122 books
—
117 voters
Malware Books
Showing 1-50 of 78
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)
by (shelved 9 times as malware)
avg rating 4.48 — 604 ratings — published 2011
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code (Paperback)
by (shelved 6 times as malware)
avg rating 4.21 — 184 ratings — published 2010
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory (Paperback)
by (shelved 5 times as malware)
avg rating 4.34 — 125 ratings — published 2014
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware (Kindle Edition)
by (shelved 4 times as malware)
avg rating 4.17 — 35 ratings — published
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Kindle Edition)
by (shelved 4 times as malware)
avg rating 4.34 — 9,938 ratings — published 2019
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (Hardcover)
by (shelved 4 times as malware)
avg rating 4.17 — 8,262 ratings — published 2014
Windows Malware Analysis Essentials: Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set (Paperback)
by (shelved 4 times as malware)
avg rating 4.29 — 7 ratings — published 2015
An Introduction To Keyloggers, RATS And Malware (ebook)
by (shelved 3 times as malware)
avg rating 3.91 — 33 ratings — published
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides (Paperback)
by (shelved 2 times as malware)
avg rating 3.83 — 12 ratings — published 2012
Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks (Hardcover)
by (shelved 2 times as malware)
avg rating 3.94 — 1,948 ratings — published 2023
Malware Data Science: Attack Detection and Attribution (Kindle Edition)
by (shelved 2 times as malware)
avg rating 3.88 — 52 ratings — published
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks (Kindle Edition)
by (shelved 2 times as malware)
avg rating 4.28 — 25 ratings — published
Incident Response & Computer Forensics, Third Edition (Paperback)
by (shelved 2 times as malware)
avg rating 4.34 — 113 ratings — published 2013
The Shellcoder's Handbook: Discovering and Exploiting Security Holes (Paperback)
by (shelved 2 times as malware)
avg rating 4.15 — 331 ratings — published 2004
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (Paperback)
by (shelved 2 times as malware)
avg rating 4.03 — 551 ratings — published 2012
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler (Paperback)
by (shelved 2 times as malware)
avg rating 4.29 — 176 ratings — published 2008
Art of Computer Virus Research and Defense, The (Paperback)
by (shelved 2 times as malware)
avg rating 3.90 — 58 ratings — published 2005
Reversing: Secrets of Reverse Engineering (Paperback)
by (shelved 2 times as malware)
avg rating 4.09 — 545 ratings — published 2005
Malicious Cryptography: Exposing Crytovirology (Paperback)
by (shelved 2 times as malware)
avg rating 3.63 — 41 ratings — published 2004
Official (ISC)2 Guide to the CISSP CBK
by (shelved 1 time as malware)
avg rating 3.78 — 95 ratings — published 2014
The Tangled Web: A Guide to Securing Modern Web Applications (Paperback)
by (shelved 1 time as malware)
avg rating 4.04 — 554 ratings — published 2011
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World (Hardcover)
by (shelved 1 time as malware)
avg rating 3.74 — 2,381 ratings — published 2019
The Cybersecurity Mesh Architecture: Composable, flexible, and scalable security approach for a resilient security ecosystem (English Edition)
by (shelved 1 time as malware)
avg rating 5.00 — 1 rating — published
Advanced Penetration Testing: Hacking the World's Most Secure Networks (Paperback)
by (shelved 1 time as malware)
avg rating 4.24 — 132 ratings — published
Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy (Hardcover)
by (shelved 1 time as malware)
avg rating 4.21 — 122 ratings — published
Android Security Internals: An In-Depth Guide to Android's Security Architecture (Paperback)
by (shelved 1 time as malware)
avg rating 3.94 — 65 ratings — published 2014
Gray Hat Hacking: The Ethical's Hackers handbook (Kindle Edition)
by (shelved 1 time as malware)
avg rating 4.40 — 5 ratings — published
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly (Paperback)
by (shelved 1 time as malware)
avg rating 4.51 — 73 ratings — published
Computer Viruses: from theory to applications (Collection IRIS)
by (shelved 1 time as malware)
avg rating 4.00 — 4 ratings — published 2005
Ethical Hacking With Kali Linux: Learn Fast How To Hack Like A Pro (Kindle Edition)
by (shelved 1 time as malware)
avg rating 3.80 — 5 ratings — published
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions (Kindle Edition)
by (shelved 1 time as malware)
avg rating 3.62 — 16 ratings — published
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards (Paperback)
by (shelved 1 time as malware)
avg rating 3.43 — 21 ratings — published 2011
The Art of Mac Malware, Volume 1: The Guide to Analyzing Malicious Software (Paperback)
by (shelved 1 time as malware)
avg rating 4.59 — 34 ratings — published
Hacking Exposed: Malware & Rootkits Secrets & Solutions (Paperback)
by (shelved 1 time as malware)
avg rating 4.13 — 55 ratings — published 2008
Gray Hat Python: Python Programming for Hackers and Reverse Engineers (Paperback)
by (shelved 1 time as malware)
avg rating 3.94 — 323 ratings — published 2008
Visual Threat Intelligence: An Illustrated Guide For Threat Researcher (Kindle Edition)
by (shelved 1 time as malware)
avg rating 4.41 — 63 ratings — published
The Gathering Dark (Magic: The Gathering: Ice Age Cycle, #1)
by (shelved 1 time as malware)
avg rating 3.94 — 802 ratings — published 1999
The Eternal Ice (Magic: The Gathering: Ice Age Cycle, #2)
by (shelved 1 time as malware)
avg rating 3.93 — 578 ratings — published 2000
The Shattered Alliance (Magic: The Gathering: Ice Age Cycle, #3)
by (shelved 1 time as malware)
avg rating 3.92 — 449 ratings — published 2000
Nexus & Other Stories (Warhammer 40,000)
by (shelved 1 time as malware)
avg rating 3.66 — 278 ratings — published 2020
Black Hat Rust (Unknown Binding)
by (shelved 1 time as malware)
avg rating 3.19 — 16 ratings — published
Deeply Odd (Odd Thomas, #6)
by (shelved 1 time as malware)
avg rating 4.09 — 24,158 ratings — published 2013
Detection of Intrusions and Malware, and Vulnerability Assessment: Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings (Lecture Notes in Computer Science, 4064)
by (shelved 1 time as malware)
avg rating 4.50 — 2 ratings — published 2006
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedings (Lecture Notes in Computer Science, 5137)
by (shelved 1 time as malware)
avg rating 4.33 — 3 ratings — published 2008
Detection of Intrusions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings (Lecture Notes in Computer Science, 3548)
by (shelved 1 time as malware)
avg rating 4.33 — 3 ratings — published 2005
The Recursive Book of Recursion: Ace the Coding Interview with Python and JavaScript (Kindle Edition)
by (shelved 1 time as malware)
avg rating 4.23 — 47 ratings — published
Harry Potter and the Cursed Child Novel Form (Kindle Edition)
by (shelved 1 time as malware)
avg rating 3.27 — 1,007 ratings — published
The Tales of Beedle the Bard (Hogwarts Library, #3)
by (shelved 1 time as malware)
avg rating 4.03 — 511,246 ratings — published 2008
The Christmas Pig (Hardcover)
by (shelved 1 time as malware)
avg rating 4.17 — 41,283 ratings — published 2021
Fairy Tale (Hardcover)
by (shelved 1 time as malware)
avg rating 4.09 — 335,303 ratings — published 2022
Information Security, Penetration Testing, Social Engineering, Counter-Intelligence, Hacker/Hacking Culture and History.
More lists...
“In an age of dynamic malware obfuscation through operations such as mutating hash, a hyper-evolving threat landscape, and technologically next generation adversaries, offensive campaigns have an overwhelming advantage over defensive strategies.”
―
―
“Consider all tabulation systems infected by bad actors until a third party, not affiliated with the manufacturer or election officials, proves they are secure.”
―
―











