Malware Books

Showing 1-50 of 78
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)
by (shelved 9 times as malware)
avg rating 4.48 — 608 ratings — published 2011
Rate this book
Clear rating
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code (Paperback)
by (shelved 6 times as malware)
avg rating 4.20 — 183 ratings — published 2010
Rate this book
Clear rating
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory (Paperback)
by (shelved 5 times as malware)
avg rating 4.34 — 125 ratings — published 2014
Rate this book
Clear rating
Rate this book
Clear rating
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Kindle Edition)
by (shelved 4 times as malware)
avg rating 4.34 — 10,139 ratings — published 2019
Rate this book
Clear rating
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (Hardcover)
by (shelved 4 times as malware)
avg rating 4.17 — 8,345 ratings — published 2014
Rate this book
Clear rating
Rate this book
Clear rating
An Introduction To Keyloggers, RATS And Malware An Introduction To Keyloggers, RATS And Malware (ebook)
by (shelved 3 times as malware)
avg rating 3.91 — 33 ratings — published
Rate this book
Clear rating
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides (Paperback)
by (shelved 2 times as malware)
avg rating 3.82 — 11 ratings — published 2012
Rate this book
Clear rating
Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks (Hardcover)
by (shelved 2 times as malware)
avg rating 3.93 — 1,995 ratings — published 2023
Rate this book
Clear rating
Malware Data Science: Attack Detection and Attribution Malware Data Science: Attack Detection and Attribution (Kindle Edition)
by (shelved 2 times as malware)
avg rating 3.89 — 53 ratings — published
Rate this book
Clear rating
Rate this book
Clear rating
Incident Response & Computer Forensics, Third Edition Incident Response & Computer Forensics, Third Edition (Paperback)
by (shelved 2 times as malware)
avg rating 4.34 — 113 ratings — published 2013
Rate this book
Clear rating
The Shellcoder's Handbook: Discovering and Exploiting Security Holes The Shellcoder's Handbook: Discovering and Exploiting Security Holes (Paperback)
by (shelved 2 times as malware)
avg rating 4.15 — 333 ratings — published 2004
Rate this book
Clear rating
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (Paperback)
by (shelved 2 times as malware)
avg rating 4.04 — 551 ratings — published 2012
Rate this book
Clear rating
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler (Paperback)
by (shelved 2 times as malware)
avg rating 4.29 — 177 ratings — published 2008
Rate this book
Clear rating
Art of Computer Virus Research and Defense, The Art of Computer Virus Research and Defense, The (Paperback)
by (shelved 2 times as malware)
avg rating 3.89 — 57 ratings — published 2005
Rate this book
Clear rating
Reversing: Secrets of Reverse Engineering Reversing: Secrets of Reverse Engineering (Paperback)
by (shelved 2 times as malware)
avg rating 4.09 — 545 ratings — published 2005
Rate this book
Clear rating
Malicious Cryptography: Exposing Crytovirology Malicious Cryptography: Exposing Crytovirology (Paperback)
by (shelved 2 times as malware)
avg rating 3.63 — 41 ratings — published 2004
Rate this book
Clear rating
Official (ISC)2 Guide to the CISSP CBK Official (ISC)2 Guide to the CISSP CBK
by (shelved 1 time as malware)
avg rating 3.76 — 96 ratings — published 2014
Rate this book
Clear rating
The Tangled Web: A Guide to Securing Modern Web Applications The Tangled Web: A Guide to Securing Modern Web Applications (Paperback)
by (shelved 1 time as malware)
avg rating 4.04 — 554 ratings — published 2011
Rate this book
Clear rating
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World (Hardcover)
by (shelved 1 time as malware)
avg rating 3.75 — 2,418 ratings — published 2019
Rate this book
Clear rating
Rate this book
Clear rating
Advanced Penetration Testing: Hacking the World's Most Secure Networks Advanced Penetration Testing: Hacking the World's Most Secure Networks (Paperback)
by (shelved 1 time as malware)
avg rating 4.25 — 134 ratings — published
Rate this book
Clear rating
Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy (Hardcover)
by (shelved 1 time as malware)
avg rating 4.19 — 141 ratings — published
Rate this book
Clear rating
Android Security Internals: An In-Depth Guide to Android's Security Architecture Android Security Internals: An In-Depth Guide to Android's Security Architecture (Paperback)
by (shelved 1 time as malware)
avg rating 3.94 — 65 ratings — published 2014
Rate this book
Clear rating
Gray Hat Hacking: The Ethical's Hackers handbook Gray Hat Hacking: The Ethical's Hackers handbook (Kindle Edition)
by (shelved 1 time as malware)
avg rating 4.40 — 5 ratings — published
Rate this book
Clear rating
Rate this book
Clear rating
Computer Viruses: from theory to applications (Collection IRIS) Computer Viruses: from theory to applications (Collection IRIS)
by (shelved 1 time as malware)
avg rating 4.00 — 4 ratings — published 2005
Rate this book
Clear rating
Ethical Hacking With Kali Linux: Learn Fast How To Hack Like A Pro Ethical Hacking With Kali Linux: Learn Fast How To Hack Like A Pro (Kindle Edition)
by (shelved 1 time as malware)
avg rating 3.80 — 5 ratings — published
Rate this book
Clear rating
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions (Kindle Edition)
by (shelved 1 time as malware)
avg rating 3.62 — 16 ratings — published
Rate this book
Clear rating
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards Application Security for the Android Platform: Processes, Permissions, and Other Safeguards (Paperback)
by (shelved 1 time as malware)
avg rating 3.43 — 21 ratings — published 2011
Rate this book
Clear rating
The Art of Mac Malware, Volume 1: The Guide to Analyzing Malicious Software The Art of Mac Malware, Volume 1: The Guide to Analyzing Malicious Software (Paperback)
by (shelved 1 time as malware)
avg rating 4.60 — 35 ratings — published
Rate this book
Clear rating
Hacking Exposed: Malware & Rootkits Secrets & Solutions Hacking Exposed: Malware & Rootkits Secrets & Solutions (Paperback)
by (shelved 1 time as malware)
avg rating 4.13 — 55 ratings — published 2008
Rate this book
Clear rating
Gray Hat Python: Python Programming for Hackers and Reverse Engineers Gray Hat Python: Python Programming for Hackers and Reverse Engineers (Paperback)
by (shelved 1 time as malware)
avg rating 3.94 — 323 ratings — published 2008
Rate this book
Clear rating
Visual Threat Intelligence: An Illustrated Guide For Threat Researcher Visual Threat Intelligence: An Illustrated Guide For Threat Researcher (Kindle Edition)
by (shelved 1 time as malware)
avg rating 4.41 — 63 ratings — published
Rate this book
Clear rating
The Gathering Dark (Magic: The Gathering: Ice Age Cycle, #1) The Gathering Dark (Magic: The Gathering: Ice Age Cycle, #1)
by (shelved 1 time as malware)
avg rating 3.94 — 812 ratings — published 1999
Rate this book
Clear rating
The Eternal Ice (Magic: The Gathering: Ice Age Cycle, #2) The Eternal Ice (Magic: The Gathering: Ice Age Cycle, #2)
by (shelved 1 time as malware)
avg rating 3.93 — 585 ratings — published 2000
Rate this book
Clear rating
The Shattered Alliance (Magic: The Gathering: Ice Age Cycle, #3) The Shattered Alliance (Magic: The Gathering: Ice Age Cycle, #3)
by (shelved 1 time as malware)
avg rating 3.91 — 453 ratings — published 2000
Rate this book
Clear rating
Nexus & Other Stories (Warhammer 40,000) Nexus & Other Stories (Warhammer 40,000)
by (shelved 1 time as malware)
avg rating 3.66 — 281 ratings — published 2020
Rate this book
Clear rating
Black Hat Rust Black Hat Rust (Unknown Binding)
by (shelved 1 time as malware)
avg rating 3.13 — 15 ratings — published
Rate this book
Clear rating
Deeply Odd (Odd Thomas, #6) Deeply Odd (Odd Thomas, #6)
by (shelved 1 time as malware)
avg rating 4.09 — 24,294 ratings — published 2013
Rate this book
Clear rating
Rate this book
Clear rating
Rate this book
Clear rating
Rate this book
Clear rating
The Recursive Book of Recursion: Ace the Coding Interview with Python and JavaScript The Recursive Book of Recursion: Ace the Coding Interview with Python and JavaScript (Kindle Edition)
by (shelved 1 time as malware)
avg rating 4.25 — 48 ratings — published
Rate this book
Clear rating
Harry Potter and the Cursed Child Novel Form Harry Potter and the Cursed Child Novel Form (Kindle Edition)
by (shelved 1 time as malware)
avg rating 3.28 — 1,009 ratings — published
Rate this book
Clear rating
The Tales of Beedle the Bard (Hogwarts Library, #3) The Tales of Beedle the Bard (Hogwarts Library, #3)
by (shelved 1 time as malware)
avg rating 4.03 — 513,308 ratings — published 2008
Rate this book
Clear rating
The Christmas Pig The Christmas Pig (Hardcover)
by (shelved 1 time as malware)
avg rating 4.17 — 42,620 ratings — published 2021
Rate this book
Clear rating
Fairy Tale Fairy Tale (Hardcover)
by (shelved 1 time as malware)
avg rating 4.09 — 342,475 ratings — published 2022
Rate this book
Clear rating


“In an age of dynamic malware obfuscation through operations such as mutating hash, a hyper-evolving threat landscape, and technologically next generation adversaries, offensive campaigns have an overwhelming advantage over defensive strategies.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“A single spear-phishing email carrying a slightly altered malware can bypass multi-million dollar enterprise security solutions if an adversary deceives a cyber-hygienically apathetic employee into opening the attachment or clicking a malicious link and thereby compromising the entire network.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

More quotes...