| 1 |
|
Blue Team Field Manual (BTFM) (Field Manual Series)
by
4.19 avg rating — 357 ratings
Brandon
rated it 5 stars
See Review
|
|
| 2 |
|
Red Team Field Manual
by
4.22 avg rating — 998 ratings
Brandon
rated it 5 stars
See Review
|
|
| 3 |
|
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
by
3.97 avg rating — 3,375 ratings
Brandon
rated it 5 stars
See Review
|
|
| 4 |
|
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
by
4.17 avg rating — 8,290 ratings
Brandon
rated it 5 stars
See Review
|
|
| 5 |
|
Zero Day (Jeff Aiken, #1)
by
3.57 avg rating — 5,900 ratings
Brandon
rated it 5 stars
See Review
|
|
| 6 |
|
Trojan Horse (Jeff Aiken, #2)
by
3.80 avg rating — 2,272 ratings
Brandon
rated it 5 stars
See Review
|
|
| 7 |
|
Rogue Code (Jeff Aiken, #3)
by
3.91 avg rating — 1,252 ratings
Brandon
rated it 5 stars
See Review
|
|
| 8 |
|
Hackers: Heroes of the Computer Revolution
by
4.16 avg rating — 8,563 ratings
Brandon
rated it 5 stars
See Review
|
|
| 9 |
|
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
by
4.28 avg rating — 15,877 ratings
|
|
| 10 |
|
The World's Most Dangerous Geek: And More True Hacking Stories
by
3.60 avg rating — 2,037 ratings
|
|
| 11 |
|
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
by
3.97 avg rating — 27,359 ratings
Brandon
rated it 5 stars
See Review
|
|
| 12 |
|
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
by
3.93 avg rating — 249 ratings
|
|
| 13 |
|
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
by
4.47 avg rating — 603 ratings
|
|
| 14 |
|
Thinking Security: Stopping Next Year's Hackers (Addison-Wesley Professional Computing Series)
by
4.22 avg rating — 23 ratings
|
|
| 15 |
|
Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
by
3.71 avg rating — 3,098 ratings
Brandon
rated it 4 stars
See Review
|
|
| 16 |
|
Hacking Exposed 7: Network Security Secrets and Solutions
by
3.80 avg rating — 1,165 ratings
|
|
| 17 |
|
The Tao Of Network Security Monitoring: Beyond Intrusion Detection
by
4.27 avg rating — 138 ratings
|
|
| 18 |
|
The Computer Incident Response Planning Handbook: Executable Plans For Protecting Information At Risk
by
3.80 avg rating — 15 ratings
|
|
| 19 |
|
Data-Driven Security: Analysis, Visualization and Dashboards
by
4.05 avg rating — 80 ratings
|
|
| 20 |
|
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
by
4.06 avg rating — 266 ratings
|
|
| 21 |
|
IT Auditing: Using Controls to Protect Information Assets
by
3.88 avg rating — 43 ratings
|
|
| 22 |
|
Network Security Through Data Analysis: Building Situational Awareness
by
3.88 avg rating — 50 ratings
|
|
| 23 |
|
Applied Network Security Monitoring: Collection, Detection, and Analysis
by
4.18 avg rating — 65 ratings
|
|
| 24 |
|
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
by
4.12 avg rating — 286 ratings
|
|
| 25 |
|
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies
by
4.14 avg rating — 28 ratings
|
|
| 26 |
|
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations
by
4.03 avg rating — 29 ratings
Brandon
rated it 3 stars
See Review
|
|
| 27 |
|
Cybersecurity and Cyberwar: What Everyone Needs to Know
by
3.83 avg rating — 1,408 ratings
|
|
| 28 |
|
Operation Desolation: The Case of the Anonymous Bank Defacement
by
3.83 avg rating — 415 ratings
|
|
| 29 |
|
In the Plex: How Google Thinks, Works, and Shapes Our Lives
by
3.84 avg rating — 29,982 ratings
|
|
| 30 |
|
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age
by
4.04 avg rating — 1,604 ratings
|
|