36 books
—
18 voters
Malware Books
Showing 1-50 of 71
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)
by (shelved 9 times as malware)
avg rating 4.48 — 606 ratings — published 2011
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code (Paperback)
by (shelved 6 times as malware)
avg rating 4.21 — 184 ratings — published 2010
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory (Paperback)
by (shelved 5 times as malware)
avg rating 4.34 — 125 ratings — published 2014
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware (Kindle Edition)
by (shelved 4 times as malware)
avg rating 4.17 — 35 ratings — published
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Kindle Edition)
by (shelved 4 times as malware)
avg rating 4.35 — 9,800 ratings — published 2019
Windows Malware Analysis Essentials: Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set (Paperback)
by (shelved 4 times as malware)
avg rating 4.29 — 7 ratings — published 2015
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (Hardcover)
by (shelved 3 times as malware)
avg rating 4.17 — 8,191 ratings — published 2014
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides (Paperback)
by (shelved 2 times as malware)
avg rating 3.83 — 12 ratings — published 2012
Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks (Hardcover)
by (shelved 2 times as malware)
avg rating 3.94 — 1,898 ratings — published 2023
Malware Data Science: Attack Detection and Attribution (Kindle Edition)
by (shelved 2 times as malware)
avg rating 3.91 — 53 ratings — published
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks (Kindle Edition)
by (shelved 2 times as malware)
avg rating 4.28 — 25 ratings — published
An Introduction To Keyloggers, RATS And Malware (ebook)
by (shelved 2 times as malware)
avg rating 3.91 — 32 ratings — published
Incident Response & Computer Forensics, Third Edition (Paperback)
by (shelved 2 times as malware)
avg rating 4.33 — 112 ratings — published 2013
The Shellcoder's Handbook: Discovering and Exploiting Security Holes (Paperback)
by (shelved 2 times as malware)
avg rating 4.15 — 330 ratings — published 2004
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (Paperback)
by (shelved 2 times as malware)
avg rating 4.03 — 549 ratings — published 2012
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler (Paperback)
by (shelved 2 times as malware)
avg rating 4.29 — 176 ratings — published 2008
Art of Computer Virus Research and Defense, The (Paperback)
by (shelved 2 times as malware)
avg rating 3.90 — 58 ratings — published 2005
Reversing: Secrets of Reverse Engineering (Paperback)
by (shelved 2 times as malware)
avg rating 4.09 — 545 ratings — published 2005
Malicious Cryptography: Exposing Crytovirology (Paperback)
by (shelved 2 times as malware)
avg rating 3.63 — 41 ratings — published 2004
Gray Hat Hacking: The Ethical's Hackers handbook (Kindle Edition)
by (shelved 1 time as malware)
avg rating 4.40 — 5 ratings — published
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly (Paperback)
by (shelved 1 time as malware)
avg rating 4.52 — 73 ratings — published
Computer Viruses: from theory to applications (Collection IRIS)
by (shelved 1 time as malware)
avg rating 4.00 — 4 ratings — published 2005
Ethical Hacking With Kali Linux: Learn Fast How To Hack Like A Pro (Kindle Edition)
by (shelved 1 time as malware)
avg rating 3.80 — 5 ratings — published
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions (Kindle Edition)
by (shelved 1 time as malware)
avg rating 3.62 — 16 ratings — published
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards (Paperback)
by (shelved 1 time as malware)
avg rating 3.43 — 21 ratings — published 2011
The Art of Mac Malware, Volume 1: The Guide to Analyzing Malicious Software (Paperback)
by (shelved 1 time as malware)
avg rating 4.58 — 33 ratings — published
Hacking Exposed: Malware & Rootkits Secrets & Solutions (Paperback)
by (shelved 1 time as malware)
avg rating 4.17 — 54 ratings — published 2008
Gray Hat Python: Python Programming for Hackers and Reverse Engineers (Paperback)
by (shelved 1 time as malware)
avg rating 3.94 — 323 ratings — published 2008
Visual Threat Intelligence: An Illustrated Guide For Threat Researcher (Kindle Edition)
by (shelved 1 time as malware)
avg rating 4.43 — 61 ratings — published
The Gathering Dark (Magic: The Gathering: Ice Age Cycle, #1)
by (shelved 1 time as malware)
avg rating 3.94 — 799 ratings — published 1999
The Eternal Ice (Magic: The Gathering: Ice Age Cycle, #2)
by (shelved 1 time as malware)
avg rating 3.94 — 574 ratings — published 2000
The Shattered Alliance (Magic: The Gathering: Ice Age Cycle, #3)
by (shelved 1 time as malware)
avg rating 3.92 — 447 ratings — published 2000
Nexus & Other Stories (Warhammer 40,000)
by (shelved 1 time as malware)
avg rating 3.67 — 275 ratings — published 2020
Black Hat Rust (Unknown Binding)
by (shelved 1 time as malware)
avg rating 3.20 — 15 ratings — published
Deeply Odd (Odd Thomas, #6)
by (shelved 1 time as malware)
avg rating 4.09 — 24,083 ratings — published 2013
Detection of Intrusions and Malware, and Vulnerability Assessment: Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings (Lecture Notes in Computer Science, 4064)
by (shelved 1 time as malware)
avg rating 4.50 — 2 ratings — published 2006
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedings (Lecture Notes in Computer Science, 5137)
by (shelved 1 time as malware)
avg rating 4.33 — 3 ratings — published 2008
Detection of Intrusions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings (Lecture Notes in Computer Science, 3548)
by (shelved 1 time as malware)
avg rating 4.33 — 3 ratings — published 2005
The Recursive Book of Recursion: Ace the Coding Interview with Python and JavaScript (Kindle Edition)
by (shelved 1 time as malware)
avg rating 4.22 — 46 ratings — published
Harry Potter and the Cursed Child Novel Form (Kindle Edition)
by (shelved 1 time as malware)
avg rating 3.26 — 1,006 ratings — published
The Tales of Beedle the Bard (Hogwarts Library, #3)
by (shelved 1 time as malware)
avg rating 4.03 — 509,796 ratings — published 2008
The Christmas Pig (Hardcover)
by (shelved 1 time as malware)
avg rating 4.17 — 39,564 ratings — published 2021
Fairy Tale (Hardcover)
by (shelved 1 time as malware)
avg rating 4.09 — 330,544 ratings — published 2022
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats (Paperback)
by (shelved 1 time as malware)
avg rating 4.50 — 46 ratings — published 2019
Worm: The First Digital World War (Hardcover)
by (shelved 1 time as malware)
avg rating 3.60 — 2,299 ratings — published 2011
The Art of Attack: Attacker Mindset for Security Professionals (Paperback)
by (shelved 1 time as malware)
avg rating 3.77 — 65 ratings — published
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors (Paperback)
by (shelved 1 time as malware)
avg rating 3.89 — 9 ratings — published
How to Stop E-Mail Spam, Spyware, Malware, Computer Viruses and Hackers from Ruining Your Computer or Network The Complete Guide for Your Home and Work (Paperback)
by (shelved 1 time as malware)
avg rating 4.11 — 9 ratings — published 2010
Black Hat Python: Python Programming for Hackers and Pentesters (Paperback)
by (shelved 1 time as malware)
avg rating 4.12 — 608 ratings — published 2014
Freedom™ (Daemon, #2)
by (shelved 1 time as malware)
avg rating 4.26 — 30,151 ratings — published 2010
“Wannacry is the Stuxnet of Ransomware”
―
―
“Hacking a national election is simple. Exploit a vulnerability in the manufacturer's network, poison the tabulation software update with self-deleting malware and let the manufacturer send to their field reps and election consultants who update the election systems.”
―
―











