Hackers Books
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother…
Security Engineering: A Guide to Building Dependable Distributed Systems
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers,…
Reversing: Secrets of Reverse Engineering
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing th…
Cryptography Engineering: Design Principles and Practical Applications
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping informat…
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrat…
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure curr…
Cryptography and Network Security: Principles and Practice
Best-selling author William Stallings provides a practical survey of both the principles and practice of cryptography and network security. He inc…
Secrets and Lies: Digital Security in a Networked World
Viruses. Identity Theft. Corporate Espionage. National secrets compromised. Can anyone promise security in our digital world? The man who i…
Hacker's Delight
This book is for anyone who wants to create efficient code. Hacker's Delight will help you learn to program at a higher level - well beyond what i…
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network.…