Hacker Bookshelf

This is a collection of books I have found to be useful, or which are on my to-read list. I did not write/publish/etc of any of them. If you find links that are broken, or think something should be added, feel free to
let me know.

Cryptography Databases Exploiting Forensics Hacking Industrial / SCADA Machine Learning / AI Malware Mobile Networking OS: Generic OS: Linux OS: Mac OS: Windows Physical Security / Lockpicking Programming Reverse Engineering Secure Code Review Social Engineering / Organisations Web Legacy Future Releases


Cryptography

Serious Cryptography

A Practical Introduction to Modern Encryption

Released: 2018

Bulletproof SSL and TLS

Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

Released: 2015

Introduction to Modern Cryptography

Released: 2014

Computational Number Theory and Modern Cryptography

Released: 2013

Cryptography Engineering

Design Principles and Practical Applications

Released: 2010

The Code Book

The Science of Secrecy from Ancient Egypt to Quantum Cryptography

Released: 2000

The Codebreakers

The Comprehensive History of Secret Communication from Ancient Times to the Internet

Released: 1996

Databases

Microsoft SQL Server 2012 Internals

Developer Reference

Released: 2013

Microsoft SQL Server 2008 Internals

Developer Reference

Released: 2009

SQL Server Forensic Analysis

Released: 2008

The Database Hacker's Handbook

Defending Database Servers

Released: 2005

Exploiting

A Bug Hunter's Diary

A Guided Tour Through the Wilds of Software Security

Released: 2011

A Guide to Kernel Exploitation

Attacking the Core

Released: 2010

The Art of Exploitation

Released: 2008

The Shellcoder's Handbook

Discovering and Exploiting Security Holes

Released: 2007

Writing Security Tools and Exploits

Released: 2006

Sockets, Shellcode, Porting, and Coding

Reverse Engineering Exploits and Tool Coding for Security Professionals

Released: 2005

Buffer Overflow Attacks

Detect, Exploit, Prevent

Released: 2005

Forensics

The Art of Memory Forensics

Detecting Malware and Threats in Windows, Linux, and Mac Memory

Released: 2014

Digital Forensics with Open Source Tools

Released: 2011

File System Forensic Analysis

Released: 2005

Forensic Discovery

Released: 2005

Real Digital Forensics

Computer Security and Incident Response

Released: 2005

Hacking

Gray Hat Hacking

The Ethical Hacker's Handbook

Released: 2015

The Hacker Playbook 2

Practical Guide To Penetration Testing

Released: 2015

Rtfm: Red Team Field Manual

Released: 2014

Penetration Testing

A Hands-On Introduction to Hacking

Released: 2014

Mastering Kali Linux for Advanced Penetration Testing

Released: 2014

Metasploit

The Penetration Tester's Guide

Released: 2011


Industrial / SCADA

Handbook of SCADA/Control Systems Security

Released: 2016

Hacking Exposed Industrial Control Systems

ICS and SCADA Security Secrets & Solutions

Released: 2016

Countdown to Zero Day

Stuxnet and the Launch of the World's First Digital Weapon

Released: 2015

Industrial Network Security

Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

Released: 2014

Robust Control System Networks

How to achieve reliable control after Stuxnet

Released: 2011

Cybersecurity for Industrial Control Systems

SCADA, DCS, PLC, HMI, and SIS

Released: 2011


Machine Learning / AI

Machine Learning and Security

Protecting Systems with Data and Algorithms

Released: 2018

Malware

Practical Malware Analysis

The Hands-On Guide to Dissecting Malicious Software

Released: 2012

The Rootkit Arsenal

Escape and Evasion in the Dark Corners of the System

Released: 2012

Malware Analyst's Cookbook

Tools and Techniques for Fighting Malicious Code

Released: 2010

Malware Forensics

Investigating and Analyzing Malicious Code

Released: 2008

Designing BSD Rootkits

An Introduction to Kernel Hacking

Released: 2007

The Art of Computer Virus Research and Defense

Released: 2005

Rootkits

Subverting the Windows Kernel

Released: 2005

Malicious Cryptography

Exposing Cryptovirology

Released: 2004

Mobile

iOS Application Security

The Definitive Guide for Hackers and Developers

Released: 2016

The Mobile Application Hacker's Handbook

Released: 2015

Android Security Internals

An In-Depth Guide to Android's Security Architecture

Released: 2014

Android Hacker's Handbook

Released: 2014

iOS Hacker's Handbook

Released: 2012

Decompiling Android

Released: 2012


Networking

Practical Packet Analysis

Using Wireshark to Solve Real-World Network Problems

Released: 2017

Computer Networking

A Top-Down Approach

Released: 2016

Mastering Nmap Scripting Engine

Released: 2015

The Practice of Network Security Monitoring

Understanding Incident Detection and Response

Released: 2013

Applied Network Security Monitoring

Collection, Detection, and Analysis

Released: 2013

TCP/IP Illustrated, Volume 1: The Protocols

Released: 2011


OS: Generic

Computer Organization and Design

The Hardware Software Interface: ARM Edition

Released: 2016

Modern Operating Systems

Released: 2014

Computer Organization and Design

The Hardware/Software Interface

Released: 2013

Operating System Concepts

Released: 2012

Operating Systems In Depth

Design and Programming

Released: 2010

OS: Linux

Linux Kernel Development

A thorough guide to the design and implementation of the Linux kernel

Released: 2010

The Linux Programming Interface

A Linux and UNIX System Programming Handbook

Released: 2010

Solaris Internals

Solaris 10 and OpenSolaris Kernel Architecture

Released: 2006

Linux Device Drivers

Released: 2005

Understanding the Linux Kernel

Released: 2005

OS: Mac

MacOS and iOS Internals

Volume III: Security & Insecurity

Released: 2016

Mac OS X and iOS Internals

To the Apple's Core

Released: 2012

OS X and iOS Kernel Programming

Released: 2011

The Mac Hacker's Handbook

Released: 2009

Mac OS X Internals

A Systems Approach

Released: 2006

OS: Windows

Windows Internals

Part 1: System architecture, processes, threads, memory management, and more

Released: 2017

Windows 10 Forensic Analysis

Released: 2016

Windows System Programming

Released: 2015

Windows Forensic Analysis Toolkit

Advanced Analysis Techniques for Windows 8

Released: 2014

Windows Forensic Analysis Toolkit

Advanced Analysis Techniques for Windows 7

Released: 2012

What Makes It Page?

The Windows 7 (x64) Virtual Memory Manager

Released: 2012

Windows Via C/C++

Released: 2007

Windows NT Device Driver Development

Released: 1998

Windows NT File System Internals

A Developer's Guide

Released: 1997


Physical Security / Lockpicking

Practical Lock Picking

A Physical Penetration Tester's Training Guide

Released: 2012

Keys to the Kingdom

Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks

Released: 2012

Programming

Black Hat Python

Python Programming for Hackers and Pentesters

Released: 2014

Violent Python

A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Released: 2012

CLR via C#

Released: 2012

Hacker's Delight

Released: 2012

Gray Hat Python

Python Programming for Hackers and Reverse Engineers

Released: 2009

Assembly Language Step-by-step

Programming with Linux

Released: 2009

Surreptitious Software

Obfuscation, Watermarking, and Tamperproofing for Software Protection

Released: 2009

ATL Internals: Working with ATL 8

Released: 2006

Essential COM

Released: 1998

The C Programming Language

Released: 1988

Reverse Engineering

Practical Reverse Engineering

x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

Released: 2014

Decompiling Java

Released: 2014

The IDA Pro Book

The Unofficial Guide to the World's Most Popular Disassembler

Released: 2011

Hacker Disassembling Uncovered

Released: 2007

BIOS Disassembly Ninjutsu Uncovered

Released: 2006

Reversing

Secrets of Reverse Engineering

Released: 2005


Secure Code Review

Secure Coding in C and C++

SEI Series in Software Engineering

Released: 2013

The CERT Oracle Secure Coding Standard for Java

SEI Series in Software Engineering

Released: 2011

The Art of Software Security Assessment

Identifying and Preventing Software Vulnerabilities

Released: 2006


Social Engineering / Organisations

Advanced Persistent Threat Hacking

The Art and Science of Hacking Any Organization

Released: 2014

The Art of Intrusion

The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

Released: 2005

The Art of Deception

Controlling the Human Element of Security

Released: 2003


Web

The Browser Hacker's Handbook

Released: 2014

Burp Suite Essentials

Released: 2014

The Tangled Web

A Guide to Securing Modern Webapplications

Released: 2011

The Web Application Hacker's Handbook

Finding and Exploiting Security Flaws

Released: 2011

Legacy

Practical Cryptography

Released: 2003

Handbook of Applied Cryptography

Released: 1996

Applied Cryptography

Protocols, Algorithms and Source Code in C

Released: 1995


Future Releases