LibreReads
[Beta]
Search
Books For the Aspiring Hacker
1.
The Tangled Web: A Guide to Securing Modern Web Applications
by:
Michal Zalewski
4.05 avg rating — 552 ratings
2.
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
by:
Tobias Klein
3.92 avg rating — 248 ratings
3.
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
by:
Michael Sikorski
4.48 avg rating — 600 ratings
4.
Penetration Testing: A Hands-On Introduction to Hacking
by:
Georgia Weidman
4.17 avg rating — 383 ratings
5.
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
by:
Michal Zalewski
4.21 avg rating — 466 ratings
6.
Social Engineering
by:
Christopher Hadnagy
3.83 avg rating — 3,812 ratings
7.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
by:
Dafydd Stuttard
4.23 avg rating — 1,215 ratings
7.
The Art of Deception: Controlling the Human Element of Security
by:
Kevin D. Mitnick
3.77 avg rating — 7,162 ratings
9.
Hacking: The Art of Exploitation w/CD
by:
Jon Erickson
4.17 avg rating — 2,463 ratings
10.
A Guide to Kernel Exploitation: Attacking the Core
by:
Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College Dubl
4.23 avg rating — 52 ratings
11.
Hacking Wireless Networks - The ultimate hands-on guide
by:
Andreas Kolokithas
4.32 avg rating — 19 ratings
11.
Secure Your Node.js Web Application: Keep Attackers Out and Users Happy
by:
Karl Duuna
3.88 avg rating — 24 ratings
13.
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
by:
Kevin Poulsen
3.97 avg rating — 8,012 ratings
14.
Web Penetration Testing: Hack Your Way
by:
Shubham Mishra
4.92 avg rating — 12 ratings
15.
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
by:
Richard Bejtlich
4.06 avg rating — 262 ratings
16.
Metasploit: The Penetration Tester's Guide
by:
David Kennedy
4.07 avg rating — 863 ratings
17.
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
by:
Kim Zetter
4.17 avg rating — 8,047 ratings
18.
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
by:
Bruce Schneier
really liked it 4.00 avg rating — 3,827 ratings
19.
Next Generation Red Teaming
by:
Henry Dalziel
2.40 avg rating — 5 ratings
19.
Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell
by:
Phil Lapsley
4.20 avg rating — 1,748 ratings
21.
Future Crimes
by:
Marc Goodman
3.93 avg rating — 4,365 ratings
22.
The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win
by:
Gene Kim
4.26 avg rating — 48,832 ratings
23.
Security Engineering: A Guide to Building Dependable Distributed Systems
by:
Ross J. Anderson
4.21 avg rating — 696 ratings
24.
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global
by:
Geoff White
4.21 avg rating — 203 ratings
25.
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State
by:
Glenn Greenwald
4.07 avg rating — 14,931 ratings
26.
Digital Resilience: Is Your Company Ready for the Next Cyber Threat?
by:
Ray A. Rothrock
3.64 avg rating — 53 ratings
27.
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
by:
Andy Greenberg
4.35 avg rating — 9,510 ratings
28.
The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
by:
Richard A. Clarke
4.03 avg rating — 790 ratings
29.
Why CISOs Fail: The Missing Link in Security Management--and How to Fix It (Security, Audit and Leadership Series)
by:
Barak Engel
4.29 avg rating — 14 ratings
30.
Unsecurity: Information security is failing. Breaches are epidemic. How can we fix this broken industry?
by:
Evan Francen
4.25 avg rating — 20 ratings
31.
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
by:
Perry Carpenter
4.20 avg rating — 51 ratings
32.
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
by:
Bruce Schneier
3.83 avg rating — 1,085 ratings
33.
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
by:
Clifford Stoll
4.28 avg rating — 15,267 ratings
34.
American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road
by:
Nick Bilton
4.41 avg rating — 50,880 ratings
35.
Defensive Security Handbook: Best Practices for Securing Infrastructure
by:
Lee Brotherston
3.96 avg rating — 135 ratings
36.
Thinking in Bets: Making Smarter Decisions When You Don't Have All the Facts
by:
Annie Duke
3.82 avg rating — 21,783 ratings
37.
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
by:
OccupyTheWeb
4.14 avg rating — 552 ratings
38.
Hacking Exposed: Network Security Secrets & Solutions
by:
Joel Scambray
3.80 avg rating — 1,165 ratings
39.
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
by:
Bruce Nikkel
4.15 avg rating — 27 ratings
40.
Writing Secure Code
by:
Michael Howard
4.01 avg rating — 372 ratings
41.
Real-World Bug Hunting: A Field Guide to Web Hacking
by:
Peter Yaworski
4.18 avg rating — 133 ratings
42.
Hacking: The Art of Exploitation
by:
Jon Erickson
4.17 avg rating — 2,463 ratings
43.
Designing BSD Rootkits: An Introduction to Kernel Hacking
by:
Joseph Kong
4.18 avg rating — 51 ratings
44.
Malware Data Science: Attack Detection and Attribution
by:
Joshua Saxe
3.87 avg rating — 52 ratings
45.
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
by:
Michael Hale Ligh
4.35 avg rating — 124 ratings
46.
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
by:
Michael Rash
4.05 avg rating — 56 ratings
47.
The Tao Of Network Security Monitoring: Beyond Intrusion Detection
by:
Richard Bejtlich
4.28 avg rating — 136 ratings
48.
Applied Network Security Monitoring: Collection, Detection, and Analysis
by:
Chris Sanders
4.20 avg rating — 64 ratings
49.
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
by:
Dennis Andriesse
4.51 avg rating — 69 ratings
50.
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
by:
James Forshaw
3.91 avg rating — 124 ratings
51.
Foundations of Information Security: A Straightforward Introduction
by:
Jason Andress
4.06 avg rating — 124 ratings
52.
Windows Internals, Part 1: Covering Windows Server 2008 R2 and Windows 7
by:
Mark E. Russinovich
4.46 avg rating — 206 ratings
53.
Windows Internals, Part 2: Covering Windows Server 2008 R2 and Windows 7
by:
Mark E. Russinovich
4.55 avg rating — 105 ratings
54.
Black Hat Python: Python Programming for Hackers and Pentesters
by:
Justin Seitz
4.11 avg rating — 596 ratings
55.
Network Attacks and Exploitation: A Framework
by:
Matthew Monte
4.08 avg rating — 48 ratings
56.
TCP/IP Illustrated, Volume 1: The Protocols
by:
Kevin R. Fall
4.49 avg rating — 149 ratings
57.
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
by:
Charles M. Kozierok
4.49 avg rating — 206 ratings
58.
Secrets and Lies: Digital Security in a Networked World
by:
Bruce Schneier
3.93 avg rating — 1,791 ratings
59.
Red Team Field Manual
by:
Ben Clark
4.23 avg rating — 984 ratings
60.
Blue Team Handbook: SOC, SIEM, and Threat Hunting Use Cases: A condensed field guide for the Security Operations team
by:
Don Murdoch
4.43 avg rating — 58 ratings
61.
Blue Team Field Manual (BTFM) (Field Manual Series)
by:
Alan J. White
4.18 avg rating — 343 ratings
62.
Operator Handbook: Red Team + OSINT + Blue Team Reference
by:
Joshua Picolet
4.40 avg rating — 91 ratings
63.
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
by:
Don Murdoch
4.12 avg rating — 282 ratings
64.
Social Engineering: The Science of Human Hacking
by:
Christopher Hadnagy
3.83 avg rating — 3,812 ratings
65.
Unmasking the Social Engineer: The Human Element of Security
by:
Christopher Hadnagy
3.72 avg rating — 272 ratings
66.
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
by:
Michael Bazzell
4.45 avg rating — 411 ratings