|
1337 h4x0r h4ndb00k (Elite Hacker Handbook) by Tapeworm |
|
Codes and Cryptography by Dominic Welsh |
|
Perl Hacks: Tips & Tools for Programming, Debugging, and Surviving by chromatic, Damian Conway, Curtis "Ovid" Poe |
|
HackNotes(tm) Network Security Portable Reference by Michael Horton, Clinton Mugge |
|
Gray Hat Hacking: Ethical Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Michael Lester |
|
Chained Exploits: Advanced Hacking Attacks by Keatron Evans, Jack Voth (Contributor) |
|
Hacker Playbook 2: Practical Guide to Penetration Testing by Peter Kim |
|
Counter Hack: A Step-By-Step Guide to Computer Attacks and Effective Defenses by Ed Skoudis |
|
Hacked Again by Scott N. Schober |
|
Instant Metasploit Starter by Karthik Ranganath |
|
Hacking Web Apps: Detecting and Preventing Web Application Security Problems by Mike Shema |
|
The Basics of Web Hacking: Tools and Techniques to Attack the Web by Josh Pauli |
|
Modern Malware for Dummies by Lawrence C. Miller |
|
Next Generation Firewalls for Dummies> by Lawrence C. Miller |
|
Penetration Tester's Open Source Toolkit by Jeremy Faircloth, Jay Beale, Roelof Temmingh, Haroon Meer, Charl van der Walt, HD Moore |
|
Penetration Testing and Network Defense by Andrew Whitaker, Daniel P. Newman |
|
Hack-Proofing Your Network: Internet Tradecraft by Ryan Russell |
|
Writing Security Tools and Exploits by James C. Foster, Vincent T. Liu |
|
Hands-On Ethical Hacking and Network Defense by Michael T. Simpson, Kent Backman (Contributor), James Corley (Contributor) |
|
Network Security Evaluation Using the NSA IEM by Russ Rogers, Ed Fuller, Greg Miles, Matthew Hoagberg, Travis Schack, Ted Dykstra, Bryan Cunningham, Chuck Little |
|
Hacker Proof: The Ultimate Guide to Network Security by Lars Klander, Edward J. Renehan Jr. |
|
iPhone Hacks: Pushing the iPhone and iPod touch Beyond Their Limits by David Jurick, Adam Stolarz, Damien Stolarz |
|
Professional Rootkits by Ric Vieler |
|
Rootkits: Subverting the Windows Kernel by Greg Hoglund, Jamie Butler |
|
Hacking Knoppix (ExtremeTech) by Scott Granneman |
|
Rootkits, Spyware/Adware, Keyloggers and Backdoors: Detection and Neutralization by Oleg Zaytsev |
|
Seven Deadliest Wireless Technologies Attacks (Seven Deadliest Attacks) by Brad Haines |
|
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network by Rob Flickenger, Roger Weeks |
|
Wireless Network Hacks and Mods For Dummies by Danny Briere, Pat Hurley |
|
iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets by Jonathan Zdziarski |
|
Hacking Mobile Phones by Ankit Fadia |
|
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise by Daniel V. Hoffman |
|
Building Internet Firewalls by Elizabeth D. Zwicky, Brent Chapman |
|
Professional Penetration Testing: Creating and Learning in a Hacking Lab by Thomas Wilhelm |
|
Security Engineering: A Guide to Building Dependable Distributed Systems by Ross Anderson |
|
Incident Response by Kenneth R. van Wyk, Richard Forno |
|
The Art of Invisibility: How to Be Safe in the Age of Big Brother and Big Data by Kevin Mitnick, Robert Vamosi Mikko Hypponen (Foreword) |
|
Hacking: The Art of Exploitation by Jon Erickson |
|
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers by Kevin D. Mitnick, William L. Simon |
|
TCP/IP Clearly Explained by Peter Loshin |
|
Computer Forensics JumpStart by Michael Solomon, Neil Broom, Diane Barrett |
|
The Best Damn Cybercrime and Digital Forensics Book Period by Jack Wiles, Anthony Reyes, Jesse Varsalone |
|
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques by Thomas Wilhelm, Jason Andress |
|
Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, Kevin Mitnick (Foreword) |
|
Web Penetration Testing with Kali Linux by Joseph Muniz, Aamir Lakhani |
|
Hacking Exposed: Network Security Secrets & Solutions by Stuart McClure |
|
Is It Safe? Protecting Your Computer, Your Business, and Yourself Online by Michael Miller |
|
Hacking: The Next Generation (Animal Guide) by Nitesh Dhanjani, Billy Rios, Brett Hardin |
|
Network Security For Dummies by Chey Cobb |
|
Cyberpunk: Outlaws and Hackers on the Computer Frontier by Katie Hafner, John Markoff |
|
SQL Injection Attacks and Defense, Second Edition by Justin Clarke, Kevvie Fowler (Contributor), Erlend Oftedal (Contributor) |
|
Google Hacks: 100 Industrial-Strength Tips & Tools by Tara Calishain, Rael Dornfest |
|
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws by Dafydd Stuttard, Marcus Pinto |
|
Gray Hat Python: Python Programming for Hackers and Reverse Engineers by Justin Seitz |
|
Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz |
|
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by TJ O'Connor |
|
Automate the Boring Stuff with Python: Practical Programming for Total Beginners by Al Sweigart |
|
Kali Linux Revealed by Raphael Hertzog,Jim O'Gorman |
|
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali by OccupyTheWeb |
|
The Underground Guide to UNIX by John Montgomery |
|
The Shellcoder's Handbook by Chris Anley |
|
Korn Shell Programming by Example by Dennis O'Brien, David Pitts |
|
Wicked Cool Shell Scripts by Dave Taylor, Brandon Perry |
|
PoC or GTFO Volume II by Manul Laphroaig |
|
101 Spy Gadgets for the Evil Genius by Brad Graham, Kathy McGowan |
|
Getting Started Becoming a Master Hacker: Hacking is the Most Important Skill Set of the 21st Century! (Linux Basics for Hackers) by Occupytheweb |
|
Secrets of Computer Espionage: Tactics and Countermeasures by Joel McNamara (Author) |
|
|