Hacking & Computer Security

Black Hat Bash cover

Black Hat Bash

Dolev Farhi, Nick Aleks

Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!

Black Hat Go

Black Hat Go

Tom Steele, Chris Patten, and Dan Kottmann

Black Hat Go will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset.

Black Hat GraphQL Cover

Black Hat GraphQL

Dolev Farhi, Nick Aleks

Written by hackers for hackers, this hands-on book shows how to identify vulnerabilities in apps that use GraphQL.

Bug Bounty Bootcamp

Bug Bounty Bootcamp

Vickie Li

A beginner's guide to web hacking, bug hunting, reporting vulnerabilities – and getting paid for it.

Codebreaking cover

Codebreaking

Elonka Dunin and Klaus Schmeh

A tour through history’s real codes and ciphers written by two of today’s best cipher crackers.

Cyberjutsu

Cyberjutsu

Ben McCarty

Based on techniques adapted from authentic Japanese ninja scrolls, Cyberjutsu teaches ancient approaches to modern security problems.

Cybersecurity for Small Networks Cover

Cybersecurity for Small Networks

Seth Enoka

A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack.

Cybersecurity Tabletop Exercises cover

Cybersecurity Tabletop Exercises

Robert Lelewski and John Hollenberger

The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop exercises.

Designing Secure Software

Designing Secure Software

Loren Kohnfelder

An elegant, team-oriented guide for building security into the software design process.

Engineering Secure Devices cover

Engineering Secure Devices

Dominik Merli

An essential resource for current and future developers tasked with protecting users from the potential threats of these ubiquitous devices.

Ethical Hacking Cover

Ethical Hacking

Daniel G. Graham

A crash course in modern hacking techniques, with lots of hands-on labs for aspiring offensive security experts.

Evading EDR cover

Evading EDR

Matt Hand

A guide to understanding the attack-detection software running on Microsoft systems, and how to evade it.

Evasive Malware Cover

Evasive Malware

Kyle Cucci

The first-ever guide to analyzing malicious Windows software designed to avoid detection and forensic tools.

 

Go H*ck Yourself Cover

Go H*ck Yourself

Bryson Payne

A hands-on intro to hacking that guides you through executing every major type of attack (from the safety of a virtual lab).

Gray Hat C#

Gray Hat C#

Brandon Perry

Gray Hat C# shows you how to use C#'s powerful set of core libraries to create and automate security tools.

Gray Hat Python

Gray Hat Python

Justin Seitz

The first Python book written for security analysts, Gray Hat Python explains the intricacies of using Python to assist in security analysis tasks. You'll learn how to design your own debuggers, create powerful fuzzers, utilize open source libraries to automate tedious tasks, interface with security tools, and more.

Hacking APIs Cover

Hacking APIs

Corey Ball

Learn how to test APIs for security vulnerabilities so you can uncover high-payout bugs and improve the security of web apps.

Hacking VoIP

Hacking VoIP

Himanshu Dwivedi

Hacking VoIP is your map and guidebook to where VoIP's biggest weaknesses lie and how to shore up your security

Hacking: The Art of Exploitation (2nd Edition)

Hacking, 2nd Edition

Jon Erickson

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

How to Hack Like a Legend Cover

How to Hack Like a Legend

Sparc Flow

Puts you in the mind of a master hacker, as you plan and launch a stealth attack on Microsoft’s best security systems.

IDA Pro Book, 2nd Edition

IDA Pro Book, 2nd Edition

Chris Eagle

No source code? No problem! This second edition of the The IDA Pro Book is the definitive guide to IDA Pro, arguably the most sophisticated disassembler in the world.

Linux Firewalls

Linux Firewalls

Michael Rash

If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and to detect and even prevent compromises.

Locksport Cover

Locksport

Jos Weyers, Matt Burrough, Walter Belgers, BandEAtoZ, and Nigel K. Tolley

This hands-on guide to the art of lockpicking will take you from noob to competition-ready.

Metasploit Cover

Metasploit

David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni

Whether your goal is to secure your own network or discover vulnerabilities for a client, Metasploit: The Penetration Tester's Guide is the definitive guide to using this dynamic and powerful tool.
 

Metasploit, 2nd Edition cover

Metasploit, 2nd Edition

David Kennedy, Mati Aharoni, Devon Kearns, Jim O’Gorman, and Daniel Graham

The second edition of the international bestseller Metasploit is written by some of the world’s best hackers and is the only introduction you’ll ever need to the legendary Framework.

Microcontroller Exploits cover

Microcontroller Exploits

Travis Goodspeed

A deep dive into advanced hardware hacking with detailed examples of real-world techniques and a comprehensive survey of vulnerabilities.

 

Penetration Testing: A Hands-on Introduction to Hacking

Penetration Testing

Georgia Weidman

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs.

PoC||GTFO

PoC||GTFO

Manul Laphroaig

PoC||GTFO (Proof of Concept or Get The Fuck Out) is a compilation of the wildly popular hacker zine of the same name. Contributions range from humorous poems to deeply technical essays.

Practical Doomsday

Practical Doomsday

Michal Zalewski

Outlines a model for evaluating risks in your life, as well as preparing for a wide range of potential crises.

Practical IoT Hacking

Practical IoT Hacking

Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, Beau Woods

Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and devices.

Practical Linux Forensics Cover

Practical Linux Forensics

Bruce Nikkel

A practitioner’s guide focused on postmortem analysis of modern Linux installations.

Practical Malware Analysis

Practical Malware Analysis

Michael Sikorski and Andrew Honig

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.

Practical Social Engineering Cover

Practical Social Engineering

Joe Gray

A hands-on look at the cyber attacks that target human nature, with pentesting templates for performing SE ops, and tips for defending against them.

Serious Cryptography, 2nd Edition placeholder cover

Serious Cryptography, 2nd Edition

Jean-Philippe Aumasson

Serious Cryptography, 2nd edition, is a practical guide to the past, present, and future of cryptographic systems and algorithms.

Steal This Computer Book 4.0

Steal This Computer Book 4.0

Wallace Wang

If you thought hacking was just about mischief-makers hunched over computers in the basement, think again.

The Tangled Web

Tangled Web

Michal Zalewski

The Tangled Web sheds light on the security challenges that engineers, developers, and users face on the Web today. Join security expert Michal Zalewski for an in-depth look at how browsers actually work, and what pitfalls lurk in the shadows.

The Android Malware Handbook cover

The Android Malware Handbook

Qian Han, Salvador Mandujano, Sebastian Porst, V.S. Subrahmanian, Sai Deep Tetali, and Yanhai Xiong

An all-star guide to tackling the analysis and detection of malware that targets the Android operating system.

The Art of Cyberwarfare Cover

The Art of Cyberwarfare

Jon DiMaggio

A detailed guide to nation-state hacking methods that shows how to track, analyze, and attribute advanced attacks.

The Art of Mac Malware, Volume 2 placeholder cover

The Art of Mac Malware, Volume 2

Patrick Wardle

This first-of-its-kind guide to detecting stealthy Mac malware gives you the tools and techniques to counter even the most sophisticated threats targeting the Apple ecosystem.

The Ghidra Book

The Ghidra Book

Chris Eagle and Kara Nance

The Ghidra Book is a practical introduction to Ghidra, a comprehensive, open-source tool suite for reverse engineers.

The Hardware Hacking Handbook

The Hardware Hacking Handbook

Colin O'Flynn and Jasper van Woudenberg

Cracks open embedded security to show how hardware attacks work from the inside out.

Windows Security Internals placeholder cover

Windows Security Internals

James Forshaw

Power up your Windows security skills with expert guidance, in-depth technical insights, and lots of real-world vulnerability examples.