122 books
—
117 voters
Malware Books
Showing 1-50 of 79
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)
by (shelved 9 times as malware)
avg rating 4.47 — 614 ratings — published 2011
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code (Paperback)
by (shelved 6 times as malware)
avg rating 4.20 — 183 ratings — published 2010
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Kindle Edition)
by (shelved 5 times as malware)
avg rating 4.34 — 10,270 ratings — published 2019
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (Hardcover)
by (shelved 5 times as malware)
avg rating 4.17 — 8,420 ratings — published 2014
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory (Paperback)
by (shelved 5 times as malware)
avg rating 4.34 — 124 ratings — published 2014
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware (Kindle Edition)
by (shelved 4 times as malware)
avg rating 4.14 — 36 ratings — published
Windows Malware Analysis Essentials: Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set (Paperback)
by (shelved 4 times as malware)
avg rating 4.29 — 7 ratings — published 2015
An Introduction To Keyloggers, RATS And Malware (ebook)
by (shelved 3 times as malware)
avg rating 3.91 — 33 ratings — published
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides (Paperback)
by (shelved 2 times as malware)
avg rating 3.82 — 11 ratings — published 2012
Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks (Hardcover)
by (shelved 2 times as malware)
avg rating 3.93 — 2,019 ratings — published 2023
Malware Data Science: Attack Detection and Attribution (Kindle Edition)
by (shelved 2 times as malware)
avg rating 3.91 — 53 ratings — published
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks (Kindle Edition)
by (shelved 2 times as malware)
avg rating 4.28 — 25 ratings — published
Incident Response & Computer Forensics, Third Edition (Paperback)
by (shelved 2 times as malware)
avg rating 4.34 — 116 ratings — published 2013
The Shellcoder's Handbook: Discovering and Exploiting Security Holes (Paperback)
by (shelved 2 times as malware)
avg rating 4.15 — 334 ratings — published 2004
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (Paperback)
by (shelved 2 times as malware)
avg rating 4.04 — 554 ratings — published 2012
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler (Paperback)
by (shelved 2 times as malware)
avg rating 4.29 — 178 ratings — published 2008
Art of Computer Virus Research and Defense, The (Paperback)
by (shelved 2 times as malware)
avg rating 3.89 — 57 ratings — published 2005
Reversing: Secrets of Reverse Engineering (Paperback)
by (shelved 2 times as malware)
avg rating 4.10 — 547 ratings — published 2005
Malicious Cryptography: Exposing Crytovirology (Paperback)
by (shelved 2 times as malware)
avg rating 3.63 — 41 ratings — published 2004
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race (Hardcover)
by (shelved 1 time as malware)
avg rating 4.31 — 11,435 ratings — published 2021
Official (ISC)2 Guide to the CISSP CBK
by (shelved 1 time as malware)
avg rating 3.76 — 96 ratings — published 2014
The Tangled Web: A Guide to Securing Modern Web Applications (Paperback)
by (shelved 1 time as malware)
avg rating 4.04 — 556 ratings — published 2011
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World (Hardcover)
by (shelved 1 time as malware)
avg rating 3.75 — 2,448 ratings — published 2019
The Cybersecurity Mesh Architecture: Composable, flexible, and scalable security approach for a resilient security ecosystem (English Edition)
by (shelved 1 time as malware)
avg rating 5.00 — 1 rating — published
Advanced Penetration Testing: Hacking the World's Most Secure Networks (Paperback)
by (shelved 1 time as malware)
avg rating 4.26 — 135 ratings — published
Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy (Hardcover)
by (shelved 1 time as malware)
avg rating 4.17 — 148 ratings — published
Android Security Internals: An In-Depth Guide to Android's Security Architecture (Paperback)
by (shelved 1 time as malware)
avg rating 3.95 — 66 ratings — published 2014
Gray Hat Hacking: The Ethical's Hackers handbook (Kindle Edition)
by (shelved 1 time as malware)
avg rating 4.40 — 5 ratings — published
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly (Paperback)
by (shelved 1 time as malware)
avg rating 4.50 — 74 ratings — published
Computer Viruses: from theory to applications (Collection IRIS)
by (shelved 1 time as malware)
avg rating 4.00 — 4 ratings — published 2005
Ethical Hacking With Kali Linux: Learn Fast How To Hack Like A Pro (Kindle Edition)
by (shelved 1 time as malware)
avg rating 3.80 — 5 ratings — published
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions (Kindle Edition)
by (shelved 1 time as malware)
avg rating 3.62 — 16 ratings — published
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards (Paperback)
by (shelved 1 time as malware)
avg rating 3.43 — 21 ratings — published 2011
The Art of Mac Malware, Volume 1: The Guide to Analyzing Malicious Software (Paperback)
by (shelved 1 time as malware)
avg rating 4.60 — 35 ratings — published
Hacking Exposed: Malware & Rootkits Secrets & Solutions (Paperback)
by (shelved 1 time as malware)
avg rating 4.13 — 55 ratings — published 2008
Gray Hat Python: Python Programming for Hackers and Reverse Engineers (Paperback)
by (shelved 1 time as malware)
avg rating 3.94 — 324 ratings — published 2008
Visual Threat Intelligence: An Illustrated Guide For Threat Researcher (Kindle Edition)
by (shelved 1 time as malware)
avg rating 4.38 — 65 ratings — published
The Gathering Dark (Magic: The Gathering: Ice Age Cycle, #1)
by (shelved 1 time as malware)
avg rating 3.94 — 815 ratings — published 1999
The Eternal Ice (Magic: The Gathering: Ice Age Cycle, #2)
by (shelved 1 time as malware)
avg rating 3.93 — 586 ratings — published 2000
The Shattered Alliance (Magic: The Gathering: Ice Age Cycle, #3)
by (shelved 1 time as malware)
avg rating 3.91 — 453 ratings — published 2000
Nexus & Other Stories (Warhammer 40,000)
by (shelved 1 time as malware)
avg rating 3.66 — 282 ratings — published 2020
Black Hat Rust (Unknown Binding)
by (shelved 1 time as malware)
avg rating 3.12 — 16 ratings — published
Deeply Odd (Odd Thomas, #6)
by (shelved 1 time as malware)
avg rating 4.09 — 24,394 ratings — published 2013
Detection of Intrusions and Malware, and Vulnerability Assessment: Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings (Lecture Notes in Computer Science, 4064)
by (shelved 1 time as malware)
avg rating 4.50 — 2 ratings — published 2006
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedings (Lecture Notes in Computer Science, 5137)
by (shelved 1 time as malware)
avg rating 4.33 — 3 ratings — published 2008
Detection of Intrusions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings (Lecture Notes in Computer Science, 3548)
by (shelved 1 time as malware)
avg rating 4.33 — 3 ratings — published 2005
The Recursive Book of Recursion: Ace the Coding Interview with Python and JavaScript (Kindle Edition)
by (shelved 1 time as malware)
avg rating 4.25 — 48 ratings — published
Harry Potter and the Cursed Child Novel Form (Kindle Edition)
by (shelved 1 time as malware)
avg rating 3.27 — 1,008 ratings — published
The Tales of Beedle the Bard (Hogwarts Library, #3)
by (shelved 1 time as malware)
avg rating 4.03 — 514,352 ratings — published 2008
The Christmas Pig (Hardcover)
by (shelved 1 time as malware)
avg rating 4.17 — 42,881 ratings — published 2021
Information Security, Penetration Testing, Social Engineering, Counter-Intelligence, Hacker/Hacking Culture and History.
More lists...
“Every conceivable layer of the election process is completely riddled with vulnerabilities, so yes, hacking elections is easy!”
―
―
“A Nation State or Cyber-Mercenary won’t hack e-voting machines one by one. This takes too long and will have minimal impact. Instead, they’ll take an easier approach like spear phishing the manufacturer with malware and poison the voting machine update pre-election and allow the manufacturer to update each individual machine with a self-deleting payload that will target the tabulation process.”
―
―











