security

Good security books


Security

Information Security – Principles and Practice by Mark Stamp, 2nd Edition, 2011 (very good book!!)


Reverse engineering, assembly, exploitation, shell code

The IDA Pro Book – The Unofficial Guide to the World’s Most Popular Disassembler, 2nd Edition, 2011

Reverse Engineering for Beginners – FREE eBook

Practical Reverse Engineering – x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation, 2014

A Guide to Kernel Exploitation – Attacking the Core, 2010

Hacking – The Art of Exploitation, 2nd Edition, 2008

The Shellcoder’s Handbook – Discovering and Exploiting Security Holes, 2nd Edition, 2007

Writing Security Tools and Exploits, 2006


Cyber, Hacking, Penetration Testing
Cybersecurity – Managing Systems, Conducting Testing, and Investigating Intrusions, 2013

Penetration Testing – A Hands-On Introduction to Hacking, 2014

The Hacker Playbook 2 – Practical Guide To Penetration Testing, 2015


Web Application

The Web Application Hacker’s Handbook – Finding and Exploiting Security Flaws, 2nd Edition, 2011


Malware Analysis

Practical Malware Analysis – The Hands-On Guide to Dissecting Malicious Software, 2012

The Art of Memory Forensics – Detecting Malware and Threats in Windows, Linux, and Mac Memory, 2014

Cuckoo Malware Analysis, 2013

Advanced Malware Analysis, 2015

Malware Analyst’s Cookbook and DVD – Tools and Techniques for Fighting Malicious Code, 2010


Rootkits

The Rootkit Arsenal – Escape and Evasion in the Dark Corners of the System, 2nd Edition, 2012

Rootkits, Subverting the Windows Kernel, 2005

Managed Code Rootkits – Hooking into Runtime Environments, 2010


Forensic

EnCase Computer Forensics – The Official EnCE – EnCase Certified Examiner Study Guide, 3rd Edition, 2012


Kali Linux, Metasploit

Metasploit – The Penetration Tester’s Guide, 2011

Basic Security Testing with Kali Linux, 2014


Network

Nmap 6 Cookbook, The Fat Free Guide to Network Security Scanning, 2015

Practical Packet Analysis – Using Wireshark to Solve Real-World Network Problems, 2nd Edition, 2011

Wireshark 101 – Essential Skills for Network Analysis, 2013


Mobile

Android Malware and Analysis, 2014


Secure Coding

Secure Coding in C and C++, 2nd Edition, 2013

24 Deadly Sins of Software Security – Programming Flaws and How to Fix Them, 2009


Python

Black Hat Python – Python Programming for Hackers and Pentesters, 2014

Violent Python – A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers, 2012


Windows Internals

Windows Internals by Mark E. Russinovich, Part 1, 6th Edition

Windows Internals by Mark E. Russinovich, Part 2, 6th Edition


Native WinAPI

Undocumented Windows 2000 Secrets – The Programmers Cookbook, 2001

Windows NT-2000 Native API Reference, 2000


Cheat Sheet

RTFM – Red Team Field Manual, 2014

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s