Malware Books

Showing 1-50 of 78
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)
by (shelved 9 times as malware)
avg rating 4.48 — 604 ratings — published 2011
Rate this book
Clear rating
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code (Paperback)
by (shelved 6 times as malware)
avg rating 4.21 — 184 ratings — published 2010
Rate this book
Clear rating
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory (Paperback)
by (shelved 5 times as malware)
avg rating 4.34 — 125 ratings — published 2014
Rate this book
Clear rating
Rate this book
Clear rating
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Kindle Edition)
by (shelved 4 times as malware)
avg rating 4.34 — 9,938 ratings — published 2019
Rate this book
Clear rating
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (Hardcover)
by (shelved 4 times as malware)
avg rating 4.17 — 8,262 ratings — published 2014
Rate this book
Clear rating
Rate this book
Clear rating
An Introduction To Keyloggers, RATS And Malware An Introduction To Keyloggers, RATS And Malware (ebook)
by (shelved 3 times as malware)
avg rating 3.91 — 33 ratings — published
Rate this book
Clear rating
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides (Paperback)
by (shelved 2 times as malware)
avg rating 3.83 — 12 ratings — published 2012
Rate this book
Clear rating
Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks (Hardcover)
by (shelved 2 times as malware)
avg rating 3.94 — 1,948 ratings — published 2023
Rate this book
Clear rating
Malware Data Science: Attack Detection and Attribution Malware Data Science: Attack Detection and Attribution (Kindle Edition)
by (shelved 2 times as malware)
avg rating 3.88 — 52 ratings — published
Rate this book
Clear rating
Rate this book
Clear rating
Incident Response & Computer Forensics, Third Edition Incident Response & Computer Forensics, Third Edition (Paperback)
by (shelved 2 times as malware)
avg rating 4.34 — 113 ratings — published 2013
Rate this book
Clear rating
The Shellcoder's Handbook: Discovering and Exploiting Security Holes The Shellcoder's Handbook: Discovering and Exploiting Security Holes (Paperback)
by (shelved 2 times as malware)
avg rating 4.15 — 331 ratings — published 2004
Rate this book
Clear rating
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (Paperback)
by (shelved 2 times as malware)
avg rating 4.03 — 551 ratings — published 2012
Rate this book
Clear rating
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler (Paperback)
by (shelved 2 times as malware)
avg rating 4.29 — 176 ratings — published 2008
Rate this book
Clear rating
Art of Computer Virus Research and Defense, The Art of Computer Virus Research and Defense, The (Paperback)
by (shelved 2 times as malware)
avg rating 3.90 — 58 ratings — published 2005
Rate this book
Clear rating
Reversing: Secrets of Reverse Engineering Reversing: Secrets of Reverse Engineering (Paperback)
by (shelved 2 times as malware)
avg rating 4.09 — 545 ratings — published 2005
Rate this book
Clear rating
Malicious Cryptography: Exposing Crytovirology Malicious Cryptography: Exposing Crytovirology (Paperback)
by (shelved 2 times as malware)
avg rating 3.63 — 41 ratings — published 2004
Rate this book
Clear rating
Official (ISC)2 Guide to the CISSP CBK Official (ISC)2 Guide to the CISSP CBK
by (shelved 1 time as malware)
avg rating 3.78 — 95 ratings — published 2014
Rate this book
Clear rating
The Tangled Web: A Guide to Securing Modern Web Applications The Tangled Web: A Guide to Securing Modern Web Applications (Paperback)
by (shelved 1 time as malware)
avg rating 4.04 — 554 ratings — published 2011
Rate this book
Clear rating
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World (Hardcover)
by (shelved 1 time as malware)
avg rating 3.74 — 2,381 ratings — published 2019
Rate this book
Clear rating
Rate this book
Clear rating
Advanced Penetration Testing: Hacking the World's Most Secure Networks Advanced Penetration Testing: Hacking the World's Most Secure Networks (Paperback)
by (shelved 1 time as malware)
avg rating 4.24 — 132 ratings — published
Rate this book
Clear rating
Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy (Hardcover)
by (shelved 1 time as malware)
avg rating 4.21 — 122 ratings — published
Rate this book
Clear rating
Android Security Internals: An In-Depth Guide to Android's Security Architecture Android Security Internals: An In-Depth Guide to Android's Security Architecture (Paperback)
by (shelved 1 time as malware)
avg rating 3.94 — 65 ratings — published 2014
Rate this book
Clear rating
Gray Hat Hacking: The Ethical's Hackers handbook Gray Hat Hacking: The Ethical's Hackers handbook (Kindle Edition)
by (shelved 1 time as malware)
avg rating 4.40 — 5 ratings — published
Rate this book
Clear rating
Rate this book
Clear rating
Computer Viruses: from theory to applications (Collection IRIS) Computer Viruses: from theory to applications (Collection IRIS)
by (shelved 1 time as malware)
avg rating 4.00 — 4 ratings — published 2005
Rate this book
Clear rating
Ethical Hacking With Kali Linux: Learn Fast How To Hack Like A Pro Ethical Hacking With Kali Linux: Learn Fast How To Hack Like A Pro (Kindle Edition)
by (shelved 1 time as malware)
avg rating 3.80 — 5 ratings — published
Rate this book
Clear rating
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions (Kindle Edition)
by (shelved 1 time as malware)
avg rating 3.62 — 16 ratings — published
Rate this book
Clear rating
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards Application Security for the Android Platform: Processes, Permissions, and Other Safeguards (Paperback)
by (shelved 1 time as malware)
avg rating 3.43 — 21 ratings — published 2011
Rate this book
Clear rating
The Art of Mac Malware, Volume 1: The Guide to Analyzing Malicious Software The Art of Mac Malware, Volume 1: The Guide to Analyzing Malicious Software (Paperback)
by (shelved 1 time as malware)
avg rating 4.59 — 34 ratings — published
Rate this book
Clear rating
Hacking Exposed: Malware & Rootkits Secrets & Solutions Hacking Exposed: Malware & Rootkits Secrets & Solutions (Paperback)
by (shelved 1 time as malware)
avg rating 4.13 — 55 ratings — published 2008
Rate this book
Clear rating
Gray Hat Python: Python Programming for Hackers and Reverse Engineers Gray Hat Python: Python Programming for Hackers and Reverse Engineers (Paperback)
by (shelved 1 time as malware)
avg rating 3.94 — 323 ratings — published 2008
Rate this book
Clear rating
Visual Threat Intelligence: An Illustrated Guide For Threat Researcher Visual Threat Intelligence: An Illustrated Guide For Threat Researcher (Kindle Edition)
by (shelved 1 time as malware)
avg rating 4.41 — 63 ratings — published
Rate this book
Clear rating
The Gathering Dark (Magic: The Gathering: Ice Age Cycle, #1) The Gathering Dark (Magic: The Gathering: Ice Age Cycle, #1)
by (shelved 1 time as malware)
avg rating 3.94 — 802 ratings — published 1999
Rate this book
Clear rating
The Eternal Ice (Magic: The Gathering: Ice Age Cycle, #2) The Eternal Ice (Magic: The Gathering: Ice Age Cycle, #2)
by (shelved 1 time as malware)
avg rating 3.93 — 578 ratings — published 2000
Rate this book
Clear rating
The Shattered Alliance (Magic: The Gathering: Ice Age Cycle, #3) The Shattered Alliance (Magic: The Gathering: Ice Age Cycle, #3)
by (shelved 1 time as malware)
avg rating 3.92 — 449 ratings — published 2000
Rate this book
Clear rating
Nexus & Other Stories (Warhammer 40,000) Nexus & Other Stories (Warhammer 40,000)
by (shelved 1 time as malware)
avg rating 3.66 — 278 ratings — published 2020
Rate this book
Clear rating
Black Hat Rust Black Hat Rust (Unknown Binding)
by (shelved 1 time as malware)
avg rating 3.19 — 16 ratings — published
Rate this book
Clear rating
Deeply Odd (Odd Thomas, #6) Deeply Odd (Odd Thomas, #6)
by (shelved 1 time as malware)
avg rating 4.09 — 24,158 ratings — published 2013
Rate this book
Clear rating
Rate this book
Clear rating
Rate this book
Clear rating
Rate this book
Clear rating
The Recursive Book of Recursion: Ace the Coding Interview with Python and JavaScript The Recursive Book of Recursion: Ace the Coding Interview with Python and JavaScript (Kindle Edition)
by (shelved 1 time as malware)
avg rating 4.23 — 47 ratings — published
Rate this book
Clear rating
Harry Potter and the Cursed Child Novel Form Harry Potter and the Cursed Child Novel Form (Kindle Edition)
by (shelved 1 time as malware)
avg rating 3.27 — 1,007 ratings — published
Rate this book
Clear rating
The Tales of Beedle the Bard (Hogwarts Library, #3) The Tales of Beedle the Bard (Hogwarts Library, #3)
by (shelved 1 time as malware)
avg rating 4.03 — 511,246 ratings — published 2008
Rate this book
Clear rating
The Christmas Pig The Christmas Pig (Hardcover)
by (shelved 1 time as malware)
avg rating 4.17 — 41,283 ratings — published 2021
Rate this book
Clear rating
Fairy Tale Fairy Tale (Hardcover)
by (shelved 1 time as malware)
avg rating 4.09 — 335,303 ratings — published 2022
Rate this book
Clear rating


“In an age of dynamic malware obfuscation through operations such as mutating hash, a hyper-evolving threat landscape, and technologically next generation adversaries, offensive campaigns have an overwhelming advantage over defensive strategies.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“Consider all tabulation systems infected by bad actors until a third party, not affiliated with the manufacturer or election officials, proves they are secure.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

More quotes...