| 1 |
|
We Have Root: Even More Advice from Schneier on Security
by
3.55 avg rating — 75 ratings
|
|
| 2 |
|
Secrets and Lies: Digital Security in a Networked World
by
3.93 avg rating — 1,796 ratings
|
|
| 3 |
|
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
by
4.15 avg rating — 332 ratings
|
|
| 4 |
|
Threat Modeling: Designing for Security
by
4.07 avg rating — 288 ratings
|
|
| 5 |
|
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
by
4.06 avg rating — 157 ratings
|
|
| 6 |
|
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
by
4.20 avg rating — 183 ratings
|
|
| 7 |
|
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
by
4.34 avg rating — 125 ratings
|
|
| 8 |
|
Unauthorised Access: Physical Penetration Testing for IT Security Teams
by
3.85 avg rating — 136 ratings
|
|
| 9 |
|
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
by
3.91 avg rating — 3,599 ratings
|
|
| 10 |
|
Cryptography Engineering: Design Principles and Practical Applications
by
4.22 avg rating — 407 ratings
|
|
| 11 |
|
Social Engineering: The Science of Human Hacking
by
3.83 avg rating — 3,905 ratings
|
|
| 12 |
|
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
by
4.23 avg rating — 1,229 ratings
|
|
| 13 |
|
Applied Cryptography: Protocols, Algorithms, and Source Code in C
by
4.21 avg rating — 2,137 ratings
|
|
| 14 |
|
The Art of Deception: Controlling the Human Element of Security
by
3.77 avg rating — 7,248 ratings
|
|
| 15 |
|
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
by
3.79 avg rating — 1,470 ratings
|
|