100 Best Security Books of All Time

We've researched and ranked the best security books in the world, based on recommendations from world experts, sales data, and millions of reader ratings. Learn more

Featuring recommendations from Reid Hoffman, Bill Gates, Warren Buffett, and 65 other experts.
1
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logistical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.

Throughout the text are clear...
more
Recommended by Stephen Kinsella, and 1 others.

Stephen Kinsella@gavreilly @SLSingh Love that book (Source)

See more recommendations for this book...

2
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack... more

See more recommendations for this book...

3
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.
 
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
more
Recommended by Josephine Wolff, and 1 others.

Josephine WolffAs a book, Countdown to Day Zero is a stunning example of a case study, of really diving into a cyber security incident. She takes on the very technical material—getting into the malware and the question of how do these SCADA machines work and how does this piece of software compromise them—but then also brings in this really rich and complicated geopolitical conflict that this is happening as a... (Source)

See more recommendations for this book...

4

The Cuckoo's Egg

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error...
more
Recommended by Rick Klau, James Stanley, and 2 others.

Rick Klau@AtulAcharya @stevesi Same. Read it in college, realized I was more excited about the tech than what I was studying -- and Cliff did such a great job helping you understand what was going on. Such a great book. (Source)

James Stanley"The Cuckoo's Egg" by Clifford Stoll is another great book. I believe it's the first documented account of a computer being misused by a remote attacker. It talks about how Clifford attached physical teleprinters to the incoming phone lines so that he could see what the attacker was actually doing on the computer, and how he traced the attacker across several countries. (Source)

See more recommendations for this book...

5

Hacking

The Art of Exploitation

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C...
more

See more recommendations for this book...

6

Ghost in the Wires

My Adventures as the World's Most Wanted Hacker

If they were a hall of fame or shame for computer hackers, a Kevin Mitnick plaque would be mounted the near the entrance. While other nerds were fumbling with password possibilities, this adept break-artist was penetrating the digital secrets of Sun Microsystems, Digital Equipment Corporation, Nokia, Motorola, Pacific Bell, and other mammoth enterprises. His Ghost in the Wires memoir paints an action portrait of a plucky loner motivated by a passion for trickery, not material game. (P.S. Mitnick's capers have already been the subject of two books and a movie. This first-person account is...

more

Richard BejtlichIn 2002 I reviewed Kevin Mitnick's first book, The Art of Deception. In 2005 I reviewed his second book, The Art of Intrusion. I gave both books four stars. Mitnick's newest book, however, with long-time co-author Bill Simon, is a cut above their previous collaborations and earns five stars. As far as I can tell (and I am no Mitnick expert, despite reading almost all previous texts mentioning... (Source)

Antonio EramThis book was recommended by Antonio when asked for titles he would recommend to young people interested in his career path. (Source)

Nick JanetakisI'm going to start reading Ghost in the Wires by Kevin Mitnick this week. I used to go to 2600 meetings back when he was arrested for wire fraud and other hacking related shenanigans in the mid 1990s. I'm fascinated by things like social engineering and language in general. In the end, I just want to be entertained by his stories. For someone who is into computer programming, a book like this... (Source)

See more recommendations for this book...

7
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more. less
Recommended by Ben Goldacre, and 1 others.

Ben Goldacre@szbalint it's such a great book, i've always said @rossjanderson should release it in chunks as pop science books. the massive textbook shape doesn't do its accessibility, readability and content justice! (Source)

See more recommendations for this book...

8
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a...
more

See more recommendations for this book...

9

The Art of War

For more than two thousand years, The Art of War has stood as a cornerstone of Chinese culture-a lucid epigrammatic text that reveals as much about human psychology, politics, and economics as it does about battlefield strategy. The influence of Sun-tzu's text has grown tremendously in the West in recent years, with military leaders, politicians, and corporate executives alike finding valuable insight in these ancient words. In his crisp, accessible new translation, scholar John Minford brings this seminal work to life for modern readers.

Minford opens with a lively,...
more

Reid HoffmanReid read Carl von Clausewitz and Sun Tzu as a boy, which informed his strategic thinking. (Source)

Neil deGrasse TysonWhich books should be read by every single intelligent person on planet? [...] The Art of War (Sun Tsu) [to learn that the act of killing fellow humans can be raised to an art]. If you read all of the above works you will glean profound insight into most of what has driven the history of the western world. (Source)

Evan SpiegelAfter meeting Mark Zuckerberg, [Evan Spiegel] immediately bought every [Snapchat] employee a copy of 'The Art Of War'. (Source)

See more recommendations for this book...

10
Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.

The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the...
more

See more recommendations for this book...

Don't have time to read the top Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
11
"…the best introduction to cryptography I've ever seen. … The book the National Security Agency wanted never to be published." –Wired Magazine

"…monumental… fascinating… comprehensive… the definitive work on cryptography for computer programmers…" –Dr. Dobb's Journal

"…easily ranks as one of the most authoritative in its field." —PC Magazine

"…the bible of code hackers." –The Millennium Whole Earth Catalog

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers...
more
Recommended by Dominic Steil, and 1 others.

Dominic Steil[One of the five books recommends to young people interested in his career path.] (Source)

See more recommendations for this book...

12
Viruses. Identity Theft. Corporate Espionage. National secrets compromised. Can anyone promise security in our digital world?

The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.

This edition updated with new information about post-9/11 security.
less

See more recommendations for this book...

13

The Autobiography of Malcolm X

With its first great victory in the landmark Supreme Court decision Brown v. Board of Education in 1954, the civil rights movement gained the powerful momentum it needed to sweep forward into its crucial decade, the 1960s. As voices of protest and change rose above the din of history and false promises, one voice sounded more urgently, more passionately, than the rest. Malcolm X—once called the most dangerous man in America—challenged the world to listen and learn the truth as he experienced it. And his enduring message is as relevant today as when he first delivered it.

In the...
more

Casey NeistatAside from The Autobiography of Malcolm X, Casey's favorite book is The Second World War by John Keegan. (Source)

Ryan HolidayI forget who said it but I heard someone say that Catcher in the Rye was to young white boys what the Autobiography of Malcolm X was to young black boys. Personally, I prefer that latter over the former. I would much rather read about and emulate a man who is born into adversity and pain, struggles with criminality, does prison time, teaches himself to read through the dictionary, finds religion... (Source)

Keith EllisonMalcolm X is somebody that everybody in America’s prisons today could look at and say, ‘You know what, I can emerge, I can evolve' (Source)

See more recommendations for this book...

14
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.

For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.

You'll learn how to:


Set up a safe virtual environment to analyze...
more

See more recommendations for this book...

15

Metasploit

The Penetration Tester's Guide

"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit ProjectThe Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.

Once you've built your foundation for penetration testing, you'll learn the...
more

See more recommendations for this book...

16

The Help

Three ordinary women are about to take one extraordinary step.

Twenty-two-year-old Skeeter has just returned home after graduating from Ole Miss. She may have a degree, but it is 1962, Mississippi, and her mother will not be happy till Skeeter has a ring on her finger. Skeeter would normally find solace with her beloved maid Constantine, the woman who raised her, but Constantine has disappeared and no one will tell Skeeter where she has gone.

Aibileen is a black maid, a wise, regal woman raising her seventeenth white child. Something has shifted inside her after the loss...
more
Recommended by Twin Mummy And Daddy, and 1 others.

Twin Mummy And DaddyI love a good book and The Help is exactly that! In fact it’s an amazing book! Read my review over on the blog today! https://t.co/efaf9aRGOK #TheHelp #KathrynStockett #bookreview #bookblogger #mummybloggers #daddybloggers #pbloggers #mbloggers @UKpbloggers @UKBloggers1 #books (Source)

See more recommendations for this book...

17

Axel (Corps Security, #1)

Fate hasn’t always been friends with Isabelle West. In fact, fate has been a downright bitch.

Isabelle has learned the hard way how hard life can be when fate isn’t by your side. It can hand you dreams on silver platters, but it can snatch them right back and hand you nightmares. One thing Isabelle knew for sure fate was consistent with was taking away everything she ever loved.

For the last two years Isabelle has been slowly clearing the clouds of her past. Happiness is finally on the horizon. She has a thriving business, great friends, and her life back. All she has...
more

See more recommendations for this book...

18
The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network.

The word spread through the hacking underground like some unstoppable new virus: an audacious crook had staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy.

The culprit was a brilliant programmer with a hippie ethic and a supervillain's double identity. Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As...
more
Recommended by Vinod Khosla, Vinod Khosla, and 2 others.

See more recommendations for this book...

19

Permanent Record

Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.

In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with...
more
Recommended by John Sargent, Kara Swisher, and 2 others.

John SargentEdward Snowden decided at the age of 29 to give up his entire future for the good of his country. He displayed enormous courage in doing so, and like him or not, his is an incredible American story. There is no doubt that the world is a better and more private place for his actions. Macmillan is enormously proud to publish Permanent Record. (Source)

Kara SwisherBtw @Snowden new book “Permanent Record” is quite good and surprisingly a love letter to the Internet as it was. (Source)

See more recommendations for this book...

20
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches,...
more

See more recommendations for this book...

Don't have time to read the top Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
21
Harden the human firewall against the most current threats

Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we...
more

See more recommendations for this book...

22

Cryptography Engineering

Design Principles and Practical Applications

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many... more

See more recommendations for this book...

23
The greatest investment advisor of the twentieth century, Benjamin Graham taught and inspired people worldwide. Graham's philosophy of "value investing" -- which shields investors from substantial error and teaches them to develop long-term strategies -- has made The Intelligent Investor the stock market bible ever since its original publication in 1949. less

Warren BuffettTo invest successfully over a lifetime does not require a stratospheric IQ, unusual business insights, or inside information. What's needed is a sound intellectual framework for making decisions and the ability to keep emotions from corroding that framework. This book precisely and clearly prescribes the proper framework. You must provide the emotional discipline. (Source)

Kevin RoseThe foundation for investing. A lot of people have used this as their guide to getting into investment, basic strategies. Actually Warren Buffett cites this as the book that got him into investing and he says that principles he learned here helped him to become a great investor. Highly recommend this book. It’s a great way understand what’s going on and how to evaluate different companies out... (Source)

John KayThe idea is that you look at the underlying value of the company’s activities instead of relying on market gossip. (Source)

See more recommendations for this book...

24
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering...
more

See more recommendations for this book...

25
There is a Threat Lurking Online with the Power to Destroy Your Finances, Steal Your Personal Data, and Endanger Your Life.

In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies-and countless viruses, phishing, and spyware attacks-he delivers the first definitive narrative of the global spam problem and its threat to...
more
Recommended by Josephine Wolff, and 1 others.

Josephine WolffBrian Krebs is really more deeply reported on financial cyber criminals than almost anybody in the world.He’s really smart about the ways in which money drives a lot of these cyber crimes. (Source)

See more recommendations for this book...

26

Beck (Corps Security, #3)

Dee
I’ve always been good at wearing masks. Not letting anyone see the real me. I’m content being the happy-go-lucky best friend. The strong willed boss. The independent woman who doesn’t need a man.

But the truth is I’m just as broken as the rest of you. I’m terrified that all it will take is one person to make all my carefully constructed walls crumble into fine dust. So I guard my heart with everything I have. Determined to never let anyone get close enough to hurt me again.

All is perfect until HE walks into my life. No… he doesn’t just walk. He struts...
more

See more recommendations for this book...

27

Locke (Corps Security, #5)

Darkness is the only thing I see. Ever since the day my life changed. The day that everything and everyone I held close to me ceased to exist. The day I lost it all and the demons of my past consumed my every waking moment. I tried to keep others at arm's length. Tried not to let my darkness taint them. Ruin them. Harm them. And whether I want to admit it or not, as much as I wish I could keep them locked out, they refuse to leave. Refuse to let me suffer alone. If I hadn't been so focused on keeping those demons from flying free, I wouldn't have missed how one perfect angel was able to sneak... more

See more recommendations for this book...

28
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data.

Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he...
more

See more recommendations for this book...

29

Cage (Corps Security, #2)

Greg Cage was born to protect. While growing up, he was his mother and sister’s shield against the world… until he failed. For the last decade, he has carried that guilt and need for vengeance around… until it was stripped from him. Now, with his best friend getting married and no longer needing his protection, he is even more lost, completely adrift, and desperate for some control. All he has ever known was how to protect: his family, his friends, and his country. Can he go against everything he has ever known, and give up that control?

Melissa Larson will never let anyone hold...
more

See more recommendations for this book...

Don't have time to read the top Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
31
The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page. The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations... more

See more recommendations for this book...

32
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse...
more

See more recommendations for this book...

33

Digital Fortress

When the National Security Agency's invincible code-breaking machine encounters a mysterious code it cannot break, the agency calls its head cryptographer, Susan Fletcher, a brilliant and beautiful mathematician. What she uncovers sends shock waves through the corridors of power. The NSA is being held hostage... not by guns or bombs, but by a code so ingeniously complex that if released it would cripple U.S. intelligence.

Caught in an accelerating tempest of secrecy and lies, Susan Fletcher battles to save the agency she believes in. Betrayed on all sides, she finds herself...
more

See more recommendations for this book...

34
From Wired senior writer Andy Greenberg comes the true story of the desperate hunt to identify and track an elite team of Russian agents bent on digital sabotage

In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers. The attacks culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's...
more

Ben LoricaI am in the middle of Sandworm by @a_greenberg and it is great read. I have a feeling that recent events in the Middle East will result in cyberattacks similar to those in this book https://t.co/qLM5Z7YAdl (Source)

Laurence TribeVote augmentation looks like the newest form of election manipulation. It was a favorite Putin/GRU technique in Estonia, Georgia, and Ukraine. See Andy Greenberg’s book “Sandworm.” https://t.co/0i9NSdUvzs (Source)

Jack Rhysider@selenalarson @a_greenberg wrote a great book (Source)

See more recommendations for this book...

35
By Glenn Greenwald, star of Citizenfour, the Academy Award-winning documentary on Edward Snowden

In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the twenty-nine-year-old NSA contractor Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a...
more
Recommended by Gilbert Rwabigwi, and 1 others.

Gilbert RwabigwiYour book, “No Place To Hide”, was a thrilling/insightful read. Can’t wait to flip through @Snowden’s memoir. 🙏🏾 https://t.co/pZPLxDpNcM (Source)

See more recommendations for this book...

36
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to... more

See more recommendations for this book...

37
In Penetration Testing, security researcher and trainer Georgia Weidman provides you with a survey of important skills that any aspiring pentester needs. This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device... more

Alex Caceres/hacker Frmrly Known As Dotslashpunk@gvgm3 @SecurityTube For networks i'd have to say hands down the OSCP is likely one of the best you're going to find. Fuck the cert, take the course, get down and dirty in the labs and break everything. I hear @georgiaweidman's book is good (Pen testing with Metasploit) but have not read it myself (Source)

See more recommendations for this book...

38
Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual... more

See more recommendations for this book...

39
A mere fifteen years ago, computer nerds were seen as marginal weirdos, outsiders whose world would never resonate with the mainstream. That was before one pioneering work documented the underground computer revolution that was about to change our world forever. With groundbreaking profiles of Bill Gates, Steve Wozniak, MIT's Tech Model Railroad Club, and more, Steven Levy's Hackers brilliantly captured a seminal moment when the risk-takers and explorers were poised to conquer twentieth-century America's last great frontier. And in the Internet age, the hacker ethic-first espoused... more
Recommended by Ev Williams, and 1 others.

See more recommendations for this book...

40

Cooper (Corps Security, #4)

Do you take me seriously? Because I don’t. I use my jokes and easygoing personality to hide the pain I’ve felt since he took his last breath. I’m adrift without my partner in crime, my best friend…my brother. I can taste the vengeance just within my grasp.

Until she barges into my life. Promising me happiness and a peace I’ve been craving for years. She is the sun to my darkness, the happy to my despair.

But she holds secrets. Just like I do. She holds hers close, where I just pray mine don’t rock the walls we’re trying to build.

Now I’m stuck at a...
more

See more recommendations for this book...

Don't have time to read the top Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
41
One of the world’s leading authorities on global security, Marc Goodman takes readers deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using new and emerging technologies against you—and how this makes everyone more vulnerable than ever imagined. 


Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home...
more

See more recommendations for this book...

42
We don't demand a background check on the plumber who shows up to fix the leaky sink. We don't do a chemical analysis on food we eat.

Trust and cooperation are the first problems we had to solve before we could become a social species. In the 21st century, they have become the most important problems we need to solve — again. Our global society has become so large and complex that our traditional trust mechanisms no longer work.

Bruce Schneier, world-renowned for his level-headed thinking on security and technology, tackles this complex subject head-on. Society can't...
more

See more recommendations for this book...

43
Author of the #1 New York Times bestseller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files... more

Joseph NyeThis is intriguing, because when you look at the enormous opportunities that the Internet has presented – economic efficiency, great communication – we generally think of the positive side. But what Clarke and Knake point out is that as we open these opportunities we also make ourselves vulnerable to their disruption. For example, you have the capacity to do damage in the physical world just by... (Source)

See more recommendations for this book...

44
In "Beyond Fear," Bruce Schneier invites us to take a critical look at not just the threats to our security, but the ways in which we're encouraged to think about security by law enforcement agencies, businesses of all shapes and sizes, and our national governments and militaries. Schneier believes we all can and should be better security consumers, and that the trade-offs we make in the name of security - in terms of cash outlays, taxes, inconvenience, and diminished freedoms - should be part of an ongoing negotiation in our personal, professional, and civic lives, and the subject of an open... more

See more recommendations for this book...

45
Greg Cage’s life is more fulfilling than he ever could have imagined. He’s married to the love of his life, has an amazing son, and in a few short months, his family will grow again with the birth of his twin girls.

The past year has been a tough one for the Cage family, but they are now on the road to healing by learning to let go of the past and looking forward to their future.

When situations beyond his control threaten to take away so much of what Greg holds close to his heart, he has to learn that he doesn't always have the control he tries to maintain in their...
more

See more recommendations for this book...

46
CompTIA Security+ Get Certified Get Ahead: SY0-401 Study Guide is an update to the top-selling SY0-301 guide, which helped thousands of readers pass the exam the first time they took it. The SY0-301 version covers every aspect of the SY0-301 exam, and includes the same elements readers raved about in the previous version.

Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action. The author uses many of the same analogies and explanations he’s honed in the classroom that have helped hundreds of...
more

See more recommendations for this book...

47
“An important, disturbing, and gripping history” (Kirkus Reviews, starred review), the never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invent and employ cyber wars—where every country can be a major power player and every hacker a mass destroyer.

In June 1983, President Reagan watched the movie War Games, in which a teenager unwittingly hacks the Pentagon, and asked his top general if the scenario was plausible. The general said it was. This set in motion the first presidential directive on computer...
more
Recommended by Josephine Wolff, and 1 others.

Josephine WolffThis book is by Fred Kaplan and it’s a historical study of the ways that governments—and in particular the US government—have tried to think about and use cyberpower for state-to-state conflict. He looks at what the origins of that were in the 1980s and how it has evolved over the past 30 or so years. (Source)

See more recommendations for this book...

48

Hacking Exposed 7

Network Security Secrets and Solutions

A fully updated edition of the world's bestselling computer security book "Hacking Exposed 7: Network Security Secrets and Solutions" is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more The 7th Edition also features a new "5 Deployments" approach for the first time that provides five key actions... more

See more recommendations for this book...

49

Gray Hat Hacking

The Ethical Hacker's Handbook

Up-to-date strategies for thwarting the latest, most insidious network attacks

This fully updated, industry-standard security resource shows how to fortify computer networks by learning and effectively applying ethical hacking techniques. Based on critical topics that the authors teach at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks.

Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition,...
more

See more recommendations for this book...

50
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:


Create a trojan command-and-control using GitHub
Detect sandboxing and automate common malware tasks,...
more

See more recommendations for this book...

Don't have time to read the top Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
51
The definitive insider's guide to auditing software security is penned by leading security consultants who have personally uncovered vulnerabilities in applications ranging from "sendmail" to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for "ripping apart" applications to reveal even the most subtle and well-hidden security flaws. less

See more recommendations for this book...

52
There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.

Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an...
more

See more recommendations for this book...

53
Harry Potter has never been the star of a Quidditch team, scoring points while riding a broom far above the ground. He knows no spells, has never helped to hatch a dragon, and has never worn a cloak of invisibility.

All he knows is a miserable life with the Dursleys, his horrible aunt and uncle, and their abominable son, Dudley - a great big swollen spoiled bully. Harry’s room is a tiny closet at the foot of the stairs, and he hasn’t had a birthday party in eleven years.

But all that is about to change when a mysterious letter arrives by owl messenger: a letter with an...
more
Recommended by Joe Lycett, and 1 others.

Joe Lycettguys i just read this book called harry potter well worth checking out it’s about a really interesting magic lad (Source)

See more recommendations for this book...

54
Network security is not simply about building impenetrable walls — determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to...
more

See more recommendations for this book...

55

Mystery Man (Dream Man, #1)

Night time is the right time...

Gwendolyn Kidd has met the man of her dreams. He's hot, he's sexy, and what started as a no-names-exchanged night of passion has blossomed into a year and a half-long pleasure fest. Sure, it's a little strange that he only appears in her bed at night, but Gwen is so sure he's the one, she just can't turn him away...

Hawk Delgado knows more about Gwen than she could ever imagine. She's gorgeous, headstrong, and skittish about relationships. But Hawk is facing his own demons, demons that keep him from connecting with anyone. Yet when...
more

See more recommendations for this book...

56
Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the "game" of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style "plays," this straightforward guide gets to the root of many of the roadblocks people may face while penetration...
more

See more recommendations for this book...

57

The Shellcoder's Handbook

Discovering and Exploiting Security Holes

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site features downloadable... more

See more recommendations for this book...

58
"This is one of the most interesting infosec books to come out in the last several years."
–Dino Dai Zovi, Information Security Professional

"Give a man an exploit and you make him a hacker for a day; teach a man to exploit bugs and you make him a hacker for a lifetime."
–Felix 'FX' Lindner

Seemingly simple bugs can have drastic consequences, allowing attackers to compromise systems, escalate local privileges, and otherwise wreak havoc on a system.

A Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and...
more

See more recommendations for this book...

59

Rock Chick (Rock Chick, #1)

Indy Savage, cop's daughter, rock chick and used bookstore owner, has been in love with Lee Nightingale, once bad boy, now the man behind Nightingale Investigations, since she was five years old. No matter what ingenious schemes Indy used to capture his attention, Lee never showed an interest and Indy finally gave up. Now Indy's employee, Rosie, has lost a bag of diamonds and bad guys are shooting at him. When Indy gets involved, Lee is forced to help. Complicating matters, Lee has decided he's interested, Indy's decided she's not. But she can't seem to keep Lee out of her life when she's... more

See more recommendations for this book...

60
The computer and the internet are among the most important innovations of our era, but few people know who created them. They were not conjured up in a garret or garage by solo inventors suitable to be singled out on magazine covers or put into a pantheon with Edison, Bell, and Morse. Instead, most of the innovations of the digital age were done collaboratively. There were a lot of fascinating people involved, some ingenious and a few even geniuses. This is the story of these pioneers, hackers, inventors, and entrepreneurs—who they were, how their minds worked, and what made them so creative.... more

Chris FussellThe history of how great ideas evolve. (Source)

Brian BurkhartThis book is essentially a biography of all the people who’ve led to the technology of today—it’s fascinating. The most important point of the book is everything is one long, connected chain. There isn’t just one person or one industry that makes anything happen—it all goes way back. For example, the communication theory I have espoused and taught throughout my career is from Aristotle, Socrates,... (Source)

Sean Gardner@semayuce @MicrosoftUK @HelenSharmanUK @astro_timpeake @WalterIsaacson Yes, I agree: "The Innovators" is a great book. I loved it too. (Source)

See more recommendations for this book...

Don't have time to read the top Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
61
Jules has got a score to settle against the drug dealers of Denver. Vance has made it his mission that Jules won’t get dead while dishing out vigilante justice. Jules doesn’t have time for romance, she’s too busy saving the world and she enlists Zip (the gunstore owner), Heavy (an ex-PI) and Frank (a mysterious recluse) to help.

The Rock Chicks of Fortnum’s Bookstore get involved to provide romantic advice and guidance, none of which Jules accepts at first. The Hot Bunch of Nightingale Investigations adopt Jules as one of their own. Even though Jules tries to hang on to her inner...
more

See more recommendations for this book...

62

Writing Secure Code

The Barnes & Noble Review
Your code will be attacked. You need to assume it will run in the most hostile environments imaginable -- and design, code, and test accordingly. Writing Secure Code, Second Edition shows you how.


This edition draws on the lessons learned and taught throughout Microsoft during the firm s massive 2002 Windows Security Push. It s a huge upgrade to the respected First Edition, with new coverage across the board.


Michael Howard and David LeBlanc first help you define what security means to your customers --...

more

See more recommendations for this book...

63

CISSP All-in-One Exam Guide

A new edition of Shon Harris' bestselling exam prep guide--fully updated for the new CISSP 2018 Common Body of Knowledge
This effective self-study guide fully prepares you for the challenging CISSP exam and offers 100% coverage of all exam domains. This edition has been thoroughly revised to cover the new CISSP 2018 Common Body of Knowledge, hot spot and drag and drop question formats, and more.
CISSP All-in-One Exam Guide, Eighth Edition features hands-on exercises as well as "Notes," "Tips," and "Cautions" that provide real-world insight and call out potentially...
more

See more recommendations for this book...

64
Serious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is filled with mathematical concepts and meaty discussions of how the various cryptographic mechanisms work.

Chapters cover the notion of secure encryption, randomness, block ciphers and ciphers, hash functions and message authentication codes, public-key crypto including RSA, Diffie-Hellman, and elliptic curves, as well as TLS and...
more
Recommended by Louis Nyffenegger, and 1 others.

Louis NyffeneggerFew technical books and a bit of everything. The following books are currently sitting on my bedside table: "The Hitchhiker's Guide To The Galaxy", "Predictable Revenue", "Manufacturing Consent", "Agile Application Security". "Oauth In Action", "Serious Cryptography". (Source)

See more recommendations for this book...

65

The Art of Memory Forensics

Detecting Malware and Threats in Windows, Linux, and Mac Memory

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields.

Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows,...
more

See more recommendations for this book...

66

Obama's Wars

In Obama’s Wars, Bob Woodward provides the most intimate and sweeping portrait yet of the young president as commander in chief. Drawing on internal memos, classified documents, meeting notes and hundreds of hours of interviews with most of the key players, including the president, Woodward tells the inside story of Obama making the critical decisions on the Afghanistan War, the secret campaign in Pakistan and the worldwide fight against terrorism.    

At the core of Obama’s Wars is the unsettled division between the civilian leadership in the White House and the United...
more

See more recommendations for this book...

68
The magnificent, unrivaled history of codes and ciphers—how they're made, how they're broken, and the many and fascinating roles they've played since the dawn of civilization in war, business, diplomacy, and espionage—updated with a new chapter on computer cryptography and the Ultra secret.

Man has created codes to keep secrets and has broken codes to learn those secrets since the time of the Pharaohs. For 4,000 years, fierce battles have been waged between codemakers and codebreakers, and the story of these battles is civilization's secret history, the hidden account of how wars...
more
Recommended by Tyler Cowen, and 1 others.

Tyler CowenI read this one quite young, and learned that problems are to be solved! I also developed some sense of what a history could look like and what a history should report. I recall my uncle thinking it deeply strange that a boy my age should be reading a book of such length. (Source)

See more recommendations for this book...

70

Rock Chick Revenge (Rock Chick, #5)

Ava hates men, she has reason and she’s vowed not only never to get involved with another one again but also to exact vengeance on her best friend’s, lying, cheating husband. Since Luke, Ava’s childhood crush, is now a private investigator, she thinks to enlist him but changes her mind at the last second.

Too late, Luke knows she’s up to something and he’s already seen many a Rock Chick try to fight her own battles without the Hot Bunch stepping in. He’s having none of it. She’s having none of him. The clash of the Rock Chick and Hot Guy begins but Luke’s got the advantage. He has...
more

See more recommendations for this book...

Don't have time to read the top Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
71
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through... more

See more recommendations for this book...

72
From the premiere New York Times Washington correspondent, a stunning and incisive look into how cyberwarfare is influencing elections, threatening national security, and bringing us to the brink of global war.

Behind the Russian cyberattacks that may have thrown the 2016 election; behind the Sony hack; behind mysterious power outages around the world and the disappearance of thousands of personnel records from poorly guarded government servers are the traces of a new and powerful weapon, one that has the potential to remake global conflict like nothing...
more
Recommended by Bill Gates, and 1 others.

Bill Gates[On Bill Gates's reading list in 2018.] (Source)

See more recommendations for this book...

73
No source code? No problem. With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.

Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other...
more

See more recommendations for this book...

74
Sadie Townsend is known by all as The Ice Princess and she’s worked hard to earn her reputation. Her father, a now-incarcerated Drug Lord, has kept her under his thumb her whole life and she’s learned enough from living in his world to give everyone the cold shoulder. But one inebriated night, she shows the Real Sadie to the undercover agent she knows is investigating her father, the handsome Hector Chavez, and he knows he’ll stop at nothing to have her.

Hector makes one (huge) mistake; he waits for Sadie to come to him. Tragedy strikes and Sadie’s got a choice, she can retreat...
more

See more recommendations for this book...

75

Schneier on Security

Schneier on Security will be divided into sections:
- Computer Security
- Security and Privacy
- Economics of Security
- National Security and Terrorism

Sample articles:
- Why Vista's DRM Is Bad For You
- When the Internet Is My Hard Drive, Should I Trust Third Parties?
- Steal This Wi-Fi
- Lessons From the Facebook Riots
- The ID Chip You Don't Want in Your Passport
- Camera Phones vs. Crime: Now We're Talking
- MySpace Passwords Aren't So Dumb
- An American Idol for Crypto Geeks
- Why Smart Cops Do Dumb Things
more

See more recommendations for this book...

76

No Place to Run (KGI, #2)

Sam Kelly was her first love.

The last person Sam Kelly expected to pull wounded from the lake was Sophie Lundgren. Once they shared a brief, intense affair while Sam was undercover and then she vanished. She’s spent the last months on the run, knowing that any mistake would cost her life and that of her unborn child—Sam’s child. Now she’s resurfaced with a warning for Sam: this time, he’s the one in danger.

Now he’s her last chance.

Sam has too many questions to let her slip away again—like why she disappeared in the first...
more

See more recommendations for this book...

77
"The Basics of Hacking and Penetration Testing "serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow youa to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and... more

See more recommendations for this book...

78
For one-semester undergraduate/graduate level courses and for self-study. William Stallings offers a practical survey of both the principles and practice of cryptography and network security, reflecting the latest developments in the field. less

See more recommendations for this book...

79
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.

Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network...
more

See more recommendations for this book...

80
Stella’s the lead singer and lead guitarist of the Blue Moon Gypsies and Stella used to be Mace’s girl. Mace broke up with her though and the loss of him rocked her world. But Stella gets a call, late at night (again) from one of the members of her crazy band. She has to go play clean up (again) and runs into Mace (and a shed load of police) and ends up getting shot.

Mace finds he doesn’t like it much that his ex-girlfriend got shot, right in front of him but it’s worse. A very bad man has thrown down the gauntlet and ALL the Rock Chicks are in the firing line. Stella doesn’t want...
more

See more recommendations for this book...

Don't have time to read the top Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
81
I am not a recruiter. I am a software engineer. And as such, I know what it's like to be asked to whip up brilliant algorithms on the spot and then write flawless code on a whiteboard. I've been through this as a candidate and as an interviewer.

Cracking the Coding Interview, 6th Edition is here to help you through this process, teaching you what you need to know and enabling you to perform at your very best. I've coached and interviewed hundreds of software engineers. The result is this book.

Learn how to uncover the hints and hidden details in a question,...
more

See more recommendations for this book...

83
A world of "smart" devices means the Internet can kill people. We need to act. Now.

Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers—from home thermostats to chemical plants—are all online. The Internet, once a virtual abstraction, can now sense and touch the physical world.

As we open our lives to this future, often called the Internet of Things, we are beginning to see its enormous potential in ideas like driverless cars, smart cities, and personal agents equipped...
more
Recommended by Alexander Stubb, and 1 others.

Alexander StubbI will get this book. Looks interesting beyond the title...Click Here to Kill Everybody by Bruce Schneier via @FT https://t.co/GGCRlsTflT (Source)

See more recommendations for this book...

84
Jack Bryant left the Special Forces to begin his private investigation business. Pulling together like-minded men from the CIA, FBI, ATF, DEA, Border Patrol, SEALs, and police, they were devoted to the missions that no one else wanted or could solve.
When the Campus Killer strikes again, Jack’s team is tasked by the Governor to find the killer, using whatever means they can.
While following the trail of the serial killer, he becomes entangled in the life of the beautiful woman living next to his property.
Bethany Bridwell moved in with her grandmother to take over running...
more

See more recommendations for this book...

85
Jet McAlister has a secret. Eddie Chavez has the hots for Jet (not to mention Eddie’s just plain hot). Jet has too many problems to realize that Eddie’s interested. Eddie loses patience when Jet ends her waitressing shift at a strip club with a knife at her throat. Since Eddie’s a cop, he figures he can help. Since Jet’s used to solving everyone’s problems she doesn’t want Eddie’s help.

Throw in a Dolly Parton look-alike, a gruff but lovable strip club owner, Jet’s ne’er do well father, his ne’er do well friend, Bear, Bear’s long-suffering, chain-smoking wife Lavonne and the crew...
more

See more recommendations for this book...

86
The entire Corps Security series is together for a limited time box set.

Years after the Marines brought them together, the men of Corps Security are together again.

These six novels follow their lives as they take a chance at love. Can love truly conquer all?

From broken souls to broken hearts, they all will find out if they'll get their second chance at happily ever afters and that love really is worth fighting for.

more

See more recommendations for this book...

87
A thrilling, exclusive expose of the hacker collectives Anonymous and LulzSec.

WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of...
more

See more recommendations for this book...

88
SSL/TLS is the cornerstone of security on the Internet, but understanding it and using it are not simple tasks. Quite the contrary; mistakes are easy to make and can often fully compromise security. Bulletproof SSL and TLS is the first SSL book written with users in mind. It is the book you will want to read if you need to assess risks related to website encryption, manage keys and certificates, configure secure servers, and deploy secure web applications. Bulletproof SSL and TLS is based on several years of work researching SSL and how SSL is used in real life, implementing and supporting a... more

See more recommendations for this book...

90

File System Forensic Analysis

The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an... more

See more recommendations for this book...

Don't have time to read the top Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
91
Completely Rewritten Sixth Edition Sheds New Light on Open Source Intelligence Collection and Analysis Author Michael Bazzell has been well known in government circles for his ability to locate personal information about any target through Open Source Intelligence (OSINT). In this book, he shares his methods in great detail. Each step of his process is explained throughout twenty-five chapters of specialized websites, software solutions, and creative search techniques. Over 250 resources are identified with narrative tutorials and screen captures. This book will serve as a reference guide for... more

See more recommendations for this book...

92
By New York Times bestselling author and Minecraft expert, Megan Miller, a full-color book full of practical advice that boys and girls will refer to again and again!

Minecraft is the one game that children, parents, and teaches all agree on. It’s great fun and a wonderful teaching tool. The Ultimate Unofficial Encyclopedia for Minecrafters reveals expert tricks of the trade for gamers. This exciting book will cover everything players need to know about mining, farming, building, villagers, the Nether, and more! Young gamers will be surprised...
more

See more recommendations for this book...

93

Hidden Away (KGI, #3)

A man who shoots first and asks questions later…

Most people would take an all-expenses-paid trip to the beach in a heartbeat. Garrett Kelly only accepts to keep tabs on Sarah Daniels, who’s in hiding after witnessing a murder by Marcus Lattimer, her half-brother—and a personal enemy of KGI. This gig may be beneath a disciplined soldier like Garrett, but if he gets a shot at Lattimer, it will all be worth it…

…and the ultimate moving target.

But Garrett hadn’t counted on falling for Sarah. He’d considered seduction as a tactical maneuver, but...
more

See more recommendations for this book...

94
When a mysterious text message summons May Wexler to a biker bar in downtown New Orleans, she knows something is very wrong. Her sister has sent out an SOS, but when May gets there, she’s nowhere to be found and May is the one in trouble—she’s wearing pink espadrilles, she’s got a Chihuahua in her purse, and she’s in the middle of a shootout.

After tall, muscular Ozzie comes to her rescue, May has no choice but to follow him to safety. At the headquarters of his private security firm, the Bourbon Street Boys, she finds a refuge for the night—and the offer of a job. But it’s not...
more

See more recommendations for this book...

95

Stealing the Network

How to Own the Box

-Stealing the Network: How to Own the Box- is NOT intended to be a -install, configure, update, troubleshoot, and defend book.- It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the -street fighting- tactics used to attack networks and systems.
Not just...
more

See more recommendations for this book...

96
"When it comes to software security, the devil is in the details. This book tackles the details."
--Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies "McGraw's book shows you how to make the 'culture of security' part of your development lifecycle."
--Howard A. Schmidt, Former White House Cyber Security Advisor "McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn't), buy this book and post it up on the...
more

See more recommendations for this book...

97
It's easy enough to install Wireshark and begin capturing packets off the wire--or from the air. But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then analyze packets as you take an indepth look at real-world packet analysis and network troubleshooting. The way the pros do it.

Wireshark (derived from the Ethereal project), has become the world's most popular network sniffing application....
more

See more recommendations for this book...

98
If you're a security or network professional, you already know the "do's and don'ts" run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn't working. You're at greater risk than ever, and even the world's most security-focused organizations are being victimized by massive attacks. In Thinking Security, author Steven M. Bellovin provides a new way to think about security. As one of the world's most respected security experts, Bellovin helps you gain new clarity... more

See more recommendations for this book...

99
Roxie’s on the run from a bad boyfriend who will not catch the hint that it is o-v-e-r. She’s in no mood for love at first sight, but when her eyes fall on Hank, it’s trouble from the get-go. Roxie tries to hold Hank at arms length but Hank wants to be a closer (as in, a lot closer). Roxie’s trouble catches up with her and Hank wants to help but Roxie knows in her heart that she’s no good for a white hat guy. The problem is no one agrees with her, especially her crazy hippie best friend Annette or her parents; the even crazier small-Indiana-town Herb and Trish. Toss into the mix the gang from... more

See more recommendations for this book...

Don't have time to read the top Security books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.