davidalex89 / Infosec_Books

Running list of infosec books

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Infosec Book Collection

Category Name Link
Android Security Books Hacking Android link
Android Security Books Android Security Internals An In-Depth Guide to Androids Security Architecture link
Android Security Books Android Hackers Handbook link
Android Security Books Android Security Cookbook link
Android Security Books Bulletproof Android Practical Advice for Building Secure Apps Developers Library 1st Edition link
Antivirus Engine Construction Books Antivirus software Complete Self-Assessment link
Antivirus Evasion Books The Antivirus Hackers Handbook link
Automated Network Security Scanning Books Network Scanning Cookbook link
Automated Network Security Scanning Books Practical Network Scanning Capture network vulnerabilities using standard tools such as Nmap and Nessus link
Automated Network Security Scanning Books Nmap 7 Simple Guide on Network Scanning link
Automated Web Application Scanning Books Practical Security Automation and Testing Tools and techniques for automated security scanning and testing in DevSecOps link
Bot and Web Automation Detection Books Fraud and Fraud Detection Website A Data Analytics Approach link
Browser HackingSecurity Books The Browser Hackers Handbook link
Browser HackingSecurity Books Hacking Exposed Web Applications link
Browser HackingSecurity Books Hacking Tor The Complete Beginners Guide To Hacking Tor Accessing The Deep Web Dark Web link
Browser HackingSecurity Books The Web Application Hackers Handbook Finding and Exploiting Security Flaws1 link
Browser HackingSecurity Books Tor Browser Secrets of the Deep Web How to Stay Anonymous Online and Surf the Web Like a Hacker link
Browser HackingSecurity Books Hacking Web Apps Detecting and Preventing Web Application Security Problems link
Bug Hunting Books Real-World Bug Hunting A Field Guide to Web Hacking link
Bug Hunting Books Bug Bounty Hunting Essentials Quick-paced guide to help white-hat hackers get through bug bounty programs link
Bug Hunting Books A Bug Hunters Diary A Guided Tour Through the Wilds of Software Security link
Bug Hunting Books Hands-On Bug Hunting for Penetration Testers A practical guide to help ethical hackers discover web application security flaws link
Bug Hunting Books Bug Bounty Hunting for Web Security Find and Exploit Vulnerabilities in Websites and Applications link
Data Protection Books Privacy and Data Protection Law University Casebook Series link
Data Protection Books Data Protection link
Data Protection Books Data Protection Governance Risk Management and Compliance link
Data Protection Books The Data Protection Officer Profession Rules and Role link
Data Protection Books Data Protection and Privacy The Internet of Bodies Computers Privacy and Data Protection link
Drupal Security Books Drupal Security Best Practices A Practical Guide link
Email/Machine learning Books Machine Learning for Email Spam Filtering and Priority Inbox link
Email/Machine learning Books Machine Learning for Hackers Case Studies and Algorithms to Get You Started link
Email/Machine learning Books Machine Learning The Definitive Guide link
Exploit Development Books Penetration Testing with Shellcode Detect exploit and secure network-level and operating system vulnerabilities link
Exploit Development Books Hacking The Art of Exploitation 2nd Edition link
Exploit Development Books Deep Dive The Development of an Exploit Win32 link
Exploit Development Books The Shellcoders Handbook Discovering and Exploiting Security Holes link
General Cyber Security Books The Art of Intrusion The Real Stories Behind the Exploits of Hackers Intruders and Deceivers link
Intrusion Detection Systems Books Engineering Trustworthy Systems Get Cybersecurity Design Right the First Time link
Intrusion Detection Systems Books Network Intrusion Detection using Deep Learning A Feature Learning Approach link
Intrusion Detection Systems Books The 2020-2025 World Outlook for Intrusion Detection Systems IDS link
iOS Security Books The Mobile Application Hackers Handbook link
iOS Security Books iOS Application Security The Definitive Guide for Hackers and Developers link
iOS Security Books Ios Security Protect Your Iphone Ipad and Apple Watch link
iOS Security Books iOS Penetration Testing A Definitive Guide to iOS Security link
IOT Security Books The IoT Hackers Handbook A Practical Guide to Hacking the Internet of Things link
IOT Security Books Internet of Things Security Fundamentals Techniques and Applications link
IOT Security Books Practical Industrial Internet of Things Security A Practitioners Guide to Securing Connected Industries link
IOT Security Books Practical Internet of Things Security Design a Security Framework for an Internet Connected Ecosystem 2nd Edition link
IOT Security Books Security and Privacy in Internet of Things IoTs Models Algorithms and Implementations link
IOT Security Books Security Privacy and Trust in the IoT Environment link
Joomla Security Books Joomla Web Security link
Large scale Software Engineering Books Software Engineering for Large-Scale Multi-Agent Systems Research Issues and Practical Applications Lecture Notes in Computer Science link
Large scale Software Engineering Books Software Architects Handbook Become a successful software architect by implementing effective architecture concepts link
Network Security Books Computer Internet Security A Hands-on Approach link
Network Security Books Network Security Essentials Applications and Standards 6th Edition link
Network Security Books The Network Security Test Lab A Step-by-Step Guide link
Network Security Books CompTIA Security Guide to Network Security Fundamentals link
Network Security Books Hands-On Network Forensics Investigate network attacks and find evidence using common network forensic tools link
Network Security Books Network Forensics Tracking Hackers through Cyberspace link
Network Target Enumeration Books Network Security Assessment Know Your Network link
Network Target Enumeration Books Nmap Network Scanning The Official Nmap Project Guide to Network Discovery and Security Scanning link
Open Source Intelligence Gathering Books Open Source Intelligence Techniques Resources for Searching and Analyzing Online Information 6th Edition link
Open Source Intelligence Gathering Books Open Source Intelligence Methods and Tools A Practical Guide to Online Intelligence link
Open Source Intelligence Gathering Books Down the Rabbit Hole An OSINT Journey Open Source Intelligence Gathering for Penetration Testing link
Open Source Intelligence Gathering Books The Tao of Open Source Intelligence link
Open Source Intelligence Gathering Books Automating Open Source Intelligence Algorithms for OSINT link
Open Source Intelligence Gathering Books Open Source Intelligence Investigation From Strategy to Implementation Advanced Sciences and Technologies for Security Applications link
Open Source Intelligence Gathering Books Fuzzing Brute Force Vulnerability Discovery link
Pentesting Books Red Team Field Manual V3 link
Pentesting Books Hacker Playbook 2 link
Pentesting Books Hacker Playbook 3 link
Phishing Books Phishing Attacks Advanced Attack Techniques link
Phishing Books Phishing Detection Analysis And Prevention link
Python for Pentesters Books Violent Python - A Cookbook for Hackers Forensic Analysts Penetration Testers and Security Engineers link
Python for Pentesters Books Black Hat Python link
Python for Pentesters Books Gray Hat Python link
Risk Management Books How to Measure Anything in Cybersecurity Risk link
Risk Management Books Managing Cybersecurity Risk Cases Studies and Solutions link
Risk Management Books Cyber Risk Management Prioritize Threats Identify Vulnerabilities and Apply Controls link
Risk Management Books Managing Cybersecurity Risk How Directors and Corporate Officers Can Protect Their Businesses link
Risk Management Books The Cyber Risk Handbook Creating and Measuring Effective Cybersecurity Capabilities link
Secure Development Books Secure and Resilient Software Development link
Secure Development Books Secure Development for Mobile Apps How to Design and Code Secure Mobile Applications with PHP and JavaScript link
Secure Development Books Secure Software Development A Security Programmers Guide link
Secure Development Books Secure Software Development A Complete Guide - 2020 Edition link
Security Oriented C Development Books Programming NET Security Writing Secure Applications Using C or Visual Basic NET link
Security Oriented C Development Books The Modern C Challenge Become an expert C programmer by solving interesting programming problems link
Security Oriented Python Development Books Python Cyber Security and Python Programming Step-by-Step Guides link
Security Oriented Python Development Books Mastering Python for Networking and Security link
Security Oriented Python Development Books Secure Programming with Python link
Security Oriented Python Development Books Violent Python A Cookbook for Hackers Forensic Analysts Penetration Testers and Security Engineers link
Small Scale Software Engineering Books Beginning Software Engineering link
Software Fuzzing Books Fuzzing for Software Security Testing and Quality Assurance link
Spam Filtering Books Ending Spam Bayesian Content Filtering and the Art of Statistical Language Classification link
Spam Filtering Books Spam Filtering System using Ant Colony Optimization and Naive Bayesian link
Spam Filtering Books Improved Classifier Technique for Spam Filtering link
Web Application Firewalls Books Web Application Defenders Cookbook Battling Hackers and Protecting Users link
Web Application Firewalls Books Web Application Firewalls link
Web Application Firewalls Books Web Application Firewalls A Practical Approach link
Web Application Firewalls Books Web Application Firewalls Intrusion A Complete Guide - 2020 Edition link
Web Application Security Books Identity and Data Security for Web Development Best Practices 1st Edition link
Web Application Security Books Practical Web Penetration Testing link
Web Application Security Books The Managers Guide to Web Application Security link
Web Application Security Books The Penetration Testers Guide to Web Applications Artech House Computer Security Series link
Web Application Security Books The Web Application Hackers Handbook Finding and Exploiting Security Flaws link
Web Application Security Books The Tangled Web A Guide to Securing Modern Web Applications link
Web Application Stress Testing Books The Web Testing Handbook link
Web Application Stress Testing Books Performance Testing Microsoft NET Web Applications Developer Reference link
Web Application Stress Testing Books Automated Web Testing Step by Step Automation Guide link
WordPress Security Books Best WordPress Security Plugins The 58 Best Free WordPress Plugins For Making Your Website Hack-Proof link
WordPress Security Books WordPress Security For Webmasters 2020 link
WordPress Security Books WordPress Security for Webmaster 2017 link
WordPress Security Books WordPress Security Made Easy link
Zero Day Exploits Books Cybersecurity 101 What You Absolutely Must Know - Volume 1 link
General Cyber Security Books Security in Computing link
Incident Response Crafting the Infosec Playbook: Security Monitoring and Incident Response Master Plan link
Malware/Forensics Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious Software link
General Cyber Security Books Cyber War: The Next Threat to National Security and What to Do About It – Richard Clarke, Robert Knake link
General Cyber Security Books Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage By Gordon Corera link
General Cyber Security Books Cybersecurity and human rights in the age of cyberveillance , edited by Joanna Klesza & Roy Balleste link
General Cyber Security Books Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon link
General Cyber Security Books We Are Anonymous link
General Cyber Security Books The Cuckoo's Egg link
General Cyber Security Books Ghost in the Wires link
General Cyber Security Books Dark Territory: The Secret History of the Cyber War link
Hardware Hacking The Hardware Hacker link

About

Running list of infosec books