Book List
Table of Contents
- Network Hacking
- Web Applications Hacking
- Operative Systems
- Cryptography
- Social Engineering
- Mobile Hacking
- Cloud Hacking
- IoT (Internet of Things) Hacking
- Malware Analysis
- Pentesting
Network Security
- Network Security Assessment Know Your Network - Chris McNab
- Applied Network Security Monitoring Collection, Detection, and Analysis - Chris Sanders
- Cryptography and Network Security, Principles and Practice - William Stallings
Web Applications Security
- The Web Application Hacker’s Handbook Finding and Exploiting Security Flaws - Dafydd Stuttard
- Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities - Vickie Li
- Real-World Bug Hunting: A Field Guide to Web Hacking - Peter Yaworski
- Hacking APIs: Breaking Web Application Programming Interfaces - Corey J. Ball
Operative Systems
- Linux Basics for Hackers, 2nd Edition - OccupyTheWeb
- How Linux Works, 3rd Edition: What Every Superuser Should Know - Brian Ward
- Windows Internals - Mark Russinovich and David Solomon
Cryptography
- The Code Book, The Science of Secrecy from Ancient Egypt to Quantum Cryptography - Simon Singh
- Applied Cryptography - Bruce Schneier
- Serious Cryptography - Jean-Philippe Aumasson
- Cryptography and Network Security - William Stallings
- Practical Cryptography in Python - Seth Nielson and Christopher Monson
- Codebreakers: The Comprehensive History of Secret Communication - David Kahn
Social Engineering
- Social Engineering The Science of Human Hacking - Christopher Hadnagy
- The Art of Deception - Kevin Mitnick
Mobile Hacking
- Android Security Internals - Nikolay Elenkov
- The Mobile Application Hacker’s Handbook - Dominic Chell
- Hacking and Securing iOS Applications - Jonathan Zdziarski
- Android Hacker’s Handbook - Joshua J. Drake
- iOS Hacker’s Handbook - Charlie Miller
Cloud Security
- Cloud Security and Privacy - Tim Mather
- AWS Penetration Testing - Jonathan Helmus
- Mastering AWS Security - Albert Anthony
- Practical Cloud Security - Chris Dotson
- Securing DevOps - Julien Vehent
IoT (Internet of Things) Hacking
- Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things - Fotios Chantzis
- Abusing the Internet of Things - Nitesh Dhanjani
- IoT Penetration Testing Cookbook - Aaron Guzman and Aditya Gupta
- Hacking Connected Cars - Alissa Knight
- Internet of Things for Architects - Perry Lea
Malware Analysis
- Practical Malware Analysis, The Hands-On Guide to Dissecting Malicious Software - Michael Sikorski
- The Malware Analyst’s Cookbook - Michael Ligh
- Malware Data Science - Joshua Saxe and Hillary Sanders
- Windows Malware Analysis Essentials - Victor Marak
- Advanced Malware Analysis - Christopher Elisan
Pentesting
- Hacking The Art of Exploitation - Jon Erickson
- The Hacker Playbook 3, Practical Guide To Penetration Testing - Peter Kim
- Metasploit, The Penetration Tester’s Guide - David Kennedy
- Black Hat Python, Python Programming for Hackers and Pentesters - Justin Seitz
- Advanced Penetration Testing, Hacking the World’s Most Secure Networks - Wil Allsopp