^ Back Arrow

Technical Security Division, Inc.

HACKER BOOKS click on title links for descriptions




Use your browser RETURN control [ Back Arrow ] to come back from links.

1337 h4x0r h4ndb00k (Elite Hacker Handbook) by Tapeworm
Codes and Cryptography by Dominic Welsh
Perl Hacks: Tips & Tools for Programming, Debugging, and Surviving by chromatic, Damian Conway, Curtis "Ovid" Poe
HackNotes(tm) Network Security Portable Reference by Michael Horton, Clinton Mugge
Gray Hat Hacking: Ethical Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Michael Lester
Chained Exploits: Advanced Hacking Attacks by Keatron Evans, Jack Voth (Contributor)
Hacker Playbook 2: Practical Guide to Penetration Testing by Peter Kim
Counter Hack: A Step-By-Step Guide to Computer Attacks and Effective Defenses by Ed Skoudis
Hacked Again by Scott N. Schober
Instant Metasploit Starter by Karthik Ranganath
Hacking Web Apps: Detecting and Preventing Web Application Security Problems by Mike Shema
The Basics of Web Hacking: Tools and Techniques to Attack the Web by Josh Pauli
Modern Malware for Dummies by Lawrence C. Miller
Next Generation Firewalls for Dummies> by Lawrence C. Miller
Penetration Tester's Open Source Toolkit by Jeremy Faircloth, Jay Beale, Roelof Temmingh, Haroon Meer, Charl van der Walt, HD Moore
Penetration Testing and Network Defense by Andrew Whitaker, Daniel P. Newman
Hack-Proofing Your Network: Internet Tradecraft by Ryan Russell
Writing Security Tools and Exploits by James C. Foster, Vincent T. Liu
Hands-On Ethical Hacking and Network Defense by Michael T. Simpson, Kent Backman (Contributor), James Corley (Contributor)
Network Security Evaluation Using the NSA IEM by Russ Rogers, Ed Fuller, Greg Miles, Matthew Hoagberg, Travis Schack, Ted Dykstra, Bryan Cunningham, Chuck Little
Hacker Proof: The Ultimate Guide to Network Security by Lars Klander, Edward J. Renehan Jr.
iPhone Hacks: Pushing the iPhone and iPod touch Beyond Their Limits by David Jurick, Adam Stolarz, Damien Stolarz
Professional Rootkits by Ric Vieler
Rootkits: Subverting the Windows Kernel by Greg Hoglund, Jamie Butler
Hacking Knoppix (ExtremeTech) by Scott Granneman
Rootkits, Spyware/Adware, Keyloggers and Backdoors: Detection and Neutralization by Oleg Zaytsev
Seven Deadliest Wireless Technologies Attacks (Seven Deadliest Attacks) by Brad Haines
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network by Rob Flickenger, Roger Weeks
Wireless Network Hacks and Mods For Dummies by Danny Briere, Pat Hurley
iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets by Jonathan Zdziarski
Hacking Mobile Phones by Ankit Fadia
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise by Daniel V. Hoffman
Building Internet Firewalls by Elizabeth D. Zwicky, Brent Chapman
Professional Penetration Testing: Creating and Learning in a Hacking Lab by Thomas Wilhelm
Security Engineering: A Guide to Building Dependable Distributed Systems by Ross Anderson
Incident Response by Kenneth R. van Wyk, Richard Forno
The Art of Invisibility: How to Be Safe in the Age of Big Brother and Big Data by Kevin Mitnick, Robert Vamosi Mikko Hypponen (Foreword)
Hacking: The Art of Exploitation by Jon Erickson
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers by Kevin D. Mitnick, William L. Simon
TCP/IP Clearly Explained by Peter Loshin
Computer Forensics JumpStart by Michael Solomon, Neil Broom, Diane Barrett
The Best Damn Cybercrime and Digital Forensics Book Period by Jack Wiles, Anthony Reyes, Jesse Varsalone
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques by Thomas Wilhelm, Jason Andress
Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, Kevin Mitnick (Foreword)
Web Penetration Testing with Kali Linux by Joseph Muniz, Aamir Lakhani
Hacking Exposed: Network Security Secrets & Solutions by Stuart McClure
Is It Safe? Protecting Your Computer, Your Business, and Yourself Online by Michael Miller
Hacking: The Next Generation (Animal Guide) by Nitesh Dhanjani, Billy Rios, Brett Hardin
Network Security For Dummies by Chey Cobb
Cyberpunk: Outlaws and Hackers on the Computer Frontier by Katie Hafner, John Markoff
SQL Injection Attacks and Defense, Second Edition by Justin Clarke, Kevvie Fowler (Contributor), Erlend Oftedal (Contributor)
Google Hacks: 100 Industrial-Strength Tips & Tools by Tara Calishain, Rael Dornfest
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws by Dafydd Stuttard, Marcus Pinto
Gray Hat Python: Python Programming for Hackers and Reverse Engineers by Justin Seitz
Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by TJ O'Connor
Automate the Boring Stuff with Python: Practical Programming for Total Beginners by Al Sweigart
Kali Linux Revealed by Raphael Hertzog,Jim O'Gorman
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali by OccupyTheWeb
The Underground Guide to UNIX by John Montgomery
The Shellcoder's Handbook by Chris Anley
Korn Shell Programming by Example by Dennis O'Brien, David Pitts
Wicked Cool Shell Scripts by Dave Taylor, Brandon Perry
PoC or GTFO Volume II by Manul Laphroaig
101 Spy Gadgets for the Evil Genius by Brad Graham, Kathy McGowan
Getting Started Becoming a Master Hacker: Hacking is the Most Important Skill Set of the 21st Century! (Linux Basics for Hackers) by Occupytheweb
Secrets of Computer Espionage: Tactics and Countermeasures by Joel McNamara (Author)