Hackers Books


The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother…

(4 )

Security Engineering: A Guide to Building Dependable Distributed Systems

The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers,…

(4 )

Reversing: Secrets of Reverse Engineering

Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing th…

(4 )

Cryptography Engineering: Design Principles and Practical Applications

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping informat…

(4 )

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrat…

(4 )

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure curr…

(4 )

Cryptography and Network Security: Principles and Practice

Best-selling author William Stallings provides a practical survey of both the principles and practice of cryptography and network security. He inc…

(4 )

Secrets and Lies: Digital Security in a Networked World

Viruses. Identity Theft. Corporate Espionage. National secrets compromised. Can anyone promise security in our digital world? The man who i…

(4 )

Hacker's Delight

This book is for anyone who wants to create efficient code. Hacker's Delight will help you learn to program at a higher level - well beyond what i…

(4 )

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network.…

(4 )