23 books
—
4 voters
Hacking Books
Showing 1-50 of 1,607
Hacking: The Art of Exploitation w/CD (Paperback)
by (shelved 109 times as hacking)
avg rating 4.17 — 2,522 ratings — published 2003
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (Hardcover)
by (shelved 99 times as hacking)
avg rating 3.97 — 27,724 ratings — published 2011
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (Paperback)
by (shelved 59 times as hacking)
avg rating 4.28 — 16,311 ratings — published 1989
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws (Paperback)
by (shelved 57 times as hacking)
avg rating 4.23 — 1,230 ratings — published 2007
Social Engineering (Paperback)
by (shelved 56 times as hacking)
avg rating 3.83 — 3,939 ratings — published 2010
Black Hat Python: Python Programming for Hackers and Pentesters (Paperback)
by (shelved 51 times as hacking)
avg rating 4.11 — 618 ratings — published 2014
The Art of Deception: Controlling the Human Element of Security (Paperback)
by (shelved 51 times as hacking)
avg rating 3.76 — 7,285 ratings — published 2001
Gray Hat Hacking : The Ethical Hacker's Handbook (Paperback)
by (shelved 48 times as hacking)
avg rating 4.09 — 543 ratings — published 2004
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback)
by (shelved 47 times as hacking)
avg rating 3.91 — 3,615 ratings — published 2005
Hackers: Heroes of the Computer Revolution (Paperback)
by (shelved 46 times as hacking)
avg rating 4.16 — 8,616 ratings — published 1984
Penetration Testing: A Hands-On Introduction to Hacking (Paperback)
by (shelved 44 times as hacking)
avg rating 4.18 — 399 ratings — published 2014
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data (Hardcover)
by (shelved 42 times as hacking)
avg rating 3.98 — 5,505 ratings — published 2017
The Hacker Playbook 2: Practical Guide To Penetration Testing (Kindle Edition)
by (shelved 38 times as hacking)
avg rating 4.24 — 446 ratings — published 2015
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Kindle Edition)
by (shelved 34 times as hacking)
avg rating 4.34 — 10,373 ratings — published 2019
Metasploit: The Penetration Tester's Guide (Paperback)
by (shelved 34 times as hacking)
avg rating 4.07 — 875 ratings — published 2011
The Hacker Playbook 3: Practical Guide To Penetration Testing (Kindle Edition)
by (shelved 32 times as hacking)
avg rating 4.40 — 263 ratings — published
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground (Hardcover)
by (shelved 31 times as hacking)
avg rating 3.97 — 8,099 ratings — published 2011
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali (Kindle Edition)
by (shelved 30 times as hacking)
avg rating 4.12 — 602 ratings — published 2018
The Hacker Playbook: Practical Guide to Penetration Testing (Kindle Edition)
by (shelved 28 times as hacking)
avg rating 3.97 — 481 ratings — published 2014
Hacking Exposed: Network Security Secrets & Solutions (Paperback)
by (shelved 27 times as hacking)
avg rating 3.80 — 1,165 ratings — published 2000
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)
by (shelved 27 times as hacking)
avg rating 4.47 — 618 ratings — published 2011
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World (Hardcover)
by (shelved 26 times as hacking)
avg rating 3.75 — 2,465 ratings — published 2019
The Hacker Crackdown: Law and Disorder on the Electronic Frontier (Mass Market Paperback)
by (shelved 25 times as hacking)
avg rating 3.80 — 3,350 ratings — published 1992
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (Hardcover)
by (shelved 24 times as hacking)
avg rating 4.16 — 8,468 ratings — published 2014
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency (Hardcover)
by (shelved 24 times as hacking)
avg rating 3.97 — 3,399 ratings — published 2012
The Shellcoder's Handbook: Discovering and Exploiting Security Holes (Paperback)
by (shelved 23 times as hacking)
avg rating 4.15 — 335 ratings — published 2004
Reversing: Secrets of Reverse Engineering (Paperback)
by (shelved 23 times as hacking)
avg rating 4.09 — 551 ratings — published 2005
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race (Hardcover)
by (shelved 22 times as hacking)
avg rating 4.31 — 11,531 ratings — published 2021
Red Team Field Manual (Paperback)
by (shelved 22 times as hacking)
avg rating 4.23 — 1,008 ratings — published 2014
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Paperback)
by (shelved 22 times as hacking)
avg rating 3.92 — 723 ratings — published 2011
Hacking S3crets (Paperback)
by (shelved 21 times as hacking)
avg rating 4.27 — 508 ratings — published 2012
Permanent Record (Hardcover)
by (shelved 19 times as hacking)
avg rating 4.30 — 58,817 ratings — published 2019
Little Brother (Little Brother, #1)
by (shelved 19 times as hacking)
avg rating 3.92 — 53,502 ratings — published 2008
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (Paperback)
by (shelved 18 times as hacking)
avg rating 4.04 — 554 ratings — published 2012
The Tangled Web: A Guide to Securing Modern Web Applications (Paperback)
by (shelved 16 times as hacking)
avg rating 4.04 — 557 ratings — published 2011
Applied Cryptography: Protocols, Algorithms, and Source Code in C (Hardcover)
by (shelved 16 times as hacking)
avg rating 4.21 — 2,138 ratings — published 1993
Real-World Bug Hunting: A Field Guide to Web Hacking (Paperback)
by (shelved 15 times as hacking)
avg rating 4.21 — 146 ratings — published
The Girl in the Spider's Web (Millennium, #4)
by (shelved 15 times as hacking)
avg rating 3.81 — 170,642 ratings — published 2015
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning (Paperback)
by (shelved 15 times as hacking)
avg rating 4.35 — 428 ratings — published 2009
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Paperback)
by (shelved 15 times as hacking)
avg rating 4.30 — 29,281 ratings — published 1999
The Hardware Hacker: Adventures in Making and Breaking Hardware (Hardcover)
by (shelved 14 times as hacking)
avg rating 4.28 — 560 ratings — published 2017
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks (Paperback)
by (shelved 14 times as hacking)
avg rating 4.21 — 473 ratings — published 2005
Hacker's Delight (Hardcover)
by (shelved 14 times as hacking)
avg rating 4.20 — 1,139 ratings — published 2002
The Girl With the Dragon Tattoo (Millennium, #1)
by (shelved 14 times as hacking)
avg rating 4.18 — 3,488,014 ratings — published 2005
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing (Paperback)
by (shelved 14 times as hacking)
avg rating 3.94 — 220 ratings — published 2007
Bug Bounty Bootcamp (Paperback)
by (shelved 13 times as hacking)
avg rating 4.49 — 133 ratings — published
The Pentester BluePrint: Starting a Career as an Ethical Hacker (Paperback)
by (shelved 13 times as hacking)
avg rating 4.16 — 229 ratings — published 2020
Getting Started Becoming a Master Hacker: Hacking is the Most Important Skill Set of the 21st Century! (Kindle Edition)
by (shelved 13 times as hacking)
avg rating 4.25 — 60 ratings — published
Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell (Hardcover)
by (shelved 13 times as hacking)
avg rating 4.20 — 1,793 ratings — published 2013
Snow Crash (Hardcover)
by (shelved 13 times as hacking)
avg rating 4.01 — 300,631 ratings — published 1992
“A successful hacking methodology is built on accumulated experience with diverse techniques, explored creatively.”
―
―
“Either Internet or Privacy
(Cybersecurity 101, Sonnet)
The purpose of a strong password
is not to keep your accounts safe,
but to keep your accounts moderately
secure against common scammers, however,
if you become a target of actual hackers,
or a person of interest to the government,
have no doubt, your internet
activities are already monitored.
Paranoia of cybersecurity only ruins sanity,
it does nothing to establish security.
No technology that's connected
to the internet is unhackable,
either you can have internet or privacy.
So, don't post family pictures online,
keep your passwords moderately complex,
refrain from consentless content,
cloud is the last place to be private.”
― Sonnets From The Mountaintop
(Cybersecurity 101, Sonnet)
The purpose of a strong password
is not to keep your accounts safe,
but to keep your accounts moderately
secure against common scammers, however,
if you become a target of actual hackers,
or a person of interest to the government,
have no doubt, your internet
activities are already monitored.
Paranoia of cybersecurity only ruins sanity,
it does nothing to establish security.
No technology that's connected
to the internet is unhackable,
either you can have internet or privacy.
So, don't post family pictures online,
keep your passwords moderately complex,
refrain from consentless content,
cloud is the last place to be private.”
― Sonnets From The Mountaintop








