Discover new books on Goodreads
Meet your next favorite book
Score
A book’s total score is based on multiple factors, including the number of people who have voted for it and how highly those voters ranked the book.
| 1 |
The Pentester BluePrint: Starting a Career as an Ethical Hacker
by
Phillip L. Wylie (Goodreads Author)
4.16 avg rating — 223 ratings
score: 100,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 2 |
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
by
4.18 avg rating — 55 ratings
score: 99,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 3 |
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
by
Marcus J. Carey (Goodreads Author)
3.89 avg rating — 257 ratings
score: 98,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 4 |
The Art of Deception: Controlling the Human Element of Security
by
3.76 avg rating — 7,225 ratings
score: 97,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 5 |
Social Engineering: The Science of Human Hacking
by
3.83 avg rating — 3,876 ratings
score: 96,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 6 |
The Art of Attack: Attacker Mindset for Security Professionals
by
3.79 avg rating — 66 ratings
score: 95,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 7 |
Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition
by
3.93 avg rating — 1,793 ratings
score: 94,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 8 |
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
by
3.78 avg rating — 1,467 ratings
score: 93,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 9 |
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
by
3.91 avg rating — 3,591 ratings
score: 92,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 10 |
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto
by
4.10 avg rating — 42 ratings
score: 91,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 11 |
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
by
3.79 avg rating — 28 ratings
score: 90,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 12 |
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership
by
Marcus J. Carey (Goodreads Author)
4.26 avg rating — 31 ratings
score: 89,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 13 |
Unauthorised Access: Physical Penetration Testing for IT Security Teams
by
3.85 avg rating — 136 ratings
score: 88,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 14 |
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
by
4.34 avg rating — 125 ratings
score: 87,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 15 |
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
by
4.21 avg rating — 184 ratings
score: 86,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 16 |
Cryptography Engineering: Design Principles and Practical Applications
by
4.21 avg rating — 406 ratings
score: 85,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 17 |
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
by
4.05 avg rating — 155 ratings
score: 84,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 18 |
Hacking Multifactor Authentication
by
4.30 avg rating — 20 ratings
score: 83,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 19 |
Cybersecurity and Third-Party Risk: Third Party Threat Hunting
by
3.50 avg rating — 12 ratings
score: 82,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 20 |
Kali Linux Penetration Testing Bible
by
4.20 avg rating — 25 ratings
score: 81,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 21 |
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity
by
Marcus J. Carey (Goodreads Author)
3.93 avg rating — 46 ratings
score: 80,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 22 |
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
by
Marcus J. Carey (Goodreads Author)
3.88 avg rating — 67 ratings
score: 79,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 23 |
Cybersecurity Blue Team Toolkit
by
3.67 avg rating — 42 ratings
score: 78,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 24 |
Threat Modeling: Designing for Security
by
Adam Shostack (Goodreads Author)
4.08 avg rating — 287 ratings
score: 77,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 25 |
Applied Cryptography: Protocols, Algorithms, and Source Code in C
by
4.21 avg rating — 2,135 ratings
score: 76,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 26 |
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
by
4.23 avg rating — 1,227 ratings
score: 75,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
|
| 27 |
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
by
really liked it 4.00 avg rating — 45 ratings
score: 74,
and
1 person voted
|
Error rating book. Refresh and try again.
Rate this book
Clear rating
|
Like
Lists are re-scored approximately every 5 minutes.
People Who Voted On This List (1)
Helmut
5 books
0 friends
0 friends
Anyone can add books to this list.
How to Vote
To vote on existing books from the list, beside each book there is a link vote for this book clicking it will add that book to your votes.
To vote on books not in the list or books you couldn't find in the list, you can click on the tab add books to this list and then choose from your books, or simply search.


