1337 h4x0r h4ndb00k (Elite Hacker Handbook) by Tapeworm |
Codes and Cryptography by Dominic Welsh |
Perl Hacks: Tips & Tools for Programming, Debugging, and Surviving by chromatic, Damian Conway, Curtis "Ovid" Poe |
HackNotes(tm) Network Security Portable Reference by Michael Horton, Clinton Mugge |
Gray Hat Hacking: Ethical Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Michael Lester |
Chained Exploits: Advanced Hacking Attacks by Keatron Evans, Jack Voth (Contributor) |
Hacker Playbook 2: Practical Guide to Penetration Testing by Peter Kim |
Counter Hack: A Step-By-Step Guide to Computer Attacks and Effective Defenses by Ed Skoudis |
Hacked Again by Scott N. Schober |
Instant Metasploit Starter by Karthik Ranganath |
Hacking Web Apps: Detecting and Preventing Web Application Security Problems by Mike Shema |
The Basics of Web Hacking: Tools and Techniques to Attack the Web by Josh Pauli |
Modern Malware for Dummies by Lawrence C. Miller |
Next Generation Firewalls for Dummies> by Lawrence C. Miller |
Penetration Tester's Open Source Toolkit by Jeremy Faircloth, Jay Beale, Roelof Temmingh, Haroon Meer, Charl van der Walt, HD Moore |
Penetration Testing and Network Defense by Andrew Whitaker, Daniel P. Newman |
Hack-Proofing Your Network: Internet Tradecraft by Ryan Russell |
Writing Security Tools and Exploits by James C. Foster, Vincent T. Liu |
Hands-On Ethical Hacking and Network Defense by Michael T. Simpson, Kent Backman (Contributor), James Corley (Contributor) |
Network Security Evaluation Using the NSA IEM by Russ Rogers, Ed Fuller, Greg Miles, Matthew Hoagberg, Travis Schack, Ted Dykstra, Bryan Cunningham, Chuck Little |
Hacker Proof: The Ultimate Guide to Network Security by Lars Klander, Edward J. Renehan Jr. |
iPhone Hacks: Pushing the iPhone and iPod touch Beyond Their Limits by David Jurick, Adam Stolarz, Damien Stolarz |
Professional Rootkits by Ric Vieler |
Rootkits: Subverting the Windows Kernel by Greg Hoglund, Jamie Butler |
Hacking Knoppix (ExtremeTech) by Scott Granneman |
Rootkits, Spyware/Adware, Keyloggers and Backdoors: Detection and Neutralization by Oleg Zaytsev |
Seven Deadliest Wireless Technologies Attacks (Seven Deadliest Attacks) by Brad Haines |
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network by Rob Flickenger, Roger Weeks |
Wireless Network Hacks and Mods For Dummies by Danny Briere, Pat Hurley |
iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets by Jonathan Zdziarski |
Hacking Mobile Phones by Ankit Fadia |
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise by Daniel V. Hoffman |
Building Internet Firewalls by Elizabeth D. Zwicky, Brent Chapman |
Professional Penetration Testing: Creating and Learning in a Hacking Lab by Thomas Wilhelm |
Security Engineering: A Guide to Building Dependable Distributed Systems by Ross Anderson |
Incident Response by Kenneth R. van Wyk, Richard Forno |
The Art of Invisibility: How to Be Safe in the Age of Big Brother and Big Data by Kevin Mitnick, Robert Vamosi Mikko Hypponen (Foreword) |
Hacking: The Art of Exploitation by Jon Erickson |
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers by Kevin D. Mitnick, William L. Simon |
TCP/IP Clearly Explained by Peter Loshin |
Computer Forensics JumpStart by Michael Solomon, Neil Broom, Diane Barrett |
The Best Damn Cybercrime and Digital Forensics Book Period by Jack Wiles, Anthony Reyes, Jesse Varsalone |
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques by Thomas Wilhelm, Jason Andress |
Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, Kevin Mitnick (Foreword) |
Web Penetration Testing with Kali Linux by Joseph Muniz, Aamir Lakhani |
Hacking Exposed: Network Security Secrets & Solutions by Stuart McClure |
Is It Safe? Protecting Your Computer, Your Business, and Yourself Online by Michael Miller |
Hacking: The Next Generation (Animal Guide) by Nitesh Dhanjani, Billy Rios, Brett Hardin |
Network Security For Dummies by Chey Cobb |
Cyberpunk: Outlaws and Hackers on the Computer Frontier by Katie Hafner, John Markoff |
SQL Injection Attacks and Defense, Second Edition by Justin Clarke, Kevvie Fowler (Contributor), Erlend Oftedal (Contributor) |
Google Hacks: 100 Industrial-Strength Tips & Tools by Tara Calishain, Rael Dornfest |
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws by Dafydd Stuttard, Marcus Pinto |
Gray Hat Python: Python Programming for Hackers and Reverse Engineers by Justin Seitz |
Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz |
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by TJ O'Connor |
Automate the Boring Stuff with Python: Practical Programming for Total Beginners by Al Sweigart |
Kali Linux Revealed by Raphael Hertzog,Jim O'Gorman |
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali by OccupyTheWeb |
The Underground Guide to UNIX by John Montgomery |
The Shellcoder's Handbook by Chris Anley |
Korn Shell Programming by Example by Dennis O'Brien, David Pitts |
Wicked Cool Shell Scripts by Dave Taylor, Brandon Perry |
PoC or GTFO Volume II by Manul Laphroaig |
101 Spy Gadgets for the Evil Genius by Brad Graham, Kathy McGowan |
Getting Started Becoming a Master Hacker: Hacking is the Most Important Skill Set of the 21st Century! (Linux Basics for Hackers) by Occupytheweb |
Secrets of Computer Espionage: Tactics and Countermeasures by Joel McNamara (Author) |
|