Cyber Security Books

Showing 1-50 of 1,048
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Kindle Edition)
by (shelved 35 times as cyber-security)
avg rating 4.34 — 10,212 ratings — published 2019
Rate this book
Clear rating
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (Hardcover)
by (shelved 35 times as cyber-security)
avg rating 4.17 — 8,377 ratings — published 2014
Rate this book
Clear rating
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (Paperback)
by (shelved 33 times as cyber-security)
avg rating 4.28 — 16,139 ratings — published 1989
Rate this book
Clear rating
Hacking: The Art of Exploitation w/CD Hacking: The Art of Exploitation w/CD (Paperback)
by (shelved 31 times as cyber-security)
avg rating 4.17 — 2,517 ratings — published 2003
Rate this book
Clear rating
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (Hardcover)
by (shelved 27 times as cyber-security)
avg rating 3.97 — 27,558 ratings — published 2011
Rate this book
Clear rating
Social Engineering Social Engineering (Paperback)
by (shelved 26 times as cyber-security)
avg rating 3.83 — 3,916 ratings — published 2010
Rate this book
Clear rating
Rate this book
Clear rating
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race This Is How They Tell Me the World Ends: The Cyberweapons Arms Race (Hardcover)
by (shelved 24 times as cyber-security)
avg rating 4.31 — 11,373 ratings — published 2021
Rate this book
Clear rating
The Art of Deception: Controlling the Human Element of Security The Art of Deception: Controlling the Human Element of Security (Paperback)
by (shelved 23 times as cyber-security)
avg rating 3.76 — 7,265 ratings — published 2001
Rate this book
Clear rating
Metasploit: The Penetration Tester's Guide Metasploit: The Penetration Tester's Guide (Paperback)
by (shelved 20 times as cyber-security)
avg rating 4.07 — 870 ratings — published 2011
Rate this book
Clear rating
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door (Hardcover)
by (shelved 20 times as cyber-security)
avg rating 3.74 — 2,755 ratings — published 2014
Rate this book
Clear rating
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)
by (shelved 18 times as cyber-security)
avg rating 4.47 — 610 ratings — published 2011
Rate this book
Clear rating
Penetration Testing: A Hands-On Introduction to Hacking Penetration Testing: A Hands-On Introduction to Hacking (Paperback)
by (shelved 17 times as cyber-security)
avg rating 4.18 — 398 ratings — published 2014
Rate this book
Clear rating
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Paperback)
by (shelved 17 times as cyber-security)
avg rating 4.30 — 29,123 ratings — published 1999
Rate this book
Clear rating
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws (Paperback)
by (shelved 16 times as cyber-security)
avg rating 4.23 — 1,229 ratings — published 2007
Rate this book
Clear rating
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback)
by (shelved 16 times as cyber-security)
avg rating 3.91 — 3,606 ratings — published 2005
Rate this book
Clear rating
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali (Kindle Edition)
by (shelved 15 times as cyber-security)
avg rating 4.12 — 595 ratings — published 2018
Rate this book
Clear rating
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground (Hardcover)
by (shelved 15 times as cyber-security)
avg rating 3.97 — 8,091 ratings — published 2011
Rate this book
Clear rating
Dark Territory: The Secret History of Cyber War Dark Territory: The Secret History of Cyber War (Hardcover)
by (shelved 14 times as cyber-security)
avg rating 3.90 — 3,199 ratings — published 2016
Rate this book
Clear rating
Threat Modeling: Designing for Security Threat Modeling: Designing for Security (Kindle Edition)
by (shelved 14 times as cyber-security)
avg rating 4.07 — 286 ratings — published 2014
Rate this book
Clear rating
Black Hat Python: Python Programming for Hackers and Pentesters Black Hat Python: Python Programming for Hackers and Pentesters (Paperback)
by (shelved 14 times as cyber-security)
avg rating 4.11 — 618 ratings — published 2014
Rate this book
Clear rating
Red Team Field Manual Red Team Field Manual (Paperback)
by (shelved 13 times as cyber-security)
avg rating 4.23 — 1,002 ratings — published 2014
Rate this book
Clear rating
The Perfect Weapon: How the Cyber Arms Race Set the World Afire The Perfect Weapon: How the Cyber Arms Race Set the World Afire (Hardcover)
by (shelved 12 times as cyber-security)
avg rating 4.25 — 3,475 ratings — published 2018
Rate this book
Clear rating
Applied Cryptography: Protocols, Algorithms, and Source Code in C Applied Cryptography: Protocols, Algorithms, and Source Code in C (Hardcover)
by (shelved 12 times as cyber-security)
avg rating 4.21 — 2,135 ratings — published 1993
Rate this book
Clear rating
Hacking Exposed: Network Security Secrets & Solutions Hacking Exposed: Network Security Secrets & Solutions (Paperback)
by (shelved 12 times as cyber-security)
avg rating 3.80 — 1,165 ratings — published 2000
Rate this book
Clear rating
Cyberwar: The Next Threat to National Security & What to Do About It Cyberwar: The Next Threat to National Security & What to Do About It (Hardcover)
by (shelved 12 times as cyber-security)
avg rating 3.73 — 2,464 ratings — published 2010
Rate this book
Clear rating
Permanent Record Permanent Record (Hardcover)
by (shelved 11 times as cyber-security)
avg rating 4.30 — 58,385 ratings — published 2019
Rate this book
Clear rating
Secrets and Lies: Digital Security in a Networked World Secrets and Lies: Digital Security in a Networked World (Paperback)
by (shelved 11 times as cyber-security)
avg rating 3.93 — 1,795 ratings — published 2000
Rate this book
Clear rating
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency (Hardcover)
by (shelved 10 times as cyber-security)
avg rating 4.49 — 5,712 ratings — published
Rate this book
Clear rating
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World (Hardcover)
by (shelved 10 times as cyber-security)
avg rating 3.75 — 2,434 ratings — published 2019
Rate this book
Clear rating
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World Click Here to Kill Everybody: Security and Survival in a Hyper-connected World (Paperback)
by (shelved 10 times as cyber-security)
avg rating 3.83 — 1,110 ratings — published 2019
Rate this book
Clear rating
The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats (Hardcover)
by (shelved 9 times as cyber-security)
avg rating 4.02 — 824 ratings — published 2019
Rate this book
Clear rating
Future Crimes Future Crimes (Hardcover)
by (shelved 9 times as cyber-security)
avg rating 3.92 — 4,403 ratings — published 2015
Rate this book
Clear rating
How to Measure Anything in Cybersecurity Risk How to Measure Anything in Cybersecurity Risk (Hardcover)
by (shelved 9 times as cyber-security)
avg rating 4.06 — 381 ratings — published 2016
Rate this book
Clear rating
The Hacker Playbook: Practical Guide to Penetration Testing The Hacker Playbook: Practical Guide to Penetration Testing (Kindle Edition)
by (shelved 9 times as cyber-security)
avg rating 3.97 — 476 ratings — published 2014
Rate this book
Clear rating
Cryptography Engineering: Design Principles and Practical Applications Cryptography Engineering: Design Principles and Practical Applications (Paperback)
by (shelved 9 times as cyber-security)
avg rating 4.22 — 407 ratings — published 2010
Rate this book
Clear rating
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World (Paperback)
by (shelved 9 times as cyber-security)
avg rating 4.00 — 3,885 ratings — published 2015
Rate this book
Clear rating
The Shellcoder's Handbook: Discovering and Exploiting Security Holes The Shellcoder's Handbook: Discovering and Exploiting Security Holes (Paperback)
by (shelved 9 times as cyber-security)
avg rating 4.15 — 333 ratings — published 2004
Rate this book
Clear rating
The Hacker Playbook 3: Practical Guide To Penetration Testing The Hacker Playbook 3: Practical Guide To Penetration Testing (Kindle Edition)
by (shelved 8 times as cyber-security)
avg rating 4.40 — 262 ratings — published
Rate this book
Clear rating
Blue Team Field Manual (BTFM) (Field Manual Series) Blue Team Field Manual (BTFM) (Field Manual Series)
by (shelved 8 times as cyber-security)
avg rating 4.20 — 359 ratings — published
Rate this book
Clear rating
Security Engineering: A Guide to Building Dependable Distributed Systems Security Engineering: A Guide to Building Dependable Distributed Systems (Hardcover)
by (shelved 8 times as cyber-security)
avg rating 4.21 — 705 ratings — published
Rate this book
Clear rating
Gray Hat Hacking : The Ethical Hacker's Handbook Gray Hat Hacking : The Ethical Hacker's Handbook (Paperback)
by (shelved 8 times as cyber-security)
avg rating 4.09 — 542 ratings — published 2004
Rate this book
Clear rating
Liars and Outliers: Enabling the Trust that Society Needs to Thrive Liars and Outliers: Enabling the Trust that Society Needs to Thrive (Hardcover)
by (shelved 8 times as cyber-security)
avg rating 3.79 — 1,471 ratings — published 2012
Rate this book
Clear rating
Internet Internet (Hardcover)
by (shelved 7 times as cyber-security)
avg rating 4.10 — 2,061 ratings — published 2021
Rate this book
Clear rating
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics (Hardcover)
by (shelved 7 times as cyber-security)
avg rating 4.19 — 868 ratings — published 2020
Rate this book
Clear rating
The Pentester BluePrint: Starting a Career as an Ethical Hacker The Pentester BluePrint: Starting a Career as an Ethical Hacker (Paperback)
by (shelved 7 times as cyber-security)
avg rating 4.15 — 226 ratings — published 2020
Rate this book
Clear rating
Rate this book
Clear rating
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State (Hardcover)
by (shelved 7 times as cyber-security)
avg rating 4.07 — 15,146 ratings — published 2014
Rate this book
Clear rating
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder. Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder. (Paperback)
by (shelved 7 times as cyber-security)
avg rating 4.12 — 288 ratings — published 2014
Rate this book
Clear rating
The Practice of Network Security Monitoring: Understanding Incident Detection and Response The Practice of Network Security Monitoring: Understanding Incident Detection and Response (Paperback)
by (shelved 7 times as cyber-security)
avg rating 4.06 — 266 ratings — published 2013
Rate this book
Clear rating


Roger Spitz
“Every company needs to understand that info-ruption might affect them at any time.”
Roger Spitz, Disrupt With Impact: Achieve Business Success in an Unpredictable World

“Every new technology brings with it new risks, but the greatest risk of all is for me not to understand those risks.”
Timsux Wales

More quotes...