Category | Name | Link |
---|---|---|
Android Security Books | Hacking Android | link |
Android Security Books | Android Security Internals An In-Depth Guide to Androids Security Architecture | link |
Android Security Books | Android Hackers Handbook | link |
Android Security Books | Android Security Cookbook | link |
Android Security Books | Bulletproof Android Practical Advice for Building Secure Apps Developers Library 1st Edition | link |
Antivirus Engine Construction Books | Antivirus software Complete Self-Assessment | link |
Antivirus Evasion Books | The Antivirus Hackers Handbook | link |
Automated Network Security Scanning Books | Network Scanning Cookbook | link |
Automated Network Security Scanning Books | Practical Network Scanning Capture network vulnerabilities using standard tools such as Nmap and Nessus | link |
Automated Network Security Scanning Books | Nmap 7 Simple Guide on Network Scanning | link |
Automated Web Application Scanning Books | Practical Security Automation and Testing Tools and techniques for automated security scanning and testing in DevSecOps | link |
Bot and Web Automation Detection Books | Fraud and Fraud Detection Website A Data Analytics Approach | link |
Browser HackingSecurity Books | The Browser Hackers Handbook | link |
Browser HackingSecurity Books | Hacking Exposed Web Applications | link |
Browser HackingSecurity Books | Hacking Tor The Complete Beginners Guide To Hacking Tor Accessing The Deep Web Dark Web | link |
Browser HackingSecurity Books | The Web Application Hackers Handbook Finding and Exploiting Security Flaws1 | link |
Browser HackingSecurity Books | Tor Browser Secrets of the Deep Web How to Stay Anonymous Online and Surf the Web Like a Hacker | link |
Browser HackingSecurity Books | Hacking Web Apps Detecting and Preventing Web Application Security Problems | link |
Bug Hunting Books | Real-World Bug Hunting A Field Guide to Web Hacking | link |
Bug Hunting Books | Bug Bounty Hunting Essentials Quick-paced guide to help white-hat hackers get through bug bounty programs | link |
Bug Hunting Books | A Bug Hunters Diary A Guided Tour Through the Wilds of Software Security | link |
Bug Hunting Books | Hands-On Bug Hunting for Penetration Testers A practical guide to help ethical hackers discover web application security flaws | link |
Bug Hunting Books | Bug Bounty Hunting for Web Security Find and Exploit Vulnerabilities in Websites and Applications | link |
Data Protection Books | Privacy and Data Protection Law University Casebook Series | link |
Data Protection Books | Data Protection | link |
Data Protection Books | Data Protection Governance Risk Management and Compliance | link |
Data Protection Books | The Data Protection Officer Profession Rules and Role | link |
Data Protection Books | Data Protection and Privacy The Internet of Bodies Computers Privacy and Data Protection | link |
Drupal Security Books | Drupal Security Best Practices A Practical Guide | link |
Email/Machine learning Books | Machine Learning for Email Spam Filtering and Priority Inbox | link |
Email/Machine learning Books | Machine Learning for Hackers Case Studies and Algorithms to Get You Started | link |
Email/Machine learning Books | Machine Learning The Definitive Guide | link |
Exploit Development Books | Penetration Testing with Shellcode Detect exploit and secure network-level and operating system vulnerabilities | link |
Exploit Development Books | Hacking The Art of Exploitation 2nd Edition | link |
Exploit Development Books | Deep Dive The Development of an Exploit Win32 | link |
Exploit Development Books | The Shellcoders Handbook Discovering and Exploiting Security Holes | link |
General Cyber Security Books | The Art of Intrusion The Real Stories Behind the Exploits of Hackers Intruders and Deceivers | link |
Intrusion Detection Systems Books | Engineering Trustworthy Systems Get Cybersecurity Design Right the First Time | link |
Intrusion Detection Systems Books | Network Intrusion Detection using Deep Learning A Feature Learning Approach | link |
Intrusion Detection Systems Books | The 2020-2025 World Outlook for Intrusion Detection Systems IDS | link |
iOS Security Books | The Mobile Application Hackers Handbook | link |
iOS Security Books | iOS Application Security The Definitive Guide for Hackers and Developers | link |
iOS Security Books | Ios Security Protect Your Iphone Ipad and Apple Watch | link |
iOS Security Books | iOS Penetration Testing A Definitive Guide to iOS Security | link |
IOT Security Books | The IoT Hackers Handbook A Practical Guide to Hacking the Internet of Things | link |
IOT Security Books | Internet of Things Security Fundamentals Techniques and Applications | link |
IOT Security Books | Practical Industrial Internet of Things Security A Practitioners Guide to Securing Connected Industries | link |
IOT Security Books | Practical Internet of Things Security Design a Security Framework for an Internet Connected Ecosystem 2nd Edition | link |
IOT Security Books | Security and Privacy in Internet of Things IoTs Models Algorithms and Implementations | link |
IOT Security Books | Security Privacy and Trust in the IoT Environment | link |
Joomla Security Books | Joomla Web Security | link |
Large scale Software Engineering Books | Software Engineering for Large-Scale Multi-Agent Systems Research Issues and Practical Applications Lecture Notes in Computer Science | link |
Large scale Software Engineering Books | Software Architects Handbook Become a successful software architect by implementing effective architecture concepts | link |
Network Security Books | Computer Internet Security A Hands-on Approach | link |
Network Security Books | Network Security Essentials Applications and Standards 6th Edition | link |
Network Security Books | The Network Security Test Lab A Step-by-Step Guide | link |
Network Security Books | CompTIA Security Guide to Network Security Fundamentals | link |
Network Security Books | Hands-On Network Forensics Investigate network attacks and find evidence using common network forensic tools | link |
Network Security Books | Network Forensics Tracking Hackers through Cyberspace | link |
Network Target Enumeration Books | Network Security Assessment Know Your Network | link |
Network Target Enumeration Books | Nmap Network Scanning The Official Nmap Project Guide to Network Discovery and Security Scanning | link |
Open Source Intelligence Gathering Books | Open Source Intelligence Techniques Resources for Searching and Analyzing Online Information 6th Edition | link |
Open Source Intelligence Gathering Books | Open Source Intelligence Methods and Tools A Practical Guide to Online Intelligence | link |
Open Source Intelligence Gathering Books | Down the Rabbit Hole An OSINT Journey Open Source Intelligence Gathering for Penetration Testing | link |
Open Source Intelligence Gathering Books | The Tao of Open Source Intelligence | link |
Open Source Intelligence Gathering Books | Automating Open Source Intelligence Algorithms for OSINT | link |
Open Source Intelligence Gathering Books | Open Source Intelligence Investigation From Strategy to Implementation Advanced Sciences and Technologies for Security Applications | link |
Open Source Intelligence Gathering Books | Fuzzing Brute Force Vulnerability Discovery | link |
Pentesting Books | Red Team Field Manual V3 | link |
Pentesting Books | Hacker Playbook 2 | link |
Pentesting Books | Hacker Playbook 3 | link |
Phishing Books | Phishing Attacks Advanced Attack Techniques | link |
Phishing Books | Phishing Detection Analysis And Prevention | link |
Python for Pentesters Books | Violent Python - A Cookbook for Hackers Forensic Analysts Penetration Testers and Security Engineers | link |
Python for Pentesters Books | Black Hat Python | link |
Python for Pentesters Books | Gray Hat Python | link |
Risk Management Books | How to Measure Anything in Cybersecurity Risk | link |
Risk Management Books | Managing Cybersecurity Risk Cases Studies and Solutions | link |
Risk Management Books | Cyber Risk Management Prioritize Threats Identify Vulnerabilities and Apply Controls | link |
Risk Management Books | Managing Cybersecurity Risk How Directors and Corporate Officers Can Protect Their Businesses | link |
Risk Management Books | The Cyber Risk Handbook Creating and Measuring Effective Cybersecurity Capabilities | link |
Secure Development Books | Secure and Resilient Software Development | link |
Secure Development Books | Secure Development for Mobile Apps How to Design and Code Secure Mobile Applications with PHP and JavaScript | link |
Secure Development Books | Secure Software Development A Security Programmers Guide | link |
Secure Development Books | Secure Software Development A Complete Guide - 2020 Edition | link |
Security Oriented C Development Books | Programming NET Security Writing Secure Applications Using C or Visual Basic NET | link |
Security Oriented C Development Books | The Modern C Challenge Become an expert C programmer by solving interesting programming problems | link |
Security Oriented Python Development Books | Python Cyber Security and Python Programming Step-by-Step Guides | link |
Security Oriented Python Development Books | Mastering Python for Networking and Security | link |
Security Oriented Python Development Books | Secure Programming with Python | link |
Security Oriented Python Development Books | Violent Python A Cookbook for Hackers Forensic Analysts Penetration Testers and Security Engineers | link |
Small Scale Software Engineering Books | Beginning Software Engineering | link |
Software Fuzzing Books | Fuzzing for Software Security Testing and Quality Assurance | link |
Spam Filtering Books | Ending Spam Bayesian Content Filtering and the Art of Statistical Language Classification | link |
Spam Filtering Books | Spam Filtering System using Ant Colony Optimization and Naive Bayesian | link |
Spam Filtering Books | Improved Classifier Technique for Spam Filtering | link |
Web Application Firewalls Books | Web Application Defenders Cookbook Battling Hackers and Protecting Users | link |
Web Application Firewalls Books | Web Application Firewalls | link |
Web Application Firewalls Books | Web Application Firewalls A Practical Approach | link |
Web Application Firewalls Books | Web Application Firewalls Intrusion A Complete Guide - 2020 Edition | link |
Web Application Security Books | Identity and Data Security for Web Development Best Practices 1st Edition | link |
Web Application Security Books | Practical Web Penetration Testing | link |
Web Application Security Books | The Managers Guide to Web Application Security | link |
Web Application Security Books | The Penetration Testers Guide to Web Applications Artech House Computer Security Series | link |
Web Application Security Books | The Web Application Hackers Handbook Finding and Exploiting Security Flaws | link |
Web Application Security Books | The Tangled Web A Guide to Securing Modern Web Applications | link |
Web Application Stress Testing Books | The Web Testing Handbook | link |
Web Application Stress Testing Books | Performance Testing Microsoft NET Web Applications Developer Reference | link |
Web Application Stress Testing Books | Automated Web Testing Step by Step Automation Guide | link |
WordPress Security Books | Best WordPress Security Plugins The 58 Best Free WordPress Plugins For Making Your Website Hack-Proof | link |
WordPress Security Books | WordPress Security For Webmasters 2020 | link |
WordPress Security Books | WordPress Security for Webmaster 2017 | link |
WordPress Security Books | WordPress Security Made Easy | link |
Zero Day Exploits Books | Cybersecurity 101 What You Absolutely Must Know - Volume 1 | link |
General Cyber Security Books | Security in Computing | link |
Incident Response | Crafting the Infosec Playbook: Security Monitoring and Incident Response Master Plan | link |
Malware/Forensics | Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious Software | link |
General Cyber Security Books | Cyber War: The Next Threat to National Security and What to Do About It – Richard Clarke, Robert Knake | link |
General Cyber Security Books | Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage By Gordon Corera | link |
General Cyber Security Books | Cybersecurity and human rights in the age of cyberveillance , edited by Joanna Klesza & Roy Balleste | link |
General Cyber Security Books | Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon | link |
General Cyber Security Books | We Are Anonymous | link |
General Cyber Security Books | The Cuckoo's Egg | link |
General Cyber Security Books | Ghost in the Wires | link |
General Cyber Security Books | Dark Territory: The Secret History of the Cyber War | link |
Hardware Hacking | The Hardware Hacker | link |
-
Notifications
You must be signed in to change notification settings - Fork 2
davidalex89/Infosec_Books
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
Running list of infosec books
Topics
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published