Skip to content

Security

73 books

Must-Read 2012

Antifragile

Nassim Nicholas Taleb

Must-Read 1994

Applied Cryptography

Bruce Schneier

Must-Read 1998

Body of Secrets

James Bamford

Must-Read 2014

Countdown to Zero Day

Kim Zetter

Must-Read 2010

Cyber War

Richard A. Clarke and Robert K. Knake

Must-Read 1737

Cyber War Will Not Take Place

Thomas Rid

Must-Read 2016

Dark Territory

Fred Kaplan

Must-Read 2015

Data and Goliath

Bruce Schneier

Must-Read 1994

Diplomacy

Henry Kissinger

Must-Read 2011

Ghost in the Wires

Kevin Mitnick

Must-Read 2015

Governing the Commons

Elinor Ostrom

Must-Read 1996

Handbook of Applied Cryptography

Menezes, van Oorschot, Vanstone

Must-Read 2003

Intelligence in War

John Keegan

Must-Read 2007

Legacy of Ashes

Tim Weiner

Must-Read 2012

Liars and Outliers

Bruce Schneier

Must-Read 2010

Privacy on the Line

Whitfield Diffie and Susan Landau

Must-Read 2016

Rise of the Machines

Thomas Rid

Must-Read 2019

Sandworm

Andy Greenberg

Must-Read 2000

Secrets and Lies

Bruce Schneier

Must-Read 2001

Security Engineering

Ross Anderson

Must-Read 1995

Silicon Snake Oil

Cliff Stoll

Must-Read 2001

Software Security

McGraw

Must-Read 2009

Spycraft

Robert Wallace & Keith Melton

Must-Read 1960

Strategy of Conflict

Thomas Schelling

Must-Read 2018

The Age of Surveillance Capitalism

Shoshana Zuboff

Must-Read 2011

The Art of Deception

Kevin D. Mitnick and William L. Simon

Must-Read 2012

The Art of Intelligence

Henry Crumpton

Must-Read 2009

The Art of Intrusion

Kevin D. Mitnick and William L. Simon

Must-Read 2017

The Art of Invisibility

Kevin Mitnick

Must-Read 1967

The Codebreakers

David Kahn

Must-Read 1963

The Craft of Intelligence

Allen Dulles

Must-Read 1989

The Cuckoo's Egg

Cliff Stoll

Must-Read 2019

The Fifth Domain

Richard A. Clarke and Robert K. Knake

Must-Read 2020

The Hacker and the State

Ben Buchanan

Must-Read 1992

The Hacker Crackdown

Bruce Sterling

Must-Read 2022

The New Fire

Ben Buchanan

Must-Read 2013

The Practice of Network Security Monitoring

Richard Bejtlich

Must-Read 1515

The Prince

Niccolò Machiavelli

Must-Read 2016

The Protection of Information in Computer Systems

Saltzer and Schroeder

Must-Read 1982

The Puzzle Palace

James Bamford

Must-Read 2008

The Shadow Factory

James Bamford

Must-Read 2004

The Tao of Network Security Monitoring

Richard Bejtlich

Must-Read 2001

The Tragedy of Great Power Politics

John Mearsheimer

Must-Read 2021

This Is How They Tell Me the World Ends

Nicole Perlroth

Must-Read 2012

This Machine Kills Secrets

Andy Greenberg

Must-Read 2014

Threat Modeling

Adam Shostack

Must-Read 2002

Writing Secure Code

Michael Howard and David LeBlanc

Recommended 2014

Applied Network Security Monitoring

Chris Sanders

Recommended 2006

Counter Hack Reloaded

Skoudis and Liston

Recommended 2002

Cryptography and Network Security

William Stallings

📖
Recommended 2004

Exploiting Software

Hoglund and McGraw

Recommended 2015

Firewalls and Internet Security

Steve Bellovin

Recommended 2016

Game Hacking

Nick Cano

Recommended 2018

Hacking: The Art of Exploitation, 2nd Edition

J. Erickson

Recommended 2022

If It's Smart, It's Vulnerable

Mikko Hypponen

Recommended 2019

Information Security Economics and Beyond

Anderson and Moore

Recommended 2004

Network Security Bible

Eric Cole

Recommended 2002

Network Security: Private Communication in a Public World

Charlie Kaufman, Radia Perlman, Mike Speciner

📖
Recommended 2014

OWASP Testing Guide

OWASP Foundation

Recommended 2003

Practical Cryptography

Niels Ferguson and Bruce Schneier

Recommended 2003

Practical UNIX and Internet Security

Gene Spafford et al.

Recommended 2010

Skating on Stilts

Stewart Baker

Recommended 2017

SSL And The Future Of Authenticity

Moxie Marlinspike

Recommended 2016

The Car Hacker's Handbook

Craig Smith

Recommended 2021

The Hardware Hacking Handbook

Jasper van Woudenberg et al.

Recommended 2015

Thinking Security

Steve Bellovin

Recommended 2008

Why Information Security Is Hard

Ross J. Anderson

Recommended 2012

Windows Internals

Mark Russinovich

Supplementary 2014

Advanced Persistent Threat Hacking

Wrightson

Supplementary 2015

How to Become a Hacker

Eric S. Raymond

Supplementary 2016

The Basics of Cyber Safety

Sammons

Supplementary 2017

The Real Internet of Things

Daniel Miessler

Supplementary 2021

Web Security Essentials

Katie Paxton-Fear