1
The Pentester BluePrint: St...

by
4.16 avg rating — 225 ratings
Rate this book
Clear rating
2
Transformational Security A...

by
4.20 avg rating — 56 ratings
Rate this book
Clear rating
3
Tribe of Hackers: Cybersecu...

by
3.90 avg rating — 263 ratings
Rate this book
Clear rating
4
The Art of Deception: Contr...

by
3.77 avg rating — 7,247 ratings
Rate this book
Clear rating
5
Social Engineering: The Sci...

by
3.83 avg rating — 3,902 ratings
Rate this book
Clear rating
6
The Art of Attack: Attacker...

by
3.80 avg rating — 70 ratings
Rate this book
Clear rating
7
Secrets and Lies: Digital S...

by
3.93 avg rating — 1,796 ratings
Rate this book
Clear rating
8
Liars and Outliers: Enablin...

by
3.78 avg rating — 1,469 ratings
Rate this book
Clear rating
9
The Art of Intrusion: The R...

by
3.91 avg rating — 3,600 ratings
Rate this book
Clear rating
10
Cryptography Apocalypse: Pr...

by
4.12 avg rating — 43 ratings
Rate this book
Clear rating
11
Wireshark for Security Prof...

by
3.79 avg rating — 28 ratings
Rate this book
Clear rating
12
Tribe of Hackers Security L...

by
4.26 avg rating — 31 ratings
Rate this book
Clear rating
13
Unauthorised Access: Physic...

by
3.85 avg rating — 136 ratings
Rate this book
Clear rating
14
The Art of Memory Forensics...

by
4.34 avg rating — 125 ratings
Rate this book
Clear rating
15
Malware Analyst's Cookbook ...

by
4.20 avg rating — 183 ratings
Rate this book
Clear rating
16
Cryptography Engineering: D...

by
4.22 avg rating — 407 ratings
Rate this book
Clear rating
17
Practical Reverse Engineeri...

by
4.06 avg rating — 157 ratings
Rate this book
Clear rating
18
Hacking Multifactor Authent...

by
4.30 avg rating — 20 ratings
Rate this book
Clear rating
19
Cybersecurity and Third-Par...

by
3.46 avg rating — 13 ratings
Rate this book
Clear rating
20
Kali Linux Penetration Test...

by
4.20 avg rating — 25 ratings
Rate this book
Clear rating
21
Tribe of Hackers Blue Team:...

by
3.94 avg rating — 47 ratings
Rate this book
Clear rating
22
Tribe of Hackers Red Team: ...

by
3.88 avg rating — 67 ratings
Rate this book
Clear rating
23
Cybersecurity Blue Team Too...

by
3.67 avg rating — 42 ratings
Rate this book
Clear rating
24
Threat Modeling: Designing ...

by
4.07 avg rating — 288 ratings
Rate this book
Clear rating
25
Applied Cryptography: Proto...

by
4.21 avg rating — 2,137 ratings
Rate this book
Clear rating
26
The Web Application Hacker'...

by
4.23 avg rating — 1,229 ratings
Rate this book
Clear rating
27
Investigating Cryptocurrenc...

by
4.02 avg rating — 46 ratings
Rate this book
Clear rating


No comments have been added yet.