Security Books

At OpSecX, we understand the importance of security education. We believe that books are great resources that provide detailed and in-depth knowledge on a topic and serves as a great reference material. If you are into books, then we recommend the following books in various security domains. These are some of the brilliant books handpicked by OpSecX and written by exceptional authors in the security industry.

Web Security Books

This section contains books that covers web security, database security and browser security.
The Tangled Web - A Guide to Securing Modern Web Applications The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2nd EditionThe Browser Hacker's Handbook A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software SecurityThe Database Hacker's Handbook


Cryptography Books

This section contains books that covers cryptography and it's application in Computer Security
Cryptography Engineering: Design Principles and Practical ApplicationsApplied Cryptography 2nd EditionSerious Cryptography: A Practical Introduction to Modern EncryptionBulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications


Mobile Security Books

This section contains books that talks about Mobile Security covering Android and iOS security internals and application security.
Android Hacker's HandbookAndroid Security Internals: An In-Depth Guide to Android's Security ArchitectureThe Mobile Application Hacker's HandbookiOS Hacker's Handbook iOS Application Security


Reverse Engineering & Malware Analysis

This section contains books that covers Practical Reverse Engineering, Malware analysis, Advanced Memory Forensics and the tools used.
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation Practical Malware Analysis - The Hands-On Guide to Dissecting Malicious SoftwareThe Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux and Mac MemoryIDA Pro Book, 2nd Edition


Exploitation Books

This section contains books that covers Fuzzing, System Internals, Windows & Linux Exploitation and Assembly Language.
Fuzzing: Brute Force Vulnerability DiscoveryThe Shellcoders Handbook Gray Hat Hacking The Ethical Hackers Handbook, 5th EditionWriting Security Tools and Exploits Windows Internals, Part 1: System architecture, processes, threads, memory management, and more (7th Edition)


Security Engineering Books

This section contains books that covers different programming languages like Python, Go etc. and their application in Security Engineering for scripting, tool development, and security automation.
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security EngineersBlack Hat PythonBlack Hat Go: Go Programming For Hackers and PentestersCoding for Penetration Testers: Building Better Tools


Penetration Testing & Network Security Books

This section contains books that covers Network Security, Penetration testing and the tools used.
Hacking: The Art of Exploitation 2nd EditionMetasploit: The Penetration Tester's GuideAdvanced Penetration Testing: Hacking the World's Most Secure NetworksKali Linux Wireless Penetration Testing: Beginner's Guide

Red Team Field ManualBlue Team Field ManualPractical Packet Analysis, 3rd EditionNmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning


IoT/Hardware Hacking Books

This section contains books that covers hardware and IoT Hacking.
The Hardware Hacker: Adventures in Making and Breaking Hardware Car Hacker's HandbookHacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & SolutionsPractical Internet of Things SecurityIntroduction to Hardware Security and Trust


Social Engineering Books

This section contains books that covers the art of Social Engineering.
The Art of Deception: Controlling the Human Element of Security The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and DeceiversGhost in the WiresSocial Engineering: The Art of Human Hacking


Miscellaneous Security Books

This section contains books that covers miscellaneous security and other security domains.
PoC or GTFO Machine Learning and Security: Protecting Systems with Data and AlgorithmsSilence on the Wire – A Field Guide to Passive Reconnaissance and Indirect Attacks