At OpSecX, we understand the importance of security education. We believe that books are great resources that provide detailed and in-depth knowledge on a topic and serves as a great reference material. If you are into books, then we recommend the following books in various security domains. These are some of the brilliant books handpicked by OpSecX and written by exceptional authors in the security industry.
Cryptography Books
This section contains books that covers cryptography and it's application in Computer SecurityCryptography Engineering: Design Principles and Practical Applications | Applied Cryptography 2nd Edition | Serious Cryptography: A Practical Introduction to Modern Encryption | Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications |
Mobile Security Books
This section contains books that talks about Mobile Security covering Android and iOS security internals and application security.Android Hacker's Handbook | Android Security Internals: An In-Depth Guide to Android's Security Architecture | The Mobile Application Hacker's Handbook | iOS Hacker's Handbook | iOS Application Security |
Reverse Engineering & Malware Analysis
This section contains books that covers Practical Reverse Engineering, Malware analysis, Advanced Memory Forensics and the tools used.Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation | Practical Malware Analysis - The Hands-On Guide to Dissecting Malicious Software | The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux and Mac Memory | IDA Pro Book, 2nd Edition |
Exploitation Books
This section contains books that covers Fuzzing, System Internals, Windows & Linux Exploitation and Assembly Language.Fuzzing: Brute Force Vulnerability Discovery | The Shellcoders Handbook | Gray Hat Hacking The Ethical Hackers Handbook, 5th Edition | Writing Security Tools and Exploits | Windows Internals, Part 1: System architecture, processes, threads, memory management, and more (7th Edition) |
Security Engineering Books
This section contains books that covers different programming languages like Python, Go etc. and their application in Security Engineering for scripting, tool development, and security automation.Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers | Black Hat Python | Black Hat Go: Go Programming For Hackers and Pentesters | Coding for Penetration Testers: Building Better Tools |
Penetration Testing & Network Security Books
This section contains books that covers Network Security, Penetration testing and the tools used.Hacking: The Art of Exploitation 2nd Edition | Metasploit: The Penetration Tester's Guide | Advanced Penetration Testing: Hacking the World's Most Secure Networks | Kali Linux Wireless Penetration Testing: Beginner's Guide |
Red Team Field Manual | Blue Team Field Manual | Practical Packet Analysis, 3rd Edition | Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning |
Attacking Network Protocols | |||
IoT/Hardware Hacking Books
This section contains books that covers hardware and IoT Hacking.The Hardware Hacker: Adventures in Making and Breaking Hardware | Car Hacker's Handbook | Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions | Practical Internet of Things Security | Introduction to Hardware Security and Trust |
Social Engineering Books
This section contains books that covers the art of Social Engineering.The Art of Deception: Controlling the Human Element of Security | The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers | Ghost in the Wires | Social Engineering: The Art of Human Hacking |