Android Security Books |
Hacking Android |
link |
Android Security Books |
Android Security Internals An In-Depth Guide to Androids Security Architecture |
link |
Android Security Books |
Android Hackers Handbook |
link |
Android Security Books |
Android Security Cookbook |
link |
Android Security Books |
Bulletproof Android Practical Advice for Building Secure Apps Developers Library 1st Edition |
link |
Antivirus Engine Construction Books |
Antivirus software Complete Self-Assessment |
link |
Antivirus Evasion Books |
The Antivirus Hackers Handbook |
link |
Automated Network Security Scanning Books |
Network Scanning Cookbook |
link |
Automated Network Security Scanning Books |
Practical Network Scanning Capture network vulnerabilities using standard tools such as Nmap and Nessus |
link |
Automated Network Security Scanning Books |
Nmap 7 Simple Guide on Network Scanning |
link |
Automated Web Application Scanning Books |
Practical Security Automation and Testing Tools and techniques for automated security scanning and testing in DevSecOps |
link |
Bot and Web Automation Detection Books |
Fraud and Fraud Detection Website A Data Analytics Approach |
link |
Browser HackingSecurity Books |
The Browser Hackers Handbook |
link |
Browser HackingSecurity Books |
Hacking Exposed Web Applications |
link |
Browser HackingSecurity Books |
Hacking Tor The Complete Beginners Guide To Hacking Tor Accessing The Deep Web Dark Web |
link |
Browser HackingSecurity Books |
The Web Application Hackers Handbook Finding and Exploiting Security Flaws1 |
link |
Browser HackingSecurity Books |
Tor Browser Secrets of the Deep Web How to Stay Anonymous Online and Surf the Web Like a Hacker |
link |
Browser HackingSecurity Books |
Hacking Web Apps Detecting and Preventing Web Application Security Problems |
link |
Bug Hunting Books |
Real-World Bug Hunting A Field Guide to Web Hacking |
link |
Bug Hunting Books |
Bug Bounty Hunting Essentials Quick-paced guide to help white-hat hackers get through bug bounty programs |
link |
Bug Hunting Books |
A Bug Hunters Diary A Guided Tour Through the Wilds of Software Security |
link |
Bug Hunting Books |
Hands-On Bug Hunting for Penetration Testers A practical guide to help ethical hackers discover web application security flaws |
link |
Bug Hunting Books |
Bug Bounty Hunting for Web Security Find and Exploit Vulnerabilities in Websites and Applications |
link |
Data Protection Books |
Privacy and Data Protection Law University Casebook Series |
link |
Data Protection Books |
Data Protection |
link |
Data Protection Books |
Data Protection Governance Risk Management and Compliance |
link |
Data Protection Books |
The Data Protection Officer Profession Rules and Role |
link |
Data Protection Books |
Data Protection and Privacy The Internet of Bodies Computers Privacy and Data Protection |
link |
Drupal Security Books |
Drupal Security Best Practices A Practical Guide |
link |
Email/Machine learning Books |
Machine Learning for Email Spam Filtering and Priority Inbox |
link |
Email/Machine learning Books |
Machine Learning for Hackers Case Studies and Algorithms to Get You Started |
link |
Email/Machine learning Books |
Machine Learning The Definitive Guide |
link |
Exploit Development Books |
Penetration Testing with Shellcode Detect exploit and secure network-level and operating system vulnerabilities |
link |
Exploit Development Books |
Hacking The Art of Exploitation 2nd Edition |
link |
Exploit Development Books |
Deep Dive The Development of an Exploit Win32 |
link |
Exploit Development Books |
The Shellcoders Handbook Discovering and Exploiting Security Holes |
link |
General Cyber Security Books |
The Art of Intrusion The Real Stories Behind the Exploits of Hackers Intruders and Deceivers |
link |
Intrusion Detection Systems Books |
Engineering Trustworthy Systems Get Cybersecurity Design Right the First Time |
link |
Intrusion Detection Systems Books |
Network Intrusion Detection using Deep Learning A Feature Learning Approach |
link |
Intrusion Detection Systems Books |
The 2020-2025 World Outlook for Intrusion Detection Systems IDS |
link |
iOS Security Books |
The Mobile Application Hackers Handbook |
link |
iOS Security Books |
iOS Application Security The Definitive Guide for Hackers and Developers |
link |
iOS Security Books |
Ios Security Protect Your Iphone Ipad and Apple Watch |
link |
iOS Security Books |
iOS Penetration Testing A Definitive Guide to iOS Security |
link |
IOT Security Books |
The IoT Hackers Handbook A Practical Guide to Hacking the Internet of Things |
link |
IOT Security Books |
Internet of Things Security Fundamentals Techniques and Applications |
link |
IOT Security Books |
Practical Industrial Internet of Things Security A Practitioners Guide to Securing Connected Industries |
link |
IOT Security Books |
Practical Internet of Things Security Design a Security Framework for an Internet Connected Ecosystem 2nd Edition |
link |
IOT Security Books |
Security and Privacy in Internet of Things IoTs Models Algorithms and Implementations |
link |
IOT Security Books |
Security Privacy and Trust in the IoT Environment |
link |
Joomla Security Books |
Joomla Web Security |
link |
Large scale Software Engineering Books |
Software Engineering for Large-Scale Multi-Agent Systems Research Issues and Practical Applications Lecture Notes in Computer Science |
link |
Large scale Software Engineering Books |
Software Architects Handbook Become a successful software architect by implementing effective architecture concepts |
link |
Network Security Books |
Computer Internet Security A Hands-on Approach |
link |
Network Security Books |
Network Security Essentials Applications and Standards 6th Edition |
link |
Network Security Books |
The Network Security Test Lab A Step-by-Step Guide |
link |
Network Security Books |
CompTIA Security Guide to Network Security Fundamentals |
link |
Network Security Books |
Hands-On Network Forensics Investigate network attacks and find evidence using common network forensic tools |
link |
Network Security Books |
Network Forensics Tracking Hackers through Cyberspace |
link |
Network Target Enumeration Books |
Network Security Assessment Know Your Network |
link |
Network Target Enumeration Books |
Nmap Network Scanning The Official Nmap Project Guide to Network Discovery and Security Scanning |
link |
Open Source Intelligence Gathering Books |
Open Source Intelligence Techniques Resources for Searching and Analyzing Online Information 6th Edition |
link |
Open Source Intelligence Gathering Books |
Open Source Intelligence Methods and Tools A Practical Guide to Online Intelligence |
link |
Open Source Intelligence Gathering Books |
Down the Rabbit Hole An OSINT Journey Open Source Intelligence Gathering for Penetration Testing |
link |
Open Source Intelligence Gathering Books |
The Tao of Open Source Intelligence |
link |
Open Source Intelligence Gathering Books |
Automating Open Source Intelligence Algorithms for OSINT |
link |
Open Source Intelligence Gathering Books |
Open Source Intelligence Investigation From Strategy to Implementation Advanced Sciences and Technologies for Security Applications |
link |
Open Source Intelligence Gathering Books |
Fuzzing Brute Force Vulnerability Discovery |
link |
Pentesting Books |
Red Team Field Manual V3 |
link |
Pentesting Books |
Hacker Playbook 2 |
link |
Pentesting Books |
Hacker Playbook 3 |
link |
Phishing Books |
Phishing Attacks Advanced Attack Techniques |
link |
Phishing Books |
Phishing Detection Analysis And Prevention |
link |
Python for Pentesters Books |
Violent Python - A Cookbook for Hackers Forensic Analysts Penetration Testers and Security Engineers |
link |
Python for Pentesters Books |
Black Hat Python |
link |
Python for Pentesters Books |
Gray Hat Python |
link |
Risk Management Books |
How to Measure Anything in Cybersecurity Risk |
link |
Risk Management Books |
Managing Cybersecurity Risk Cases Studies and Solutions |
link |
Risk Management Books |
Cyber Risk Management Prioritize Threats Identify Vulnerabilities and Apply Controls |
link |
Risk Management Books |
Managing Cybersecurity Risk How Directors and Corporate Officers Can Protect Their Businesses |
link |
Risk Management Books |
The Cyber Risk Handbook Creating and Measuring Effective Cybersecurity Capabilities |
link |
Secure Development Books |
Secure and Resilient Software Development |
link |
Secure Development Books |
Secure Development for Mobile Apps How to Design and Code Secure Mobile Applications with PHP and JavaScript |
link |
Secure Development Books |
Secure Software Development A Security Programmers Guide |
link |
Secure Development Books |
Secure Software Development A Complete Guide - 2020 Edition |
link |
Security Oriented C Development Books |
Programming NET Security Writing Secure Applications Using C or Visual Basic NET |
link |
Security Oriented C Development Books |
The Modern C Challenge Become an expert C programmer by solving interesting programming problems |
link |
Security Oriented Python Development Books |
Python Cyber Security and Python Programming Step-by-Step Guides |
link |
Security Oriented Python Development Books |
Mastering Python for Networking and Security |
link |
Security Oriented Python Development Books |
Secure Programming with Python |
link |
Security Oriented Python Development Books |
Violent Python A Cookbook for Hackers Forensic Analysts Penetration Testers and Security Engineers |
link |
Small Scale Software Engineering Books |
Beginning Software Engineering |
link |
Software Fuzzing Books |
Fuzzing for Software Security Testing and Quality Assurance |
link |
Spam Filtering Books |
Ending Spam Bayesian Content Filtering and the Art of Statistical Language Classification |
link |
Spam Filtering Books |
Spam Filtering System using Ant Colony Optimization and Naive Bayesian |
link |
Spam Filtering Books |
Improved Classifier Technique for Spam Filtering |
link |
Web Application Firewalls Books |
Web Application Defenders Cookbook Battling Hackers and Protecting Users |
link |
Web Application Firewalls Books |
Web Application Firewalls |
link |
Web Application Firewalls Books |
Web Application Firewalls A Practical Approach |
link |
Web Application Firewalls Books |
Web Application Firewalls Intrusion A Complete Guide - 2020 Edition |
link |
Web Application Security Books |
Identity and Data Security for Web Development Best Practices 1st Edition |
link |
Web Application Security Books |
Practical Web Penetration Testing |
link |
Web Application Security Books |
The Managers Guide to Web Application Security |
link |
Web Application Security Books |
The Penetration Testers Guide to Web Applications Artech House Computer Security Series |
link |
Web Application Security Books |
The Web Application Hackers Handbook Finding and Exploiting Security Flaws |
link |
Web Application Security Books |
The Tangled Web A Guide to Securing Modern Web Applications |
link |
Web Application Stress Testing Books |
The Web Testing Handbook |
link |
Web Application Stress Testing Books |
Performance Testing Microsoft NET Web Applications Developer Reference |
link |
Web Application Stress Testing Books |
Automated Web Testing Step by Step Automation Guide |
link |
WordPress Security Books |
Best WordPress Security Plugins The 58 Best Free WordPress Plugins For Making Your Website Hack-Proof |
link |
WordPress Security Books |
WordPress Security For Webmasters 2020 |
link |
WordPress Security Books |
WordPress Security for Webmaster 2017 |
link |
WordPress Security Books |
WordPress Security Made Easy |
link |
Zero Day Exploits Books |
Cybersecurity 101 What You Absolutely Must Know - Volume 1 |
link |
General Cyber Security Books |
Security in Computing |
link |
Incident Response |
Crafting the Infosec Playbook: Security Monitoring and Incident Response Master Plan |
link |
Malware/Forensics |
Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious Software |
link |
General Cyber Security Books |
Cyber War: The Next Threat to National Security and What to Do About It – Richard Clarke, Robert Knake |
link |
General Cyber Security Books |
Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage By Gordon Corera |
link |
General Cyber Security Books |
Cybersecurity and human rights in the age of cyberveillance , edited by Joanna Klesza & Roy Balleste |
link |
General Cyber Security Books |
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon |
link |
General Cyber Security Books |
We Are Anonymous |
link |
General Cyber Security Books |
The Cuckoo's Egg |
link |
General Cyber Security Books |
Ghost in the Wires |
link |
General Cyber Security Books |
Dark Territory: The Secret History of the Cyber War |
link |
Hardware Hacking |
The Hardware Hacker |
link |