Skip to content

This repository is about books I recommend in terms of cybersecurity.

Notifications You must be signed in to change notification settings

0xsyr0/Cybersecurity-Book-Recommendations

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

Cybersecurity Book Recommendations

This repository is about books I recommend in terms of cybersecurity.

Security Operations Center

Name URL
Blue Team Handbook: SOC, SIEM, and Threat Hunting (V1.02): A Condensed Guide for the Security Operations Team and Threat Hunter https://a.co/d/70y6LYf
Visual Threat Intelligence: An Illustrated Guide For Threat Researchers https://a.co/d/1qJZ12Q
Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage 1st ed. 2020 Edition https://a.co/d/dddsYKh
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs https://a.co/d/23Ujg9g
Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense https://a.co/d/hCFw8ok
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership 1st Edition https://a.co/d/5xTGhkX

AI / ML

Name URL
Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps https://a.co/d/gCwyYId

Penetration Testing

Name URL
The Pentester BluePrint: Starting a Career as an Ethical Hacker 1st Edition https://a.co/d/alMTpYH
Penetration Testing: A Hands-On Introduction to Hacking https://a.co/d/1g7jeo7
Writing an Effective Penetration Testing Report: An Executive View https://a.co/d/9iTBim5
WEB HACKING 101: Books for White Hat Hackers https://a.co/d/dDxurJo
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2nd Edition https://a.co/d/3g1Q9gh
Hacking APIs: Breaking Web Application Programming Interfaces https://a.co/d/jf2SrJL
Black Hat GraphQL: Attacking Next Generation APIs https://a.co/d/ceCuepg
Internal Security Assessment: Field Guide: Successful Techniques To Hack Your Way To Admin https://a.co/d/ghRyNfe
Network Security Assessment: Know Your Network 3rd Edition https://a.co/d/52OhGW2
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation 1st Edition https://a.co/d/40tfWju
Hash Crack: Password Cracking Manual https://a.co/d/iomzCnO

Red Teaming

Name URL
Rtfm: Red Team Field Manual https://a.co/d/8Tdj2l0
RTFM: Red Team Field Manual v2 https://a.co/d/i1SlxxR
Red Team Development and Operations: A practical guide https://a.co/d/dETyEaw
Cybersecurity Attacks – Red Team Strategies: A practical guide to building a penetration testing program having homefield advantage 1st https://a.co/d/99yuqFR
Hands-On Red Team Tactics https://a.co/d/7JRlZkh
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity 1st Edition https://a.co/d/bRkN9Su

Blue Teaming

Name URL
Blue Team Field Manual (BTFM) (RTFM) https://a.co/d/hCgSn1b
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder. https://a.co/d/c5hPna7
Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities https://a.co/d/6tU89bC
Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs https://a.co/d/3pwGljB
Malware Data Science: Attack Detection and Attribution https://a.co/d/2JvwJfy
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software 1st Edition https://a.co/d/13D6kwo
Cybersecurity Analyst: Strategies and Techniques for a Safer Digital Future https://a.co/d/hArFfF6
Defensive Security Handbook: Best Practices for Securing Infrastructure 1st Edition https://a.co/d/5R8KyeK
Zero Trust Networks: Building Secure Systems in Untrusted Networks https://a.co/d/7L0JYws
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity 1st Edition https://a.co/d/iUoCbXE

Purple Teaming

Name URL
PTFM: Purple Team Field Manual https://a.co/d/h9PwUbw
Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming https://a.co/d/9Ji4O5W
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition 6th https://a.co/d/eS9EzMG

Bug Bounty

Name URL
Bug Bounty Collection: More than $$$$$ USD in rewards by legally hacking big companies https://a.co/d/61zRglt

Development

Name URL
Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software https://a.co/d/fKw9DWk
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems. https://a.co/d/4soq09J
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity https://a.co/d/dLrxPrf
Black Hat Bash: Creative Scripting for Hackers and Pentesters https://a.co/d/6T3Tzm5
Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters 2nd Edition https://a.co/d/3yq06Nn
Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools https://a.co/d/i5FBwdi
Black Hat Go: Go Programming For Hackers and Pentesters https://a.co/d/4ugktSV

Cybersecurity in General

Name URL
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity (Rheinwerk Computing) First Edition https://a.co/d/3l8xiH7
Hacking: The Art of Exploitation, 2nd Edition https://a.co/d/8IMywXk
VX Underground Black Mass: Volume 1 https://a.co/d/3r2yJ1i
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers https://a.co/d/8bXmGs8
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency https://a.co/d/hm3oT41
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World https://a.co/d/gmaicVl
Hacking Capitalism: Modeling, Humans, Computers, and Money. https://a.co/d/gU3wP1E
The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime https://a.co/d/1RqdH8L
CYBERSECURITY DICTIONARY for Everyone: 1250 Terms Explained in Simple English https://a.co/d/9drkN08
PoC or GTFO https://a.co/d/5rtxras
PoC or GTFO, Volume 2 https://a.co/d/6RU0vop
PoC or GTFO, Volume 3 https://a.co/d/2uHTRoz
xchg rax,rax https://a.co/d/hzmEzw8
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World 1st Edition https://a.co/d/hGCTCPy

About

This repository is about books I recommend in terms of cybersecurity.

Topics

Resources

Stars

Watchers

Forks