Best Books Hacking aka The LIbrary
by BadBytes - August 22, 2018 at 10:26 PM
#1
Wink 
Textbook Collection/Library
Application Security Books

The Web Application Hackers Handbook 2nd Edition
The Web Application Hacker’s Handbook: Discovering and Exploiting Security Flaws
The Basics of Web Hacking Tools and Techniques to Attack the Web
Web Application Vulnerabilities: Detect, Exploit, Prevent
Web Security: A WhiteHat Perspective
Foundations of Security: What Every Programmer Needs to Know (Expert’s Voice)
Software Security: Building Security In
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Database Hacker’s Handbook: Defending Database Servers
Web 2.0 Security – Defending AJAX, RIA, AND SOA
Web Services Security
SQL Injection Attacks and Defense
The Browser Hackers Handbook
Web Application Obfuscation ‘-WAFs..Evasion..Filtersalert(Obfuscation)-’
Web Penetration Testing with Kali Linux
How to Attack and Defend Your Website, 1st Edition
Python Web Penetration Testing Cookbook

Networking Books

Computer Networks (5th Edition) - Andrew S. Tanenbaum
Data Communications and Computer Networks - A Business User’s Approach, 7th Edition
Essential Guide to Telecommunications
Guide to Networking Essentials, 6th Edition
Mission Critical Network Planning
Network+ Guide to Networks
Networking A Beginners Guide, 6th Edition.
Networking All-in-One Desk Reference For Dummies
Networking for Dummies, 10 Edition
The Practice of System and Network Administration
Learning OpenStack Networking (Neutron)
Linux Networking Cookbook
Understanding Linux Network Internals
Mastering Linux Network Administration
Networking Essentials A CompTIA Network+ N10-006 Textbook, 4th Edition
Learning Proxmox VE

IT Administration Books

Mastering Microsoft Lync Server 2013
Mastering Microsoft Exchange Server 2013
Mastering Windows Server 2012 R2
Windows Server 2012 Hyper-V Installation and Configuration Guide
MCSA Windows Server 2012 Complete Study Guide: Exams 70-410, 70-411, 70-412, and 70-417
Group Policy: Fundamentals, Security, and the Managed Desktop by Jeremy Moskowitz
Red Hat Enterprise Linux Server Cookbook

Computer Security and Hacking Books
(In this category, you can find eBooks related to subcategories such as computer security in general, network security, network defense, hacking in general, network hacking…)

Z4ck – Bypass Any Network Security!
Network Security Essentials: Applications and Standards (4th Edition)
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Nmap 6 Network Exploration and Security Auditing Cookbook
Nmap Network Discovery III
Mastering the Nmap Scripting Engine
Basics of Information Security, The, Second Edition - Andress, Jason
Basic Security Testing with Kali Linux
Getting Started with Windows Server Security
pfSense 2 Cookbook
Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Metasploit Pentesting Guide
Ethical Hacking and Penetration Testing Guide
Network Security, Firewalls, and VPNs
Metaspoitable 2 Unleashed Online tutorial
Penetration Tester's Open Source Toolkit
Anti-Hacker Tool Kit, 4th Edition
Conducting Network Penetration and Espionage in a Global Environment
Computer Security Handbook, 6th Edition
Cybersecurity - Managing Systems, Conducting Testing, and Investigating Intrusions
Defense against the Black Arts
Mastering Kali Linux for Advanced Penetration Testing
Dissecting the Hack - The F0rb1dd3n Network (2010)
Dissecting the Hack - The F0rb1dd3n Network, Revised Edition
Fundamentals of Information Systems Security
Hacker Techniques, Tools, and Incident Handling
Hackers - Heroes of the computer evolution, Steven Levy
Hackers Beware - Defending your Network
Hacking - Firewalls And Networks How To Hack Into Remote Computers
Hacking For Dummies, 4th Edition
Hacking The Art Of Exploitation, 2nd Edition
Hacking with Kali - Practical Penetration Testing Techniques
Information Security - The Complete Reference , 2nd Edition
Information Security Fundamentals, Second Edition - Peltier, Thomas
Instant Penetration Testing- Setting Up a Test Lab How-to
Kali Linux Cookbook
Kali Linux Social Engineering
Kali Linux CTF Blueprints
Kali Linux Network Scanning Cookbook
Learning Nessus for Penetration Testing
Network Security, Administration and Management Advancing Technologies and Practice
Network Security, Firewalls, and VPNs
Penetration Testing - A Hands-On Introduction to Hacking (2014)
Penetration Testing With The Bash Shell
Professional Penetration Testing - Creating and Operating a Formal Hacking Lab, 2nd Edition.
RTFM - Red Team Field Manual v3
Security Careers Skills, Compensation, and Career Paths, 3rd edition
Practical Hacking - Techniques and Countermeasures - M.Spivey
Practical Intrusion Analysis
Practical Packet Analysis Using Wireshark to Solve Real-World Network Problems
Network Analysis Using Wireshark Cookbook
Wireshark - Essential Skills for Network Analysis
Wireshark Network Analysis (Second Edition) Network Analyst Study Guide
Extrusion Detection: Security Monitoring for Internal Intrusions
Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan
The Tao Of Network Security Monitoring - Beyond Intrusion Detection (2004)
Applied Network Security Monitoring
The Basics of Hacking and Penetration Testing - Ethical Hacking and Penetration Testing Made Easy
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
SSL - Man In The Middle Attack
Stealing the Network - How to Own a Continent
Stealing the Network - How to Own a Shadow
Stealing the Network - How to Own the Box
TCP-IP Tutorial and Technical Overview
The Hacker Playbook, Practical Guide To Penetration Testing
The Hacker Playbook 2, Practical Guide To Penetration Testing
The Hacker's Underground Handbook.
Advances In Computers - Information Security
Advances in Security of Information and Communication Networks
Anti-Hacker Tool Kit, Third Edition
Network Security by Andre Perez
Attack and Defend Computer Security Set
BackTrack 5 Cookbook
Basics of Hacking and Penetration Testing, 2nd Edition
Build Your Own Security Lab A Field Guide for Network Testing
Building Virtual Pentesting Labs for Advanced Penetration Testing
Ninja Hacking - Unconventional Penetration Testing Tactics and Techniques
Gray Hat Hacking - The Ethical Hackers Handbook, 2nd Edition
Gray Hat Hacking - The Ethical Hackers Handbook, 3rd Edition
Gray Hat Hacking - The Ethical Hackers Handbook, 4th Edition
BackTrack 4: Assuring Security by Penetration Testing
Kali Linux: Assuring Security by Penetration Testing
Metasploit Penetration Testing Cookbook, 2nd Edition
Metasploit The Penetration Tester’s Guide
Ninja Hacking Unconventional Penetration Testing Tactic and Techniques
Stealing the Network: How to own the box
Advanced Penetration Testing for Highly-Secured Environments
Network Security Hacks, 2nd Edition
Mastering Metasploit - RAW
Maximum Security - A Hacker's Guide to Protecting Your Internet Site and Network
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder
The Antivirus Hacker's Handbook
The Car Hacker's Handbook
The Network Security Test Lab: A Step-by-Step Guide
Wireshark Network Security
OpenStack Cloud Security
Instant Kali Linux
Intermediate Security Testing with Kali Linux 2
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Network Attacks and Defenses A Hands-on Approach
Hacker's Challenge I, II, III Series
Introduction to Network Security: Theory and Practice
Nmap Essentials
Principles of Information Security
Security Sage's Guide to Hardening the Network
Malware, Rootkits & Botnets A Beginner's Guide

Wireless Network Security Books

BackTrack 5 Wireless Penetration Testing Guide
Backtrack - Testing Wireless Network Security
Kali Linux: Wireless Penetration Testing Beginner's Guide
Wireless Security - Know It All
Installing Troubleshooting and Repairing Wireless Networks
Hacking Wireless Networks For Dummies
Intrusion Detection in Wireless Ad-Hoc Networks - Chaki, Nabendu & Rituparna
802.11 Wireless Networks - The Definitive Guide, 2nd Edition
802.11 Wireless Networks Security and Analysis
Wireless Communication and Networks -2nd Edition, William Stallings
Mastering Wireless Penetration Testing for Highly-Secured Environments
Wireless Design & Development
Wireless Network Administration A Beginner's Guide
Wireless Network Hacks & Mods for Dummies
Wireless Networks and Security - Pathan, Springer
Wireless Reconnaissance in Penetration Testing
Wireless Security - Know It All
Security for Multihop Wireless Networks
Wi-Foo - The Secrets Of Wireless Hacking
WirelessNetSec by PaulDotCom
Mastering Kali Linux Wireless Pentesting

Forensics Books

Computer Forensics with FTK
Network Forensics: Tracking Hackers Through Cyberspace
Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Mastering Windows Network Forensics and Investigation, 2nd Edition
Guide to Computer Forensics and Investigations, 4th Edition
Guide to Computer Forensics and Investigations, 5th Edition
Real Digital Forensics: Computer Security and Incident Response
File System Forensic Analysis
Mastering Python Forensics
Digital Forensics - Threatscape and Best Practices
Operating System Forensics
Windows Registry Forensics, 2nd Edition
Computer Forensics InfoSec Pro Guide

Exploitation and Vulnerability Research Books

The Shellcoder’s Handbook: Discovering and Exploiting Security Holes
Reversing: Secrets of Reverse Engineering
Practical Reverse Engineering
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
Hacking: The Art of Exploitation, 2nd Edition
No Starch Press Practical Malware Analysis
Windows Malware Analysis Essentials
Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Windows Malware Analysis Essentials
Malware and Computer Security Incidents: Handling Guides
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Learning Metasploit Exploitation and Development
The Mac Hacker’s Handbook
Rootkits: Subverting the Windows Kernel
The IDA Pro Book: The Unofficial Guide to the World’s Most Popular Disassembler
Exploiting Software: How to Break Code
Advanced Windows Debugging
Buffer Overflow Attacks: Detect, Exploit, Prevent
Writing Security Tools and Exploits
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
The Art of Software Security Testing: Identifying Software Security Flaws
Fuzzing: Brute Force Vulnerability Discovery
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

Programming Books

Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Foundations of Python Network Programming Second Edition
Python Cookbook, 2nd Edition
Python Network Programming Cookbook
Python for Secret Agents
Black Hat Python: Python Programming for Hackers and Pentesters
Linux Shell Scripting Cookbook, 2nd Edition
Mastering Linux Shell Scripting  
Linux Shell Scripting Essentials

Physical/Technical Security Books

Digital Video Surveillance and Security
Intelligent Network Video; Understanding Modern Video Surveillance Systems

Cryptography Books

Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
Cryptography Engineering: Design Principles and Practical Applications
Cryptography Demystified

General Security Management

Information Security: Principles and Practices
Corporate Computer and Network Security (2nd Edition)
Security Policies and Procedures: Principles and Practices
Managing Information Security
Springer Security and Intelligent Information Systems
Access Denied The Practice and Policy of Global Internet Filtering

Seven Deadliest Attacks Books

Seven Deadliest Wireless Technologies Attacks By Brad Haines
Seven Deadliest Web Application Attacks By: Mike Shema
Seven Deadliest USB Attacks By: Brian Anderson, Barbara Anderson
Seven Deadliest Network Attacks By: Stacy Prowell, Rob Kraus
Seven Deadliest Unified Communications Attacks By: Dan York
Seven Deadliest Social Network Attacks By: Carl Timm, Richard Perez
Seven Deadliest Microsoft Attacks By: Rob Kraus, Mike Borkin

Hacking Exposed Books

Hacking Exposed Network Security Secrets and Solutions, Seventh Edition
Hacking Exposed Web Applications, Third Edition
Hacking Exposed Wireless: Wireless Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Linux: Linux Security Secrets and Solutions
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition
Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions, Second Edition
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition
Hacking Exposed Web 2.0

EC-Council Press Books

Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems by EC-Council
Ethical Hacking and Countermeasures: Attack Phases by EC-Council
Ethical Hacking and Countermeasures: Web Applications and Data Servers by EC-Council
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms by EC-Council
Ethical Hacking and Countermeasures: Secure Network Infrastructures by EC-Council
Penetration Testing: Communication Media Testing, Vol. 4 by EC-Council
Penetration Testing: Network & Perimeter Testing by EC-Council
Penetration Testing: Network Threat Testing EC-Council
Penetration Testing: Security Analysis by EC-Council
Penetration Testing: Procedures & Methodologies by EC-Council
Network Defense: Securing and Troubleshooting Network Operating Systems by EC-Council
Network Defense: Security and Vulnerability Assessment by EC-Council
Network Defense: Security Policy and Threats by EC-Council
Network Defense: Fundamentals and Protocols by EC-Council
Network Defense: Perimeter Defense Mechanisms by EC-Council
Computer Forensics: Evidence Collection and Preservation by EC-Council
Computer Forensics: Investigating Hard Disks, File & Operating Systems by EC-Council
Computer Forensics: Investigating Data and Image Files by EC-Council
Computer Forensics: Investigating Wireless Networks and Devices by EC-Council
Computer Forensics: Investigating Network Intrusions and Cyber Crime by EC-Council

Certification Books

Cisco CCNA Routing and Switching 200-120 Official Cert Guide Library
Cisco CCNA Routing and Switching ICND2 200-101 Official Cert Guide
Cisco CCNA Study Guide, 6th Edition
CCNA Security 640-554 Official Cert Guide
Cisco CCNA Wireless 640-722 Official Cert Guide
Cisco CCNP Security IPS 642-627 Official Cert Guide
Cisco CCNP Security Secure 642-637 Official Cert Guide
Cisco CCNP Security VPN 642-648 Official Cert Guide, 2nd Edition
Cisco CCNP Security FIREWALL 642-618 Official Cert Guide
CISSP All-in-One Exam Guide, 6th Edition
CompTIA A+ Authorized Exam Cram, 6th Edition (Exams 220-801 & 220-802)
CompTIA A+ Certification All-in-One Exam Guide, 8th Edition - (220-801 & 220-802)
CompTIA A+ Complete Review Guide
CompTIA A+ Complete Study Guide - (220-701 & 220-702)
CompTIA A+ Rapid Review 2013.pdf"
CompTIA A+Training Kit Exam 220-801 and Exam 220-802
CompTIA Advanced Security Practitioner
CompTIA Linux+ Study Guide 2013 - Exams LX0-101 and LX0-102, 2nd Edition
CompTIA Network+ N10-005 Authorized Cert Guide
CompTIA Network+ N10-005 Authorized Exam Cram, 4th Edition
CompTIA Network+ N10-006 Cert Guide
CompTIA Network+ Study Guide - Fourth Edition
CompTIA Network+ Study Guide
CompTIA Security+ Get Certified Get Ahead - Gibson, Darril
CompTIA Security+ Study Guide Exam SY0-301 (5th Edition)
CompTIA Security+ Study Guide SY0-401, 6th Edition
CompTIA Security+ SY0-301 Authorized Exam Cram, 3rd Edition Pearson
CompTIA Security+: Get Certified Get Ahead: SY0-201 Study Guide
CISSP All-in-One Exam Guide, Fifth Edition
Official (ISC)2 Guide to the CISSP CBK, Second Edition ((ISC)2 Press)
Mike Meyers’ CISSP® Certification Passport
CEH Certified Ethical Hacker Study Guide
CEH Certified Ethical Hacker Practice Exams, 2nd Edition
CEH v8 Certified Ethical Hacker All-in-One Exam Guide, Second Edition by Matt Walker
The Official CHFI Study Guide (Exam 312-49): for Computer Hacking Forensic Investigator
Ethical Hacking Official Guide from EC Council
Offensive Security - BackTrack to the Max Cracking the Perimeter V 1.0
Offensive Security - Basics of Backtrack
Offensive Security - Metasploit Unleashed
Offensive Security - Penetration Testing with BackTrack (Lab Guide) v3.2
Offensive Security - Wireless Attacks ( WiFu) v3.0
Official (ISC)2® Guide to SSCP CBK, Second Edition
Official (ISC)2® Guide to the CCFP CBK

(New books are yet to be released and this list will be updated when required!)

Publishers: Syngress, No Starch Press, Packt Publishing, O’reilly Media, Sybex, Wiley…
undefined
Reply
#2
this is a lot... thanks man.....
This forum account is currently banned. Ban Length: Permanent (N/A).
Ban Reason: Mass Leeching
Reply
#3
waouw, you made my day bro thank you. Now let's read
Reply
#4
noko be min. mini yaa nor
Reply
#5
thank you for your sharing
Reply
#6
This seems amazing but is the link gone?
Reply
#7
thanks for sharing!!!!
Reply
#8
thanks for sharing .............
Reply
#9
thanks for share this contetn
Reply
#10
Would you have ComptiaCysa+ cs0-002 practice exams?
Reply
#11
thanks for sharing it seems good
Reply

Possibly Related Threads…
Thread Author Replies Views Last Post
10TB OF KNOWLEDGE ! CLOUD E-BOOKS AND VIDEOS! harikesh409 317 17,502 April 09, 2021 at 07:28 AM
Last Post: p2505
👾1.75GB HACKING E-BOOKS👾 Fetisha Kazegura 81 5,071 March 31, 2021 at 12:21 PM
Last Post: bossplayers
👾Information Security and Cybersecurity Books👾 Fetisha Kazegura 25 1,313 March 24, 2021 at 06:42 PM
Last Post: cipher116

 Users browsing this thread: 1 Guest(s)