Books

Search for your next book varying from technical training, to story-based topics.

Note: All book titles are hyperlinked to Amazon.

Technical

Black Hat Python by Justin Seitz

Expore the dark sit of Python’s capabilities, writing network sniffers, packet manipulation, virtual machine infection, creating hidden trojans and much more in this book. Understand how to create powerful and effective hacking tools using one of the most popular langauges in the security industry. This book uses Python 2.

Violent Python by TJ O’Connor

Apply your theoritical understanding of offensive computing concepts using a practical approach. Create your own weapons using the Python programming language, learn how to automate large-scale network attacks, extract metadata, and invesitgate forensic artifiacts, build wireless tools to attack wireless devices, data-mine popular social media webistes and much more. This book uses Python 2.

Learn C the Hard Way by Zed A. Shaw

In this book, follow and learn from an expert to teach you the foundations of C and the programming language. Apply your knowledge through practical projects, with 52 exercises included to help you understand the concepts taught in this book. C is one of the most important and powerful languages used in the cybersecurity industry.

Practical Malware Analysis by Michael Sikorksi

Learn the tools and techniques used by professional analysts to safely analyze, debug, and dissassemble any malicous software. Setup up a safe virtual environmen to analyze malware, learn the tricks malware uses to stay stealthy, analyze special cases malware with shellcode, C++, and 65-bit code, develop a methodology for unpacking malware and much more.

Malware Data Science: Attack Detection and Attribution by Joshua Saxe

Introduce yourself to malware detection and analysis by using modern methods, such as machine learning, statistics, social network analysis, and data visulization. Identify, observe, and analyze malware through data visualization and detection.

Serious Cryptography: A Practical Introduction to Modern Encryption by Jean-Philippe Aumasson

This practical guide to modern encryption breaks down the key concepts in cryptography. Learn the fundamental mathematical concepts at the heart of cryptography such as authenticated encryption, secure randomness, hash functions, block ciphers, and public-key cryptography.

Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali by OccupyTheWeb

Use Kali Linux to learn the basics of the Linux operating systems and acquire the tools and techniques you’ll need to effectively use to take control of a Linux environment.

Applied Network Security Monitoring by Chris Sanders & Jason Smith

Learn the fundamental approach to network security monitoring (NSM) through following the three stages of the NSM cycle: collection, detection, and analysis. Grow your analytic techniques to make you more effective at monitoring the network.

The Practice of Network Security Monitoring: Understanding Incident Detection and Response by Richard Bejtlich

Learn how to use network security monitoring (NSM) to add a robust layer of protection around your networks. Determine where to deploy NSM platforms, use the command line and graphical analysis packet tools to integreate threat intelligence into NSM software.

Applied Incident Response by Steve Anson

Understand effective ways to respond to advanced attacks against local and remote network resources. Use the latest techniques for responding to threats against your network.

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems by Chris Sanders

It’s easy to capture packets from Wireshark… But learning how to use those packets to understand what’s happening on your network is a whole other topic. In this book, learn how to analyze packet captures so you can better troubleshoot network problems.

Nmap 6 Cookbook: The Fat-Free Guide to Network Security Scanning by Nicholas Marsh

This books provides simplified coverage of network scanning features in the Nmap suite. Learn Nmap through visual examples to help you quickly understand the concepts and uses of this suite.

Hacking: The Art of Exploitation by Jon Erickson

Rather than learning about existing exploits, learn how hacking techniques actually work. Use this book to follow along and fill your gaps of knowledge. Understand the fundamentals of C programming from a hacker’s prospective, debug code, hijack network communications, and much more.

Blue Team Field Manual by Alan White

A guide that aligns with the NIST Cybersecurity Frameowrk consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover. Understand the tatical steps to follow and commands to use for preparing and recovering for a cyber security incident.

Blue & Red Team Field Manual by Alan White & Ben Clark

A guide that aligns with the NIST Cybersecurity Frameowrk consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover. Understand the tatical steps to follow and commands to use for preparing and recovering for a cyber security incident.

Real-World Bug Hunting: A Field Guide to Web Hacking by Peter Yaworksi

Learn the most common types of bugs such as cross-site scripting, insecure direct object references, and server-side request forgery, and much more so you can secure weaknesses on websites.

Security Testing with Raspberry Pi by Daniel Dieterle

Learn how to install Kali Linux on a Raspberry Pi while sharpening your skills on ethical hacking. Build a small-scale pentesting lab, use the ethical hacking tools inlcuded in Raspbian, and use Kali-Pi to apply your knowledge.

Story

Ghost in the Wires by Kevin Mitnick

Read about the thrilling true story about one of the most elusive computer hackers of our era, Kevin Mitnick. Ghost in the Wires details the story of Kevin Mitnick and his adventures in being the world’s most wanted hacker at one point. Understand Mitnick’s techniques to play the game of hide-and-seek with the Feds.

The Art of Deception by Kevin Mitnick

As one of the world’s most infamous hackers, Kevin Mitnick explains why no amount of encryption protocols and firewalls will ever be enough to stop a savvy grifter with the intent of breaking into a corporate network. Mitnick explians why and how social engineering works and how the human element of security is the most critical part of information security.

The Art of Invisibility by Kevin Mitnick

Privacy may very well be a thing of the past… But with Mitnick’s methodology and technqiues, learn how to be online without ever leaving a trace. In this book, Kevin Mitnick uses true-life stories to show you what is happening behind the scenes and how you can protect yourself and your family from corporate and government surveillance.

Cybersecurity and Cyberwar: What Everyone Needs to Know by Allan Friedman & P.W. Singer

P.W. Singer and cyber expert Allan Friedman team up to provide an easy-to-read, deeply informative, and resourceful book about cyberspace. The book is structured around three key questions in regard to cyberspace and security: how does it all work, why does this matter, and what can we do?

Spam Nation by Brian Krebs

Investigative journalist and cybersecurity expert Brian Krebs unmask the criminal masterminds driving some of the biggest spam, scam, and hacker operations targeting American’s wallets. Read about the fastinating, investigative story about some of the shocking discoveries and lengths computer criminals will go to receive profit.

Data and Goliath by Bruce Schneier

We live in a world of big data, with corporations and government agencies tracking every single online step of yours. Security expert Bruce Schneier offers a path that values both security and privacy. He shows you exactly what you can do to reform government surveillance programs and protect individual privacy while forging an effective and safe digital future.

The Code Book by Simon Singh

The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy. Singh offers the intriguing developments of encryiption throughout human history, revealing the dramatic effects encryption, ciphers, and codes had on wars, nations, and individual lives.

Future Crimes by Marc Goodman

Marc Goodman takes readers deep into the digital underground to expose the alarming ways criminals, corporations, and countries are using modern technology against you. Get a mind-blowing glimpse into the dark side of technological innovation and the unprecedented consequences of the connected world we live in.

The Cuckoo’s Egg by Clifford Stall

Read about the fascinating story of how a manager at Lawrence Berkeley Lab went on the hunt to spy on a spy. Stoll details his story about the dangerous game of deception, broken codes, and operations of getting more insight into the spying operations who’s code name was “Hunter.”