Computer Security Books

Showing 1-50 of 620
The Art of Deception: Controlling the Human Element of Security The Art of Deception: Controlling the Human Element of Security (Paperback)
by (shelved 14 times as computer-security)
avg rating 3.76 — 7,285 ratings — published 2001
Rate this book
Clear rating
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (Hardcover)
by (shelved 13 times as computer-security)
avg rating 3.97 — 27,726 ratings — published 2011
Rate this book
Clear rating
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (Hardcover)
by (shelved 12 times as computer-security)
avg rating 4.16 — 8,470 ratings — published 2014
Rate this book
Clear rating
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (Paperback)
by (shelved 12 times as computer-security)
avg rating 4.28 — 16,312 ratings — published 1989
Rate this book
Clear rating
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws (Paperback)
by (shelved 11 times as computer-security)
avg rating 4.23 — 1,230 ratings — published 2007
Rate this book
Clear rating
Secrets and Lies: Digital Security in a Networked World Secrets and Lies: Digital Security in a Networked World (Paperback)
by (shelved 10 times as computer-security)
avg rating 3.93 — 1,798 ratings — published 2000
Rate this book
Clear rating
Digital Fortress Digital Fortress (Paperback)
by (shelved 9 times as computer-security)
avg rating 3.71 — 669,542 ratings — published 1998
Rate this book
Clear rating
Hacking: The Art of Exploitation w/CD Hacking: The Art of Exploitation w/CD (Paperback)
by (shelved 9 times as computer-security)
avg rating 4.17 — 2,522 ratings — published 2003
Rate this book
Clear rating
Applied Cryptography: Protocols, Algorithms, and Source Code in C Applied Cryptography: Protocols, Algorithms, and Source Code in C (Hardcover)
by (shelved 9 times as computer-security)
avg rating 4.21 — 2,138 ratings — published 1993
Rate this book
Clear rating
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground (Hardcover)
by (shelved 8 times as computer-security)
avg rating 3.97 — 8,100 ratings — published 2011
Rate this book
Clear rating
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Kindle Edition)
by (shelved 7 times as computer-security)
avg rating 4.34 — 10,373 ratings — published 2019
Rate this book
Clear rating
Hacking Exposed: Network Security Secrets & Solutions Hacking Exposed: Network Security Secrets & Solutions (Paperback)
by (shelved 7 times as computer-security)
avg rating 3.80 — 1,165 ratings — published 2000
Rate this book
Clear rating
The Shellcoder's Handbook: Discovering and Exploiting Security Holes The Shellcoder's Handbook: Discovering and Exploiting Security Holes (Paperback)
by (shelved 7 times as computer-security)
avg rating 4.15 — 335 ratings — published 2004
Rate this book
Clear rating
Gray Hat Hacking : The Ethical Hacker's Handbook Gray Hat Hacking : The Ethical Hacker's Handbook (Paperback)
by (shelved 6 times as computer-security)
avg rating 4.09 — 543 ratings — published 2004
Rate this book
Clear rating
Cyberwar: The Next Threat to National Security & What to Do About It Cyberwar: The Next Threat to National Security & What to Do About It (Hardcover)
by (shelved 6 times as computer-security)
avg rating 3.73 — 2,470 ratings — published 2010
Rate this book
Clear rating
Metasploit: The Penetration Tester's Guide Metasploit: The Penetration Tester's Guide (Paperback)
by (shelved 6 times as computer-security)
avg rating 4.07 — 875 ratings — published 2011
Rate this book
Clear rating
Reversing: Secrets of Reverse Engineering Reversing: Secrets of Reverse Engineering (Paperback)
by (shelved 6 times as computer-security)
avg rating 4.09 — 551 ratings — published 2005
Rate this book
Clear rating
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World (Paperback)
by (shelved 5 times as computer-security)
avg rating 4.00 — 3,895 ratings — published 2015
Rate this book
Clear rating
Future Crimes Future Crimes (Hardcover)
by (shelved 5 times as computer-security)
avg rating 3.92 — 4,404 ratings — published 2015
Rate this book
Clear rating
The Tangled Web: A Guide to Securing Modern Web Applications The Tangled Web: A Guide to Securing Modern Web Applications (Paperback)
by (shelved 5 times as computer-security)
avg rating 4.04 — 557 ratings — published 2011
Rate this book
Clear rating
Hacker's Delight Hacker's Delight (Hardcover)
by (shelved 5 times as computer-security)
avg rating 4.20 — 1,139 ratings — published 2002
Rate this book
Clear rating
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)
by (shelved 5 times as computer-security)
avg rating 4.47 — 618 ratings — published 2011
Rate this book
Clear rating
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback)
by (shelved 5 times as computer-security)
avg rating 3.91 — 3,615 ratings — published 2005
Rate this book
Clear rating
Hacking APIs: Breaking Web Application Programming Interfaces Hacking APIs: Breaking Web Application Programming Interfaces (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.21 — 105 ratings — published
Rate this book
Clear rating
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.50 — 76 ratings — published
Rate this book
Clear rating
Security in Computing Security in Computing (Hardcover)
by (shelved 4 times as computer-security)
avg rating 3.71 — 196 ratings — published 1988
Rate this book
Clear rating
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.04 — 1,618 ratings — published 2001
Rate this book
Clear rating
Penetration Testing: A Hands-On Introduction to Hacking Penetration Testing: A Hands-On Introduction to Hacking (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.18 — 399 ratings — published 2014
Rate this book
Clear rating
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door (Hardcover)
by (shelved 4 times as computer-security)
avg rating 3.74 — 2,762 ratings — published 2014
Rate this book
Clear rating
Black Hat Python: Python Programming for Hackers and Pentesters Black Hat Python: Python Programming for Hackers and Pentesters (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.11 — 618 ratings — published 2014
Rate this book
Clear rating
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.04 — 554 ratings — published 2012
Rate this book
Clear rating
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Paperback)
by (shelved 4 times as computer-security)
avg rating 3.92 — 723 ratings — published 2011
Rate this book
Clear rating
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.35 — 428 ratings — published 2009
Rate this book
Clear rating
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency (Hardcover)
by (shelved 4 times as computer-security)
avg rating 3.97 — 3,399 ratings — published 2012
Rate this book
Clear rating
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Paperback)
by (shelved 4 times as computer-security)
avg rating 4.30 — 29,282 ratings — published 1999
Rate this book
Clear rating
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali (Kindle Edition)
by (shelved 3 times as computer-security)
avg rating 4.12 — 602 ratings — published 2018
Rate this book
Clear rating
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation (Paperback)
by (shelved 3 times as computer-security)
avg rating 3.91 — 132 ratings — published 2017
Rate this book
Clear rating
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World (Hardcover)
by (shelved 3 times as computer-security)
avg rating 3.75 — 2,466 ratings — published 2019
Rate this book
Clear rating
Permanent Record Permanent Record (Hardcover)
by (shelved 3 times as computer-security)
avg rating 4.30 — 58,819 ratings — published 2019
Rate this book
Clear rating
The Perfect Weapon: How the Cyber Arms Race Set the World Afire The Perfect Weapon: How the Cyber Arms Race Set the World Afire (Hardcover)
by (shelved 3 times as computer-security)
avg rating 4.25 — 3,498 ratings — published 2018
Rate this book
Clear rating
The Hacker Playbook 3: Practical Guide To Penetration Testing The Hacker Playbook 3: Practical Guide To Penetration Testing (Kindle Edition)
by (shelved 3 times as computer-security)
avg rating 4.40 — 263 ratings — published
Rate this book
Clear rating
Hacking For Dummies Hacking For Dummies (Paperback)
by (shelved 3 times as computer-security)
avg rating 3.65 — 398 ratings — published 2004
Rate this book
Clear rating
The Dark Net: Inside the Digital Underworld The Dark Net: Inside the Digital Underworld (Hardcover)
by (shelved 3 times as computer-security)
avg rating 3.64 — 5,039 ratings — published 2014
Rate this book
Clear rating
Gray Hat Python: Python Programming for Hackers and Reverse Engineers Gray Hat Python: Python Programming for Hackers and Reverse Engineers (Paperback)
by (shelved 3 times as computer-security)
avg rating 3.94 — 324 ratings — published 2008
Rate this book
Clear rating
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder. Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder. (Paperback)
by (shelved 3 times as computer-security)
avg rating 4.12 — 287 ratings — published 2014
Rate this book
Clear rating
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet (Hardcover)
by (shelved 3 times as computer-security)
avg rating 4.18 — 1,521 ratings — published 1967
Rate this book
Clear rating
Black Code: Inside the Battle for Cyberspace Black Code: Inside the Battle for Cyberspace (Hardcover)
by (shelved 3 times as computer-security)
avg rating 3.94 — 278 ratings — published 2011
Rate this book
Clear rating
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State (Hardcover)
by (shelved 3 times as computer-security)
avg rating 4.07 — 15,221 ratings — published 2014
Rate this book
Clear rating
The Browser Hacker's Handbook The Browser Hacker's Handbook (Kindle Edition)
by (shelved 3 times as computer-security)
avg rating 4.14 — 76 ratings — published 2014
Rate this book
Clear rating
Cryptography Engineering: Design Principles and Practical Applications Cryptography Engineering: Design Principles and Practical Applications (Paperback)
by (shelved 3 times as computer-security)
avg rating 4.22 — 409 ratings — published 2010
Rate this book
Clear rating


David Chiles
“Use Secure Sites: It is proper netiquette to use secure websites whenever possible. NetworkEtiquette.net”
David Chiles, The Principles Of Netiquette

“Computer hacking was like a chemical bond holding us all together.”
Rachel Zhang, The Emotional Embodiment of Stars

More quotes...