Malware Books

Showing 1-50 of 72
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)
by (shelved 9 times as malware)
avg rating 4.48 — 606 ratings — published 2011
Rate this book
Clear rating
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code (Paperback)
by (shelved 6 times as malware)
avg rating 4.21 — 184 ratings — published 2010
Rate this book
Clear rating
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory (Paperback)
by (shelved 5 times as malware)
avg rating 4.34 — 125 ratings — published 2014
Rate this book
Clear rating
Rate this book
Clear rating
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Kindle Edition)
by (shelved 4 times as malware)
avg rating 4.35 — 9,658 ratings — published 2019
Rate this book
Clear rating
Rate this book
Clear rating
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (Hardcover)
by (shelved 3 times as malware)
avg rating 4.16 — 8,135 ratings — published 2014
Rate this book
Clear rating
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides (Paperback)
by (shelved 2 times as malware)
avg rating 3.83 — 12 ratings — published 2012
Rate this book
Clear rating
Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks (Hardcover)
by (shelved 2 times as malware)
avg rating 3.94 — 1,861 ratings — published 2023
Rate this book
Clear rating
Malware Data Science: Attack Detection and Attribution Malware Data Science: Attack Detection and Attribution (Kindle Edition)
by (shelved 2 times as malware)
avg rating 3.88 — 52 ratings — published
Rate this book
Clear rating
Rate this book
Clear rating
An Introduction To Keyloggers, RATS And Malware An Introduction To Keyloggers, RATS And Malware (ebook)
by (shelved 2 times as malware)
avg rating 4.00 — 31 ratings — published
Rate this book
Clear rating
Incident Response & Computer Forensics, Third Edition Incident Response & Computer Forensics, Third Edition (Paperback)
by (shelved 2 times as malware)
avg rating 4.33 — 112 ratings — published 2013
Rate this book
Clear rating
The Shellcoder's Handbook: Discovering and Exploiting Security Holes The Shellcoder's Handbook: Discovering and Exploiting Security Holes (Paperback)
by (shelved 2 times as malware)
avg rating 4.15 — 330 ratings — published 2004
Rate this book
Clear rating
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (Paperback)
by (shelved 2 times as malware)
avg rating 4.03 — 550 ratings — published 2012
Rate this book
Clear rating
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler (Paperback)
by (shelved 2 times as malware)
avg rating 4.29 — 176 ratings — published 2008
Rate this book
Clear rating
Art of Computer Virus Research and Defense, The Art of Computer Virus Research and Defense, The (Paperback)
by (shelved 2 times as malware)
avg rating 3.90 — 58 ratings — published 2005
Rate this book
Clear rating
Reversing: Secrets of Reverse Engineering Reversing: Secrets of Reverse Engineering (Paperback)
by (shelved 2 times as malware)
avg rating 4.09 — 546 ratings — published 2005
Rate this book
Clear rating
Malicious Cryptography: Exposing Crytovirology Malicious Cryptography: Exposing Crytovirology (Paperback)
by (shelved 2 times as malware)
avg rating 3.63 — 41 ratings — published 2004
Rate this book
Clear rating
Gray Hat Hacking: The Ethical's Hackers handbook Gray Hat Hacking: The Ethical's Hackers handbook (Kindle Edition)
by (shelved 1 time as malware)
avg rating 4.40 — 5 ratings — published
Rate this book
Clear rating
Rate this book
Clear rating
Computer Viruses: from theory to applications (Collection IRIS) Computer Viruses: from theory to applications (Collection IRIS)
by (shelved 1 time as malware)
avg rating 4.00 — 4 ratings — published 2005
Rate this book
Clear rating
Ethical Hacking With Kali Linux: Learn Fast How To Hack Like A Pro Ethical Hacking With Kali Linux: Learn Fast How To Hack Like A Pro (Kindle Edition)
by (shelved 1 time as malware)
avg rating 3.80 — 5 ratings — published
Rate this book
Clear rating
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions (Kindle Edition)
by (shelved 1 time as malware)
avg rating 3.62 — 16 ratings — published
Rate this book
Clear rating
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards Application Security for the Android Platform: Processes, Permissions, and Other Safeguards (Paperback)
by (shelved 1 time as malware)
avg rating 3.43 — 21 ratings — published 2011
Rate this book
Clear rating
The Art of Mac Malware, Volume 1: The Guide to Analyzing Malicious Software The Art of Mac Malware, Volume 1: The Guide to Analyzing Malicious Software (Paperback)
by (shelved 1 time as malware)
avg rating 4.56 — 32 ratings — published
Rate this book
Clear rating
Hacking Exposed: Malware & Rootkits Secrets & Solutions Hacking Exposed: Malware & Rootkits Secrets & Solutions (Paperback)
by (shelved 1 time as malware)
avg rating 4.17 — 54 ratings — published 2008
Rate this book
Clear rating
Gray Hat Python: Python Programming for Hackers and Reverse Engineers Gray Hat Python: Python Programming for Hackers and Reverse Engineers (Paperback)
by (shelved 1 time as malware)
avg rating 3.94 — 324 ratings — published 2008
Rate this book
Clear rating
Visual Threat Intelligence: An Illustrated Guide For Threat Researcher Visual Threat Intelligence: An Illustrated Guide For Threat Researcher (Kindle Edition)
by (shelved 1 time as malware)
avg rating 4.43 — 61 ratings — published
Rate this book
Clear rating
The Gathering Dark (Magic: The Gathering: Ice Age Cycle, #1) The Gathering Dark (Magic: The Gathering: Ice Age Cycle, #1)
by (shelved 1 time as malware)
avg rating 3.94 — 797 ratings — published 1999
Rate this book
Clear rating
The Eternal Ice (Magic: The Gathering: Ice Age Cycle, #2) The Eternal Ice (Magic: The Gathering: Ice Age Cycle, #2)
by (shelved 1 time as malware)
avg rating 3.94 — 570 ratings — published 2000
Rate this book
Clear rating
The Shattered Alliance (Magic: The Gathering: Ice Age Cycle, #3) The Shattered Alliance (Magic: The Gathering: Ice Age Cycle, #3)
by (shelved 1 time as malware)
avg rating 3.92 — 444 ratings — published 2000
Rate this book
Clear rating
Nexus & Other Stories (Warhammer 40,000) Nexus & Other Stories (Warhammer 40,000)
by (shelved 1 time as malware)
avg rating 3.67 — 275 ratings — published 2020
Rate this book
Clear rating
Black Hat Rust Black Hat Rust (Unknown Binding)
by (shelved 1 time as malware)
avg rating 3.20 — 15 ratings — published
Rate this book
Clear rating
Deeply Odd (Odd Thomas, #6) Deeply Odd (Odd Thomas, #6)
by (shelved 1 time as malware)
avg rating 4.09 — 23,987 ratings — published 2013
Rate this book
Clear rating
Rate this book
Clear rating
Rate this book
Clear rating
Rate this book
Clear rating
The Recursive Book of Recursion: Ace the Coding Interview with Python and JavaScript The Recursive Book of Recursion: Ace the Coding Interview with Python and JavaScript (Kindle Edition)
by (shelved 1 time as malware)
avg rating 4.19 — 43 ratings — published
Rate this book
Clear rating
Harry Potter and the Cursed Child Novel Form Harry Potter and the Cursed Child Novel Form (Kindle Edition)
by (shelved 1 time as malware)
avg rating 3.26 — 1,006 ratings — published
Rate this book
Clear rating
The Tales of Beedle the Bard (Hogwarts Library, #3) The Tales of Beedle the Bard (Hogwarts Library, #3)
by (shelved 1 time as malware)
avg rating 4.03 — 508,665 ratings — published 2008
Rate this book
Clear rating
The Christmas Pig The Christmas Pig (Hardcover)
by (shelved 1 time as malware)
avg rating 4.17 — 39,346 ratings — published 2021
Rate this book
Clear rating
Fairy Tale Fairy Tale (Hardcover)
by (shelved 1 time as malware)
avg rating 4.09 — 326,017 ratings — published 2022
Rate this book
Clear rating
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats (Paperback)
by (shelved 1 time as malware)
avg rating 4.49 — 45 ratings — published 2019
Rate this book
Clear rating
Worm: The First Digital World War Worm: The First Digital World War (Hardcover)
by (shelved 1 time as malware)
avg rating 3.60 — 2,294 ratings — published 2011
Rate this book
Clear rating
The Art of Attack: Attacker Mindset for Security Professionals The Art of Attack: Attacker Mindset for Security Professionals (Paperback)
by (shelved 1 time as malware)
avg rating 3.77 — 64 ratings — published
Rate this book
Clear rating
Rate this book
Clear rating
Rate this book
Clear rating
Black Hat Python: Python Programming for Hackers and Pentesters Black Hat Python: Python Programming for Hackers and Pentesters (Paperback)
by (shelved 1 time as malware)
avg rating 4.11 — 602 ratings — published 2014
Rate this book
Clear rating
Freedom™ (Daemon, #2) Freedom™ (Daemon, #2)
by (shelved 1 time as malware)
avg rating 4.26 — 30,029 ratings — published 2010
Rate this book
Clear rating


“Consider all tabulation systems infected by bad actors until a third party, not affiliated with the manufacturer or election officials, proves they are secure.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“Hacking a national election is simple. Exploit a vulnerability in the manufacturer's network, poison the tabulation software update with self-deleting malware and let the manufacturer send to their field reps and election consultants who update the election systems.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

More quotes...