Books

RTFM, that’s like the one word you will probably read most when you start digging into security and how stuff works. So here is a list of the books I’ve read/am reading/have in my possession/use as a reference. I recommend all of them, it’s interesting stuff and it’s always good to read about the same subject in different ways. Oh and try not to laugh about some books that I bought like way back and have read.

I will update this list when I buy/read more books.

Security

  • A Bug Hunter’s Diary
  • Android Security Internals
  • Anti-Hacker Toolkit
  • Attacking Network Protocols
  • CISCO Security
  • Crackproof your software
  • Cryptography Engineering, design principles and practical applications
  • Cryptology Unlocked
  • Exploiting Software
  • Hacker Disassembling Uncovered
  • Hacking Exposed Wireless
  • Hacking The Art of Exploitation
  • Hacking The XBOX
  • IOS Application Security
  • Intel Developers’s Manuals & Reference Manual
  • Malware Analyst’s Cookbook
  • Managing Cisco Network Security
  • Microsoft Windows Internals (4th edition)
  • Penetration Testing and Network Defense
  • Practical Reverse Engineering
  • Red Team development and operations
  • Reversing Secrets of Reverse Engineering
  • Rootkits and Bootkits
  • Rootkits, subverting the windows kernel
  • Securing Cisco ios networks
  • Serious Cryprography: A Practical Introduction to Modern Encryption
  • Silence on The Wire
  • The Android Hacker’s Handbook
  • The Art of Memory Forensics
  • The IDA Pro Book
  • The Rootkit Arsenal, escape and evasion in the dark corners of the system
  • The Book of PF (second edition)
  • The Car hacker’s Handbook
  • The Database Hacker’s Handbook
  • The Shellcoder’s Handbook
  • The web application hacker’s handbook
  • Web Hacking Attacks and Defense
  • The Art of Software Security Assessment

Programming / Networking / Misc-technical

  • Building Scalable Cisco Internetworks
  • Core Servlets and Java Server Pages
  • Debugging The 9 indispensable rules for finding even the most elusive software and hardware problems
  • Java 2 Enterprise Edition 1.4
  • Java Network Programming
  • Modern Operating Systems (Second Editions)
  • Passport CCNA
  • Perl Cookbook
  • SCJP Study Guide
  • TCP/IP Illustrated volume 1
  • The Complete Reference J2ME
  • The Complete Reference J2SE 5th Edition
  • Transact-SQL Desk Reference
  • The pragmatic programmer

Social Engineering / Physical Security

  • Ghost in the wires
  • Social Engineering the Art of Human Hacking
  • The Art of Deception
  • The Art of Intrusion
  • Unmasking the Social Engineer
  • The Art of the Con: The Most Notorious Fakes, Frauds, and Forgeries in the Art World
  • Confessions of a Master Jewel Thief
  • A Burglar’s Guide to The City
  • Unauthorized Access: Physical Penetration Testing For IT Security Teams
  • The Art of the Con: How to Think Like a Real Hustler and Avoid Being Scammed
  • Codes of the underworld: How criminals communicate
  • Practical Doomsday
  • Spy the lie: Former CIA Officers Teach You How to Detect Deception

Electronics

  • Electronics Projects for Dummies
  • Circuitbuilding Do-It-Yourself for Dummies
  • 101 Spy Gadgets for the Evil Genius

Spy / non-technical

  • Body of Secrets
  • KingPing
  • Spycraft
  • The Authorized History of MI5
  • The Puzzle Palace
  • The Secret Sentry
  • The Secrets of The FBI
  • The cuckoo’s egg
  • The billion dollar spy
  • Sandworm
  • To catch a spy: The art of counterintelligence
  • The master of disguise: my secret life in the CIA
  • Rise and Kill First: The Secret History of Israel’s Targeted Assassinations

Management & misc

  • How to Measure Anything in Cybersecurity Risk
  • An Elegant Puzzle: Systems of Engineering Management
  • Red Team how to succeed by thinking like the enemy
  • Skunk Works: A personal memoir of my years of Lockheed
  • Never split the difference
  • The subtle art of not giving a f*ck
  • Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future
  • Yvon Chouinard let my people go surfing
  • It’s the way you say it
  • Atomic Habits

Dutch

  • Assembler Programmeren
  • Aan de slag met c++ (vierde herziene druk)
  • Basiscursus java
  • Basiscursus HTML 4.01
  • Basiscursus Delphi 6
  • Basiscursus Visual Basic 4 voor windows
  • De programmeertaal C
  • Gestructureerde Computerarchitectuur
  • Het is oorlog, maar niemand die het ziet
  • Java voor studenten
  • Netwerk beveiliging voor professionals
  • PHP voor het world wide web
  • TCP/IP sockets in C

Online collection of reading materials

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: