80 books
—
84 voters
Hacking Books
Showing 1-50 of 1,530
Hacking: The Art of Exploitation w/CD (Paperback)
by (shelved 107 times as hacking)
avg rating 4.17 — 2,500 ratings — published 2003
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (Hardcover)
by (shelved 98 times as hacking)
avg rating 3.97 — 27,281 ratings — published 2011
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (Paperback)
by (shelved 59 times as hacking)
avg rating 4.28 — 15,764 ratings — published 1989
Social Engineering (Paperback)
by (shelved 56 times as hacking)
avg rating 3.83 — 3,889 ratings — published 2010
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws (Paperback)
by (shelved 56 times as hacking)
avg rating 4.23 — 1,226 ratings — published 2007
The Art of Deception: Controlling the Human Element of Security (Paperback)
by (shelved 52 times as hacking)
avg rating 3.76 — 7,229 ratings — published 2001
Black Hat Python: Python Programming for Hackers and Pentesters (Paperback)
by (shelved 49 times as hacking)
avg rating 4.12 — 610 ratings — published 2014
Gray Hat Hacking : The Ethical Hacker's Handbook (Paperback)
by (shelved 49 times as hacking)
avg rating 4.09 — 538 ratings — published 2004
Hackers: Heroes of the Computer Revolution (Paperback)
by (shelved 48 times as hacking)
avg rating 4.16 — 8,549 ratings — published 1984
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback)
by (shelved 47 times as hacking)
avg rating 3.91 — 3,592 ratings — published 2005
Penetration Testing: A Hands-On Introduction to Hacking (Paperback)
by (shelved 42 times as hacking)
avg rating 4.17 — 393 ratings — published 2014
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data (Hardcover)
by (shelved 41 times as hacking)
avg rating 3.98 — 5,422 ratings — published 2017
The Hacker Playbook 2: Practical Guide To Penetration Testing (Kindle Edition)
by (shelved 39 times as hacking)
avg rating 4.24 — 437 ratings — published 2015
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Kindle Edition)
by (shelved 33 times as hacking)
avg rating 4.35 — 9,899 ratings — published 2019
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground (Hardcover)
by (shelved 31 times as hacking)
avg rating 3.97 — 8,055 ratings — published 2011
Metasploit: The Penetration Tester's Guide (Paperback)
by (shelved 31 times as hacking)
avg rating 4.07 — 868 ratings — published 2011
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali (Kindle Edition)
by (shelved 30 times as hacking)
avg rating 4.12 — 571 ratings — published 2018
The Hacker Playbook 3: Practical Guide To Penetration Testing (Kindle Edition)
by (shelved 30 times as hacking)
avg rating 4.40 — 255 ratings — published
The Hacker Playbook: Practical Guide to Penetration Testing (Kindle Edition)
by (shelved 30 times as hacking)
avg rating 3.96 — 470 ratings — published 2014
Hacking Exposed: Network Security Secrets & Solutions (Paperback)
by (shelved 26 times as hacking)
avg rating 3.80 — 1,165 ratings — published 2000
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)
by (shelved 26 times as hacking)
avg rating 4.48 — 604 ratings — published 2011
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World (Hardcover)
by (shelved 25 times as hacking)
avg rating 3.74 — 2,378 ratings — published 2019
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (Hardcover)
by (shelved 24 times as hacking)
avg rating 4.17 — 8,242 ratings — published 2014
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency (Hardcover)
by (shelved 24 times as hacking)
avg rating 3.97 — 3,366 ratings — published 2012
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race (Hardcover)
by (shelved 23 times as hacking)
avg rating 4.32 — 11,066 ratings — published 2021
The Shellcoder's Handbook: Discovering and Exploiting Security Holes (Paperback)
by (shelved 23 times as hacking)
avg rating 4.15 — 331 ratings — published 2004
The Hacker Crackdown: Law and Disorder on the Electronic Frontier (Mass Market Paperback)
by (shelved 23 times as hacking)
avg rating 3.80 — 3,321 ratings — published 1992
Red Team Field Manual (Paperback)
by (shelved 22 times as hacking)
avg rating 4.22 — 996 ratings — published 2014
Reversing: Secrets of Reverse Engineering (Paperback)
by (shelved 22 times as hacking)
avg rating 4.09 — 545 ratings — published 2005
Hacking S3crets (Paperback)
by (shelved 21 times as hacking)
avg rating 4.27 — 508 ratings — published 2012
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Paperback)
by (shelved 21 times as hacking)
avg rating 3.92 — 724 ratings — published 2011
Little Brother (Little Brother, #1)
by (shelved 19 times as hacking)
avg rating 3.92 — 53,082 ratings — published 2008
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (Paperback)
by (shelved 18 times as hacking)
avg rating 4.03 — 551 ratings — published 2012
Permanent Record (Hardcover)
by (shelved 17 times as hacking)
avg rating 4.30 — 57,599 ratings — published 2019
The Tangled Web: A Guide to Securing Modern Web Applications (Paperback)
by (shelved 16 times as hacking)
avg rating 4.04 — 553 ratings — published 2011
Applied Cryptography: Protocols, Algorithms, and Source Code in C (Hardcover)
by (shelved 16 times as hacking)
avg rating 4.21 — 2,136 ratings — published 1993
The Girl in the Spider's Web (Millennium, #4)
by (shelved 15 times as hacking)
avg rating 3.81 — 168,301 ratings — published 2015
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning (Paperback)
by (shelved 15 times as hacking)
avg rating 4.36 — 425 ratings — published 2009
Bug Bounty Bootcamp (Paperback)
by (shelved 14 times as hacking)
avg rating 4.52 — 122 ratings — published
The Hardware Hacker: Adventures in Making and Breaking Hardware (Hardcover)
by (shelved 14 times as hacking)
avg rating 4.28 — 551 ratings — published 2017
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Paperback)
by (shelved 14 times as hacking)
avg rating 4.30 — 28,847 ratings — published 1999
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks (Paperback)
by (shelved 14 times as hacking)
avg rating 4.21 — 470 ratings — published 2005
Hacker's Delight (Hardcover)
by (shelved 14 times as hacking)
avg rating 4.20 — 1,136 ratings — published 2002
The Girl With the Dragon Tattoo (Millennium, #1)
by (shelved 14 times as hacking)
avg rating 4.18 — 3,426,382 ratings — published 2005
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing (Paperback)
by (shelved 14 times as hacking)
avg rating 3.94 — 220 ratings — published 2007
The Pentester BluePrint: Starting a Career as an Ethical Hacker (Paperback)
by (shelved 13 times as hacking)
avg rating 4.16 — 223 ratings — published 2020
Getting Started Becoming a Master Hacker: Hacking is the Most Important Skill Set of the 21st Century! (Kindle Edition)
by (shelved 13 times as hacking)
avg rating 4.22 — 58 ratings — published
Real-World Bug Hunting: A Field Guide to Web Hacking (Paperback)
by (shelved 13 times as hacking)
avg rating 4.20 — 139 ratings — published
Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell (Hardcover)
by (shelved 13 times as hacking)
avg rating 4.20 — 1,773 ratings — published 2013
Snow Crash (Hardcover)
by (shelved 13 times as hacking)
avg rating 4.01 — 296,850 ratings — published 1992
“Either Internet or Privacy
(Cybersecurity 101, Sonnet)
The purpose of a strong password
is not to keep your accounts safe,
but to keep your accounts moderately
secure against common scammers, however,
if you become a target of actual hackers,
or a person of interest to the government,
have no doubt, your internet
activities are already monitored.
Paranoia of cybersecurity only ruins sanity,
it does nothing to establish security.
No technology that's connected
to the internet is unhackable,
either you can have internet or privacy.
So, don't post family pictures online,
keep your passwords moderately complex,
refrain from consentless content,
cloud is the last place to be private.”
― Sonnets From The Mountaintop
(Cybersecurity 101, Sonnet)
The purpose of a strong password
is not to keep your accounts safe,
but to keep your accounts moderately
secure against common scammers, however,
if you become a target of actual hackers,
or a person of interest to the government,
have no doubt, your internet
activities are already monitored.
Paranoia of cybersecurity only ruins sanity,
it does nothing to establish security.
No technology that's connected
to the internet is unhackable,
either you can have internet or privacy.
So, don't post family pictures online,
keep your passwords moderately complex,
refrain from consentless content,
cloud is the last place to be private.”
― Sonnets From The Mountaintop
“Shvatio sam… Da nema čoveka, kompjuter ne bi postojao. Da nema kompjutera, mnogi ljudi ne bi naučili šta znači biti čovek.”
― Profajler
― Profajler












