horror
    • Memoir
    • Music
    • Mystery
    • Nonfiction
    • Poetry
    • Psychology
    • Romance
    • Science
    • Science Fiction
    • Self Help
    • Sports
    • Thriller
    • Travel
    • Young Adult
    • More Genres
  • Community ▾
    • Groups
    • Quotes
    • Ask the Author
  • Sign In
  • Join
Sign up
View profile
  • Profile
  • Friends
  • Groups
  • Discussions
  • Comments
  • Reading Challenge
  • Kindle Notes & Highlights
  • Quotes
  • Favorite genres
  • Friends’ recommendations
  • Account settings
  • Help
  • Sign out
  • Home
  • My Books
  • Browse ▾
    • Recommendations
    • Choice Awards
    • Genres
    • Giveaways
    • New Releases
    • Lists
    • Explore
    • News & Interviews
    Genres
    • Art
    • Biography
    • Business
    • Children's
    • Christian
    • Classics
    • Comics
    • Cookbooks
    • Ebooks
    • Fantasy
    • Fiction
    • Graphic Novels
    • Historical Fiction
    • History
    • Horror
    • Memoir
    • Music
    • Mystery
    • Nonfiction
    • Poetry
    • Psychology
    • Romance
    • Science
    • Science Fiction
    • Self Help
    • Sports
    • Thriller
    • Travel
    • Young Adult
    • More Genres
  • Community ▾
    • Groups
    • Quotes
    • Ask the Author
Discover new books on Goodreads
Meet your next favorite book
Facebook Sign in with Facebook
Sign in
options
Join Goodreads
Listopia

flag

Score

A book’s total score is based on multiple factors, including the number of people who have voted for it and how highly those voters ranked the book.

All Votes Add Books To This List
1
The Pentester BluePrint: St...
The Pentester BluePrint: Starting a Career as an Ethical Hacker
by
Phillip L. Wylie (Goodreads Author)

4.16 avg rating — 223 ratings
score: 100, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
2
Transformational Security A...
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
by
Perry Carpenter

4.18 avg rating — 55 ratings
score: 99, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
3
Tribe of Hackers: Cybersecu...
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
by
Marcus J. Carey (Goodreads Author)

3.89 avg rating — 257 ratings
score: 98, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
4
The Art of Deception: Contr...
The Art of Deception: Controlling the Human Element of Security
by
Kevin D. Mitnick

3.76 avg rating — 7,224 ratings
score: 97, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
5
Social Engineering: The Sci...
Social Engineering: The Science of Human Hacking
by
Christopher Hadnagy

3.83 avg rating — 3,876 ratings
score: 96, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
6
The Art of Attack: Attacker...
The Art of Attack: Attacker Mindset for Security Professionals
by
Maxie Reynolds

3.79 avg rating — 66 ratings
score: 95, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
7
Secrets and Lies: Digital S...
Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition
by
Bruce Schneier

3.93 avg rating — 1,793 ratings
score: 94, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
8
Liars and Outliers: Enablin...
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
by
Bruce Schneier

3.78 avg rating — 1,467 ratings
score: 93, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
9
The Art of Intrusion: The R...
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
by
Kevin D. Mitnick

3.91 avg rating — 3,591 ratings
score: 92, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
10
Cryptography Apocalypse: Pr...
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto
by
Roger A. Grimes

4.10 avg rating — 42 ratings
score: 91, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
11
Wireshark for Security Prof...
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
by
Jessey Bullock

3.79 avg rating — 28 ratings
score: 90, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
12
Tribe of Hackers Security L...
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership
by
Marcus J. Carey (Goodreads Author)

4.26 avg rating — 31 ratings
score: 89, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
13
Unauthorised Access: Physic...
Unauthorised Access: Physical Penetration Testing for IT Security Teams
by
Wil Allsopp

3.85 avg rating — 136 ratings
score: 88, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
14
The Art of Memory Forensics...
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
by
Michael Hale Ligh

4.34 avg rating — 125 ratings
score: 87, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
15
Malware Analyst's Cookbook ...
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
by
Michael Hale Ligh

4.21 avg rating — 184 ratings
score: 86, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
16
Cryptography Engineering: D...
Cryptography Engineering: Design Principles and Practical Applications
by
Niels Ferguson

4.21 avg rating — 406 ratings
score: 85, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
17
Practical Reverse Engineeri...
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
by
Bruce Dang

4.05 avg rating — 155 ratings
score: 84, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
18
Hacking Multifactor Authent...
Hacking Multifactor Authentication
by
Roger A. Grimes

4.30 avg rating — 20 ratings
score: 83, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
19
Cybersecurity and Third-Par...
Cybersecurity and Third-Party Risk: Third Party Threat Hunting
by
Gregory C. Rasner

3.50 avg rating — 12 ratings
score: 82, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
20
Kali Linux Penetration Test...
Kali Linux Penetration Testing Bible
by
Gus Khawaja

4.20 avg rating — 25 ratings
score: 81, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
21
Tribe of Hackers Blue Team:...
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity
by
Marcus J. Carey (Goodreads Author)

3.93 avg rating — 46 ratings
score: 80, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
22
Tribe of Hackers Red Team: ...
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
by
Marcus J. Carey (Goodreads Author)

3.88 avg rating — 67 ratings
score: 79, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
23
Cybersecurity Blue Team Too...
Cybersecurity Blue Team Toolkit
by
Nadean H Tanner

3.67 avg rating — 42 ratings
score: 78, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
24
Threat Modeling: Designing ...
Threat Modeling: Designing for Security
by
Adam Shostack (Goodreads Author)

4.08 avg rating — 288 ratings
score: 77, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
25
Applied Cryptography: Proto...
Applied Cryptography: Protocols, Algorithms, and Source Code in C
by
Bruce Schneier

4.21 avg rating — 2,136 ratings
score: 76, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
26
The Web Application Hacker'...
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
by
Dafydd Stuttard

4.23 avg rating — 1,227 ratings
score: 75, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
27
Investigating Cryptocurrenc...
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
by
Nick Furneaux

really liked it 4.00 avg rating — 45 ratings
score: 74, and 1 person votedLoading trans  
Error rating book. Refresh and try again.
Rate this book
Clear rating
1 of 5 stars2 of 5 stars3 of 5 stars4 of 5 stars5 of 5 stars
27 books · 1 voter · list created February 14th, 2022 by Helmut (votes) .
Like
Lists are re-scored approximately every 5 minutes.


People Who Voted On This List (1)

Helmut 5 books
0 friends



Post a comment »
Comments

No comments have been added yet.


post a comment »
Add a reference:
Book Author

Search for a book to add a reference

add:    link cover

Author:



add:    link photo



Add books from: My Books or a Search
You must have a goodreads account to vote.
Loading trans
Loading trans

Featured News & Interviews

The Most Read Books of the 2025 Reading Challenge
The Most Read Books of the 2025 Reading Challenge
Read »

More articles…
  • Create New List
  • All Lists
  • Lists I Created
  • Lists I've Voted On
  • Lists I've Liked

Anyone can add books to this list.

Saving Loading trans
My Votes

vote now


Friends Votes

get your friends to vote

How to Vote

To vote on existing books from the list, beside each book there is a link vote for this book clicking it will add that book to your votes.

To vote on books not in the list or books you couldn't find in the list, you can click on the tab add books to this list and then choose from your books, or simply search.

Company

  • About us
  • Careers
  • Terms
  • Privacy
  • Interest Based Ads
  • Ad Preferences
  • Help

Work with us

  • Authors
  • Advertise
  • Authors & ads blog

Connect

Goodreads on Facebook Goodreads on Twitter
Goodreads on Instagram Goodreads on LinkedIn
Download app for iOS Download app for Android
  • © 2025 Goodreads, Inc.
  • Mobile version

Welcome back. Just a moment while we sign you in to your Goodreads account.

Login animation