LibreReads
[Beta]
Search
Cyber Operations
1.
Red Team Field Manual
by:
Ben Clark
4.23 avg rating β 984 ratings
2.
Blue Team Field Manual (BTFM) (Field Manual Series)
by:
Alan J. White
4.18 avg rating β 343 ratings
2.
The Florentine Deception
by:
Carey Nachenberg
3.77 avg rating β 352 ratings
4.
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
by:
Kim Zetter
4.17 avg rating β 8,047 ratings
5.
Hackers: Heroes of the Computer Revolution
by:
Steven Levy
4.16 avg rating β 8,457 ratings
6.
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
by:
Clifford Stoll
4.28 avg rating β 15,267 ratings
7.
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
by:
Kevin D. Mitnick
3.96 avg rating β 26,863 ratings
8.
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
by:
Tobias Klein
3.92 avg rating β 248 ratings
9.
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
by:
Michael Sikorski
4.48 avg rating β 600 ratings
10.
Hacking Exposed 7: Network Security Secrets and Solutions
by:
Stuart McClure
3.80 avg rating β 1,165 ratings
11.
Zero Ri$k
by:
Simon Hayes
4.46 avg rating β 226 ratings
12.
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
by:
Parmy Olson
3.97 avg rating β 3,356 ratings
13.
Zero Day (Jeff Aiken, #1)
by:
Mark E. Russinovich
3.57 avg rating β 5,861 ratings
14.
Trojan Horse (Jeff Aiken, #2)
by:
Mark E. Russinovich
3.79 avg rating β 2,265 ratings
15.
Rogue Code (Jeff Aiken, #3)
by:
Mark E. Russinovich
3.91 avg rating β 1,245 ratings
16.
The World's Most Dangerous Geek: And More True Hacking Stories
by:
David Kushner
3.60 avg rating β 1,997 ratings
17.
Thinking Security: Stopping Next Year's Hackers (Addison-Wesley Professional Computing Series)
by:
Steven M. Bellovin
4.23 avg rating β 22 ratings
18.
Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
by:
Scott Rosenberg
3.71 avg rating β 3,093 ratings
19.
The Tao Of Network Security Monitoring: Beyond Intrusion Detection
by:
Richard Bejtlich
4.28 avg rating β 136 ratings
20.
The Computer Incident Response Planning Handbook: Executable Plans For Protecting Information At Risk
by:
N.K. McCarthy
3.80 avg rating β 15 ratings
21.
Data, Driven Security: Analysis, Visualization and Dashboards
by:
Jay Jacobs
4.04 avg rating β 79 ratings
22.
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
by:
Richard Bejtlich
4.06 avg rating β 262 ratings
23.
IT Auditing: Using Controls to Protect Information Assets
by:
Chris Davis
3.88 avg rating β 43 ratings
24.
Network Security Through Data Analysis: Building Situational Awareness
by:
Michael S. Collins
3.88 avg rating β 50 ratings
25.
Applied Network Security Monitoring: Collection, Detection, and Analysis
by:
Chris Sanders
4.20 avg rating β 64 ratings
26.
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
by:
Don Murdoch
4.12 avg rating β 282 ratings
27.
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies
by:
Corey Schou
4.14 avg rating β 28 ratings
28.
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations
by:
Michael N. Schmitt
4.03 avg rating β 29 ratings
29.
Cybersecurity and Cyberwar: What Everyone Needs to Know
by:
P.W. Singer
3.83 avg rating β 1,380 ratings
30.
Operation Desolation: The Case of the Anonymous Bank Defacement
by:
Mark E. Russinovich
3.83 avg rating β 413 ratings
31.
In the Plex: How Google Thinks, Works, and Shapes Our Lives
by:
Steven Levy
3.84 avg rating β 29,917 ratings
32.
Crypto: How the Code Rebels Beat the GovernmentβSaving Privacy in the Digital Age
by:
Steven Levy
4.04 avg rating β 1,588 ratings