1 |
|
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
by
4.48 avg rating — 606 ratings
|
|
2 |
|
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
by
4.29 avg rating — 176 ratings
|
|
3 |
|
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
by
4.05 avg rating — 154 ratings
|
|
4 |
|
Incident Response & Computer Forensics, Third Edition
by
4.33 avg rating — 112 ratings
|
|
5 |
|
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
by
4.06 avg rating — 262 ratings
|
|
6 |
|
Applied Network Security Monitoring: Collection, Detection, and Analysis
by
4.20 avg rating — 64 ratings
|
|
7 |
|
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
by
4.03 avg rating — 550 ratings
|
|
8 |
|
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
by
4.23 avg rating — 1,222 ratings
|
|
9 |
|
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
by
3.94 avg rating — 324 ratings
|
|
10 |
|
Social Engineering
by
3.83 avg rating — 3,841 ratings
|
|
11 |
|
Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions
by
3.57 avg rating — 30 ratings
|
|
12 |
|
Hacking Exposed 7: Network Security Secrets and Solutions
by
3.80 avg rating — 1,165 ratings
|
|
13 |
|
Network Forensics: Tracking Hackers through Cyberspace
by
4.21 avg rating — 66 ratings
|
|
14 |
|
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
by
4.21 avg rating — 467 ratings
|
|
15 |
|
Agent Storm: My Life Inside al Qaeda and the CIA
by
4.01 avg rating — 1,957 ratings
|
|
16 |
|
Terrorism and Counterintelligence: How Terrorist Groups Elude Detection
by
4.23 avg rating — 26 ratings
|
|
17 |
|
Chinese intelligence operations
by
3.72 avg rating — 102 ratings
|
|
18 |
|
The Art of Intelligence
by
3.84 avg rating — 3,126 ratings
|
|
19 |
|
The Black Banners: The Inside Story of 9/11 and the War Against al-Qaeda
by
4.27 avg rating — 2,858 ratings
|
|
20 |
|
See No Evil: The True Story of a Ground Soldier in the CIA's War on Terrorism
by
3.94 avg rating — 5,180 ratings
|
|
21 |
|
Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer
by
3.87 avg rating — 238 ratings
|
|
22 |
|
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
by
4.11 avg rating — 120 ratings
|
|
23 |
|
Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel
by
4.11 avg rating — 164 ratings
|
|
24 |
|
Black Hat Python: Python Programming for Hackers and Pentesters
by
4.11 avg rating — 602 ratings
|
|
25 |
|
Digital Forensics with Open Source Tools
by
4.23 avg rating — 61 ratings
|
|
26 |
|
File System Forensic Analysis
by
4.28 avg rating — 186 ratings
|
|
27 |
|
Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8
by
4.07 avg rating — 15 ratings
|
|
28 |
|
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
by
4.18 avg rating — 44 ratings
|
|
29 |
|
Offensive Countermeasures: The Art of Active Defense
by
4.14 avg rating — 103 ratings
|
|
30 |
|
Real Digital Forensics: Computer Security and Incident Response
by
4.20 avg rating — 93 ratings
|
|
31 |
|
The Tangled Web: A Guide to Securing Modern Web Applications
by
4.05 avg rating — 552 ratings
|
|
32 |
|
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
by
4.34 avg rating — 125 ratings
|
|
33 |
|
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
by
4.21 avg rating — 184 ratings
|
|
34 |
|
Reversing: Secrets of Reverse Engineering
by
4.09 avg rating — 546 ratings
|
|
35 |
|
Windows Internals: Covering Windows Server 2008 and Windows Vista
by
4.49 avg rating — 178 ratings
|
|