Hacking & Computer Security

Microcontroller Exploits cover

Microcontroller Exploits

Travis Goodspeed

A deep dive into advanced hardware hacking with detailed examples of real-world techniques and a comprehensive survey of vulnerabilities.

 

Serious Cryptography, 2nd Edition placeholder cover

Serious Cryptography, 2nd Edition

Jean-Philippe Aumasson

Serious Cryptography, 2nd edition, is a practical guide to the past, present, and future of cryptographic systems and algorithms.

Cybersecurity Tabletop Exercises cover

Cybersecurity Tabletop Exercises

Robert Lelewski and John Hollenberger

The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop exercises.

The Art of Mac Malware, Volume 2 cover

The Art of Mac Malware, Volume 2

Patrick Wardle

This first-of-its-kind guide to detecting stealthy Mac malware gives you the tools and techniques to counter even the most sophisticated threats targeting the Apple ecosystem.

Black Hat Bash cover

Black Hat Bash

Dolev Farhi, Nick Aleks

Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!

Windows Security Internals cover

Windows Security Internals

James Forshaw

Power up your Windows security skills with expert guidance, in-depth technical insights, and lots of real-world vulnerability examples.

Engineering Secure Devices cover

Engineering Secure Devices

Dominik Merli

An essential resource for current and future developers tasked with protecting users from the potential threats of these ubiquitous devices.

Evasive Malware Cover

Evasive Malware

Kyle Cucci

The first-ever guide to analyzing malicious Windows software designed to avoid detection and forensic tools.

 

The Android Malware Handbook cover

The Android Malware Handbook

Qian Han, Salvador Mandujano, Sebastian Porst, V.S. Subrahmanian, Sai Deep Tetali, and Yanhai Xiong

An all-star guide to tackling the analysis and detection of malware that targets the Android operating system.

Evading EDR cover

Evading EDR

Matt Hand

A guide to understanding the attack-detection software running on Microsoft systems, and how to evade it.

Black Hat GraphQL Cover

Black Hat GraphQL

Dolev Farhi, Nick Aleks

Written by hackers for hackers, this hands-on book shows how to identify vulnerabilities in apps that use GraphQL.

Metasploit, 2nd Edition cover

Metasploit, 2nd Edition

David Kennedy, Mati Aharoni, Devon Kearns, Jim O’Gorman, and Daniel Graham

The second edition of the international bestseller Metasploit is written by some of the world’s best hackers and is the only introduction you’ll ever need to the legendary Framework.

Codebreaking cover

Codebreaking

Elonka Dunin and Klaus Schmeh

A tour through history’s real codes and ciphers written by two of today’s best cipher crackers.

Hacking APIs Cover

Hacking APIs

Corey Ball

Learn how to test APIs for security vulnerabilities so you can uncover high-payout bugs and improve the security of web apps.

The Art of Cyberwarfare Cover

The Art of Cyberwarfare

Jon DiMaggio

A detailed guide to nation-state hacking methods that shows how to track, analyze, and attribute advanced attacks.

Locksport Cover

Locksport

Jos Weyers, Matt Burrough, Walter Belgers, BandEAtoZ, and Nigel K. Tolley

This hands-on guide to the art of lockpicking will take you from noob to competition-ready.

Designing Secure Software cover

Designing Secure Software

Loren Kohnfelder

An elegant, team-oriented guide for building security into the software design process.

Practical Doomsday

Practical Doomsday

Michal Zalewski

Outlines a model for evaluating risks in your life, as well as preparing for a wide range of potential crises.

Go H*ck Yourself Cover

Go H*ck Yourself

Bryson Payne

A hands-on intro to hacking that guides you through executing every major type of attack (from the safety of a virtual lab).

Practical Linux Forensics Cover

Practical Linux Forensics

Bruce Nikkel

A practitioner’s guide focused on postmortem analysis of modern Linux installations.

Bug Bounty Bootcamp cover

Bug Bounty Bootcamp

Vickie Li

A beginner's guide to web hacking, bug hunting, reporting vulnerabilities – and getting paid for it.

Ethical Hacking Cover

Ethical Hacking

Daniel G. Graham

A crash course in modern hacking techniques, with lots of hands-on labs for aspiring offensive security experts.

How to Hack Like a Legend Cover

How to Hack Like a Legend

Sparc Flow

Puts you in the mind of a master hacker, as you plan and launch a stealth attack on Microsoft’s best security systems.

Cybersecurity for Small Networks Cover

Cybersecurity for Small Networks

Seth Enoka

A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack.

Practical IoT Hacking cover

Practical IoT Hacking

Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, Beau Woods

Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and devices.

Cyberjutsu cover

Cyberjutsu

Ben McCarty

Based on techniques adapted from authentic Japanese ninja scrolls, Cyberjutsu teaches ancient approaches to modern security problems.

Practical Social Engineering Cover

Practical Social Engineering

Joe Gray

A hands-on look at the cyber attacks that target human nature, with pentesting templates for performing SE ops, and tips for defending against them.

The Ghidra Book

The Ghidra Book

Chris Eagle and Kara Nance

The Ghidra Book is a practical introduction to Ghidra, a comprehensive, open-source tool suite for reverse engineers.

The Hardware Hacking Handbook

The Hardware Hacking Handbook

Colin O'Flynn and Jasper van Woudenberg

Cracks open embedded security to show how hardware attacks work from the inside out.

Black Hat Go

Black Hat Go

Tom Steele, Chris Patten, and Dan Kottmann

Black Hat Go will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset.

PoC||GTFO

PoC||GTFO

Manul Laphroaig

PoC||GTFO (Proof of Concept or Get The Fuck Out) is a compilation of the wildly popular hacker zine of the same name. Contributions range from humorous poems to deeply technical essays.

Gray Hat C#

Gray Hat C#

Brandon Perry

Gray Hat C# shows you how to use C#'s powerful set of core libraries to create and automate security tools.

Penetration Testing: A Hands-on Introduction to Hacking

Penetration Testing

Georgia Weidman

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs.

The Tangled Web

Tangled Web

Michal Zalewski

The Tangled Web sheds light on the security challenges that engineers, developers, and users face on the Web today. Join security expert Michal Zalewski for an in-depth look at how browsers actually work, and what pitfalls lurk in the shadows.

Practical Malware Analysis

Practical Malware Analysis

Michael Sikorski and Andrew Honig

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.

IDA Pro Book, 2nd Edition

IDA Pro Book, 2nd Edition

Chris Eagle

No source code? No problem! This second edition of the The IDA Pro Book is the definitive guide to IDA Pro, arguably the most sophisticated disassembler in the world.

Metasploit Cover

Metasploit

David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni

Whether your goal is to secure your own network or discover vulnerabilities for a client, Metasploit: The Penetration Tester's Guide is the definitive guide to using this dynamic and powerful tool.
 

Steal This Computer Book 4.0

Steal This Computer Book 4.0

Wallace Wang

If you thought hacking was just about mischief-makers hunched over computers in the basement, think again.

Linux Firewalls

Linux Firewalls

Michael Rash

If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and to detect and even prevent compromises.

Hacking VoIP

Hacking VoIP

Himanshu Dwivedi

Hacking VoIP is your map and guidebook to where VoIP's biggest weaknesses lie and how to shore up your security

Gray Hat Python

Gray Hat Python

Justin Seitz

The first Python book written for security analysts, Gray Hat Python explains the intricacies of using Python to assist in security analysis tasks. You'll learn how to design your own debuggers, create powerful fuzzers, utilize open source libraries to automate tedious tasks, interface with security tools, and more.

Hacking: The Art of Exploitation (2nd Edition)

Hacking, 2nd Edition

Jon Erickson

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.