Books: Difference between revisions

From SecurityTools
Add a few new books, provide synopsis for existing and new books, update links as appropriate.
Added more books, branched out from just Amazon listings.
Line 2: Line 2:


=== A ===
=== A ===
[https://nostarch.com/bughunter A Bug Hunter's Diary] - No longer from the publisher as a print book, this e-book is a guide to finding and testing bugs in the applications we all run and the security implications of those bugs


=== B ===
=== B ===
Line 15: Line 16:


=== F ===
=== F ===
[https://www.amazon.com/exec/obidos/ASIN/0321268172/ File System Forensic Analysis] - An in-depth guide to the specifics of file systems and low-level forensic analysis
[https://link.springer.com/book/10.1007/978-1-4842-6189-7 Firewalls Don't Stop Dragons] - A step-by-step guide to computer security and privacy for non-techies


=== G ===
=== G ===
[https://nostarch.com/GhidraBook The Ghidra Book] - A comprehensive guide to the NSA's reverse-engineering tool


=== H ===
=== H ===
[https://www.amazon.com/Hacker-Playbook-3-Book/dp/B0883B694R/ The Hacker Playbook (3 book collection)] - A step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.
[https://www.amazon.com/Hacker-Playbook-3-Book/dp/B0883B694R/ The Hacker Playbook (3 book collection)] - A step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.
[https://nostarch.com/cybersecurityreallyworks How Cybersecurity Really Works] - A beginner's guide to the basics of security without being too technical


=== I ===
=== I ===
Line 30: Line 37:


=== M ===
=== M ===
[https://www.amazon.com/Metasploit-Penetration-Testers-David-Kennedy/dp/159327288X/ Metasploit: The Penetration Tester's Guide] - The authoritative guide to the [[Metasploit|Metasploit Framework]]
[https://www.amazon.com/Metasploit-Penetration-Testers-David-Kennedy/dp/159327288X/ Metasploit: The Penetration Tester's Guide] - The authoritative guide to the [[Metasploit|Metasploit Framework]] (also [https://nostarch.com/metasploit available directly from the publisher])


=== N ===
=== N ===
Line 38: Line 45:


=== P ===
=== P ===
[https://www.amazon.com/Penetration-Testing-Hands-Introduction-Hacking/dp/1593275641/ Penetration Testing: A Hand-On Introduction to Hacking] - An introduction to the core skills and techniques that every pentester needs
[https://www.amazon.com/Penetration-Testing-Hands-Introduction-Hacking/dp/1593275641/ Penetration Testing: A Hand-On Introduction to Hacking] - An introduction to the core skills and techniques that every pentester needs (also [https://nostarch.com/pentesting available directly from the publisher])


[https://www.amazon.com/Practical-Packet-Analysis-Wireshark-Real-World/dp/1593278020/ Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems] - A guide to making sense of [[Wireshark]] packet captures,  IPv6 and SMTP, plus help on the powerful command line packet analyzers [[tcpdump]] and TShark
[https://www.amazon.com/Practical-Packet-Analysis-Wireshark-Real-World/dp/1593278020/ Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems] - A guide to making sense of [[Wireshark]] packet captures,  IPv6 and SMTP, plus help on the powerful command line packet analyzers [[tcpdump]] and TShark
[https://nostarch.com/nsm The Practice of Network Security Monitoring] - A detailed manual on what to watch for to help you detect and defend against intrusions on your network


[https://www.amazon.com/PTFM-Purple-Team-Field-Manual/dp/B08LJV1QCD/ Purple Team Field Manual (PTFM)] - The purple team field manual is a manual for all security professionals and integrates red and blue team methodologies.
[https://www.amazon.com/PTFM-Purple-Team-Field-Manual/dp/B08LJV1QCD/ Purple Team Field Manual (PTFM)] - The purple team field manual is a manual for all security professionals and integrates red and blue team methodologies.
Line 47: Line 56:


=== R ===
=== R ===
[https://nostarch.com/bughunting Real-World Bug Hunting] - A hands-on guide to discovering and misusing software bugs
[https://www.amazon.com/Rtfm-Red-Team-Field-Manual/dp/1494295504/ Red Team Field Manual (RTFM)] - A thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page
[https://www.amazon.com/Rtfm-Red-Team-Field-Manual/dp/1494295504/ Red Team Field Manual (RTFM)] - A thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page



Revision as of 05:08, 27 October 2021

A non-exhaustive list of books covering a broad range of subjects which will interest security learners and practitioners.

A

A Bug Hunter's Diary - No longer from the publisher as a print book, this e-book is a guide to finding and testing bugs in the applications we all run and the security implications of those bugs

B

Blue Team Field Manual (BTFM) - A Cybersecurity Incident Response Guide that aligns with the NIST Cybersecurity Framework

C

The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss, plus a purchasable lab guide and hands-on interactive lab for practicing what you learn.

D

E

Ethical Hacking with Hack the Box - An online-book guide to getting started with ethical hacking

F

File System Forensic Analysis - An in-depth guide to the specifics of file systems and low-level forensic analysis

Firewalls Don't Stop Dragons - A step-by-step guide to computer security and privacy for non-techies

G

The Ghidra Book - A comprehensive guide to the NSA's reverse-engineering tool

H

The Hacker Playbook (3 book collection) - A step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

How Cybersecurity Really Works - A beginner's guide to the basics of security without being too technical

I

J

K

L

M

Metasploit: The Penetration Tester's Guide - The authoritative guide to the Metasploit Framework (also available directly from the publisher)

N

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning - The definitive guide to nmap, but the tool's author, Fyoder

O

P

Penetration Testing: A Hand-On Introduction to Hacking - An introduction to the core skills and techniques that every pentester needs (also available directly from the publisher)

Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems - A guide to making sense of Wireshark packet captures, IPv6 and SMTP, plus help on the powerful command line packet analyzers tcpdump and TShark

The Practice of Network Security Monitoring - A detailed manual on what to watch for to help you detect and defend against intrusions on your network

Purple Team Field Manual (PTFM) - The purple team field manual is a manual for all security professionals and integrates red and blue team methodologies.

Q

R

Real-World Bug Hunting - A hands-on guide to discovering and misusing software bugs

Red Team Field Manual (RTFM) - A thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page

S

T

U

V

W

Wireshark 101: Essential Skills for Network Analysis - 2nd Edition - Step-by-step instructions on the key functions and features of Wireshark

X

Y

Z