Information Security Books

Showing 1-50 of 504
The Art of Deception: Controlling the Human Element of Security The Art of Deception: Controlling the Human Element of Security (Paperback)
by (shelved 14 times as information-security)
avg rating 3.77 — 7,193 ratings — published 2001
Rate this book
Clear rating
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (Paperback)
by (shelved 11 times as information-security)
avg rating 4.28 — 15,455 ratings — published 1989
Rate this book
Clear rating
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws (Paperback)
by (shelved 11 times as information-security)
avg rating 4.23 — 1,221 ratings — published 2007
Rate this book
Clear rating
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (Hardcover)
by (shelved 11 times as information-security)
avg rating 4.17 — 8,154 ratings — published 2014
Rate this book
Clear rating
Secrets and Lies: Digital Security in a Networked World Secrets and Lies: Digital Security in a Networked World (Paperback)
by (shelved 9 times as information-security)
avg rating 3.93 — 1,791 ratings — published 2000
Rate this book
Clear rating
Social Engineering Social Engineering (Paperback)
by (shelved 8 times as information-security)
avg rating 3.83 — 3,848 ratings — published 2010
Rate this book
Clear rating
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (Hardcover)
by (shelved 8 times as information-security)
avg rating 3.96 — 27,089 ratings — published 2011
Rate this book
Clear rating
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback)
by (shelved 8 times as information-security)
avg rating 3.91 — 3,585 ratings — published 2005
Rate this book
Clear rating
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Paperback)
by (shelved 8 times as information-security)
avg rating 4.30 — 28,650 ratings — published 1999
Rate this book
Clear rating
Security Engineering: A Guide to Building Dependable Distributed Systems Security Engineering: A Guide to Building Dependable Distributed Systems (Hardcover)
by (shelved 8 times as information-security)
avg rating 4.21 — 700 ratings — published
Rate this book
Clear rating
CISSP All-in-One Exam Guide CISSP All-in-One Exam Guide (Hardcover)
by (shelved 7 times as information-security)
avg rating 4.10 — 922 ratings — published 2001
Rate this book
Clear rating
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door (Hardcover)
by (shelved 7 times as information-security)
avg rating 3.75 — 2,738 ratings — published 2014
Rate this book
Clear rating
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)
by (shelved 7 times as information-security)
avg rating 4.48 — 605 ratings — published 2011
Rate this book
Clear rating
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Kindle Edition)
by (shelved 6 times as information-security)
avg rating 4.35 — 9,683 ratings — published 2019
Rate this book
Clear rating
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data (Hardcover)
by (shelved 6 times as information-security)
avg rating 3.98 — 5,375 ratings — published 2017
Rate this book
Clear rating
Red Team Field Manual Red Team Field Manual (Paperback)
by (shelved 6 times as information-security)
avg rating 4.23 — 992 ratings — published 2014
Rate this book
Clear rating
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World (Paperback)
by (shelved 6 times as information-security)
avg rating 4.00 — 3,850 ratings — published 2015
Rate this book
Clear rating
Hacking Exposed: Network Security Secrets & Solutions Hacking Exposed: Network Security Secrets & Solutions (Paperback)
by (shelved 6 times as information-security)
avg rating 3.80 — 1,165 ratings — published 2000
Rate this book
Clear rating
Penetration Testing: A Hands-On Introduction to Hacking Penetration Testing: A Hands-On Introduction to Hacking (Paperback)
by (shelved 5 times as information-security)
avg rating 4.17 — 388 ratings — published 2014
Rate this book
Clear rating
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (Volume 1 of 2) The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (Volume 1 of 2)
by (shelved 5 times as information-security)
avg rating 4.42 — 170 ratings — published 2006
Rate this book
Clear rating
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground (Hardcover)
by (shelved 5 times as information-security)
avg rating 3.97 — 8,032 ratings — published 2011
Rate this book
Clear rating
Hacking: The Art of Exploitation w/CD Hacking: The Art of Exploitation w/CD (Paperback)
by (shelved 4 times as information-security)
avg rating 4.17 — 2,494 ratings — published 2003
Rate this book
Clear rating
Hacking the Hacker: Learn From the Experts Who Take Down Hackers Hacking the Hacker: Learn From the Experts Who Take Down Hackers (Kindle Edition)
by (shelved 4 times as information-security)
avg rating 3.91 — 229 ratings — published
Rate this book
Clear rating
Hackers: Heroes of the Computer Revolution Hackers: Heroes of the Computer Revolution (Paperback)
by (shelved 4 times as information-security)
avg rating 4.16 — 8,507 ratings — published 1984
Rate this book
Clear rating
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder. Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder. (Paperback)
by (shelved 4 times as information-security)
avg rating 4.12 — 286 ratings — published 2014
Rate this book
Clear rating
Cyberwar: The Next Threat to National Security & What to Do About It Cyberwar: The Next Threat to National Security & What to Do About It (Hardcover)
by (shelved 4 times as information-security)
avg rating 3.73 — 2,449 ratings — published 2010
Rate this book
Clear rating
The Practice of Network Security Monitoring: Understanding Incident Detection and Response The Practice of Network Security Monitoring: Understanding Incident Detection and Response (Paperback)
by (shelved 4 times as information-security)
avg rating 4.06 — 262 ratings — published 2013
Rate this book
Clear rating
Liars and Outliers: Enabling the Trust that Society Needs to Thrive Liars and Outliers: Enabling the Trust that Society Needs to Thrive (Hardcover)
by (shelved 4 times as information-security)
avg rating 3.78 — 1,463 ratings — published 2012
Rate this book
Clear rating
Eleventh Hour CISSP®: Study Guide Eleventh Hour CISSP®: Study Guide (Kindle Edition)
by (shelved 3 times as information-security)
avg rating 4.25 — 487 ratings — published
Rate this book
Clear rating
The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats (Hardcover)
by (shelved 3 times as information-security)
avg rating 4.03 — 797 ratings — published 2019
Rate this book
Clear rating
Network Security Assessment: Know Your Network Network Security Assessment: Know Your Network (Paperback)
by (shelved 3 times as information-security)
avg rating 4.03 — 90 ratings — published 2004
Rate this book
Clear rating
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World (Hardcover)
by (shelved 3 times as information-security)
avg rating 3.74 — 2,335 ratings — published 2019
Rate this book
Clear rating
The Perfect Weapon: How the Cyber Arms Race Set the World Afire The Perfect Weapon: How the Cyber Arms Race Set the World Afire (Hardcover)
by (shelved 3 times as information-security)
avg rating 4.25 — 3,410 ratings — published 2018
Rate this book
Clear rating
How to Measure Anything in Cybersecurity Risk How to Measure Anything in Cybersecurity Risk (Hardcover)
by (shelved 3 times as information-security)
avg rating 4.04 — 373 ratings — published 2016
Rate this book
Clear rating
Intelligence-Driven Incident Response: Outwitting the Adversary Intelligence-Driven Incident Response: Outwitting the Adversary (Paperback)
by (shelved 3 times as information-security)
avg rating 4.20 — 128 ratings — published
Rate this book
Clear rating
CISSP Study Guide CISSP Study Guide (Paperback)
by (shelved 3 times as information-security)
avg rating 4.13 — 228 ratings — published 2010
Rate this book
Clear rating
Hacking: The Next Generation Hacking: The Next Generation (Paperback)
by (shelved 3 times as information-security)
avg rating 3.72 — 101 ratings — published 2009
Rate this book
Clear rating
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security (Paperback)
by (shelved 3 times as information-security)
avg rating 3.92 — 248 ratings — published 2011
Rate this book
Clear rating
@War: The Rise of the Military-Internet Complex @War: The Rise of the Military-Internet Complex (Hardcover)
by (shelved 3 times as information-security)
avg rating 3.77 — 1,256 ratings — published 2014
Rate this book
Clear rating
Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell (Hardcover)
by (shelved 3 times as information-security)
avg rating 4.20 — 1,755 ratings — published 2013
Rate this book
Clear rating
Future Crimes Future Crimes (Hardcover)
by (shelved 3 times as information-security)
avg rating 3.93 — 4,378 ratings — published 2015
Rate this book
Clear rating
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State (Hardcover)
by (shelved 3 times as information-security)
avg rating 4.07 — 14,987 ratings — published 2014
Rate this book
Clear rating
Cybersecurity and Cyberwar: What Everyone Needs to Know Cybersecurity and Cyberwar: What Everyone Needs to Know (Paperback)
by (shelved 3 times as information-security)
avg rating 3.83 — 1,393 ratings — published 2013
Rate this book
Clear rating
Cypherpunks: Freedom and the Future of the Internet Cypherpunks: Freedom and the Future of the Internet (Paperback)
by (shelved 3 times as information-security)
avg rating 3.73 — 1,841 ratings — published 2012
Rate this book
Clear rating
Unmasking the Social Engineer: The Human Element of Security Unmasking the Social Engineer: The Human Element of Security (Paperback)
by (shelved 3 times as information-security)
avg rating 3.71 — 276 ratings — published 2010
Rate this book
Clear rating
Inside Cyber Warfare: Mapping the Cyber Underworld Inside Cyber Warfare: Mapping the Cyber Underworld (ebook)
by (shelved 3 times as information-security)
avg rating 3.37 — 212 ratings — published 2009
Rate this book
Clear rating
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (Paperback)
by (shelved 3 times as information-security)
avg rating 4.03 — 225 ratings — published 2005
Rate this book
Clear rating
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (Paperback)
by (shelved 3 times as information-security)
avg rating 4.03 — 550 ratings — published 2012
Rate this book
Clear rating
Security in Computing Security in Computing (Hardcover)
by (shelved 3 times as information-security)
avg rating 3.72 — 195 ratings — published 1988
Rate this book
Clear rating
Real Digital Forensics: Computer Security and Incident Response Real Digital Forensics: Computer Security and Incident Response (Paperback)
by (shelved 3 times as information-security)
avg rating 4.20 — 93 ratings — published 2005
Rate this book
Clear rating


“When you and I give technology our trust, we forget that its creators are the ones who profit from our surrender.”
Timsux Wales

“Privacy is not a luxury; it is the foundation of my dignity as a human, and without it, I'm merely a product to be sold.”
Timsux Wales

More quotes...