Books aka RTFM

RTFM, that’s like the one word you will probably read most when you start digging into security and how stuff works. So here is a list of the books I’ve read/am reading/have in my possession/use as a reference. I recommend all of them, it’s interesting stuff and it’s always good to read about the same subject in different ways. Oh and try not to laugh about some books that I bought like way back and have read.

I will update this list when I buy/read more books.

Security

  • A Bug Hunter’s Diary
  • Android Security Internals
  • Anti-Hacker Toolkit
  • Attacking Network Protocols
  • CISCO Security
  • Crackproof your software
  • Cryptography Engineering, design principles and practical applications
  • Cryptology Unlocked
  • Exploiting Software
  • Hacker Disassembling Uncovered
  • Hacking Exposed Wireless
  • Hacking The Art of Exploitation
  • Hacking The XBOX
  • IOS Application Security
  • Intel Developers’s Manuals & Reference Manual
  • Malware Analyst’s Cookbook
  • Managing Cisco Network Security
  • Microsoft Windows Internals (4th edition)
  • Penetration Testing and Network Defense
  • Practical Reverse Engineering
  • Reversing Secrets of Reverse Engineering
  • Rootkits and Bootkits
  • Rootkits, subverting the windows kernel
  • Securing Cisco ios networks
  • Serious Cryprography: A Practical Introduction to Modern Encryption
  • Silence on The Wire
  • The Android Hacker’s Handbook
  • The Art of Memory Forensics
  • The IDA Pro Book
  • The Rootkit Arsenal, escape and evasion in the dark corners of the system
  • The Book of PF (second edition)
  • The Car hacker’s Handbook
  • The Database Hacker’s Handbook
  • The Shellcoder’s Handbook
  • The web application hacker’s handbook
  • Web Hacking Attacks and Defense

Programming / Networking / Misc-technical

  • Building Scalable Cisco Internetworks
  • Core Servlets and Java Server Pages
  • Java 2 Enterprise Edition 1.4
  • Java Network Programming
  • Modern Operating Systems (Second Editions)
  • Passport CCNA
  • Perl Cookbook
  • SCJP Study Guide
  • TCP/IP Illustrated volume 1
  • The Complete Reference J2ME
  • The Complete Reference J2SE 5th Edition
  • Transact-SQL Desk Reference

Social Engineering / Physical Security

  • Ghost in the wires
  • Social Engineering the Art of Human Hacking
  • The Art of Deception
  • The Art of Intrusion
  • Unmasking the Social Engineer
  • The Art of the Con
  • Confessions of a Master Jewel Thief
  • A Burglar’s Guide to The City
  • Unauthorized Access: Physical Penetration Testing For IT Security Teams

Electronics

  • Electronics Projects for Dummies
  • Circuitbuilding Do-It-Yourself for Dummies
  • 101 Spy Gadgets for the Evil Genius

Spy / non-technical

  • Body of Secrets
  • KingPing
  • Spycraft
  • The Authorized History of MI5
  • The Puzzle Palace
  • The Secret Sentry
  • The Secrets of The FBI

Dutch

  • Assembler Programmeren
  • Aan de slag met c++ (vierde herziene druk)
  • Basiscursus java
  • Basiscursus HTML 4.01
  • Basiscursus Delphi 6
  • Basiscursus Visual Basic 4 voor windows
  • De programmeertaal C
  • Gestructureerde Computerarchitectuur
  • Het is oorlog, maar niemand die het ziet
  • Java voor studenten
  • Netwerk beveiliging voor professionals
  • PHP voor het world wide web
  • TCP/IP sockets in C

Online collection of reading materials

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.