//Books
Cybersecurity books, reviewed honestly.
Reviews aimed at the people who have to actually learn something from these books, engineers, defenders, students. Each entry says who it's for, who it isn't, and what to read alongside it.
Sandworm
Andy Greenberg · 2019
Long-form journalism on the GRU's hacking operations, the best non-technical book on what state-level cyber actually looks like.
BeginnerThreat IntelligenceNarrativeRead reviewSecurity Chaos Engineering
Kelly Shortridge, Aaron Rinehart · 2023
Kelly Shortridge and Aaron Rinehart on treating security as a property of complex adaptive systems: instead of preventing failure, you continuously simulate it, and design the organization to learn from each result.
AdvancedDefensiveDevSecOpsRead reviewSecurity Engineering
Ross Anderson · 2020
Ross Anderson's comprehensive textbook on the design of secure systems, covering protocols, access control, side channels, economics of security, and policy.
AdvancedSecurity ArchitectureDefensiveRead reviewSerious Cryptography
Jean-Philippe Aumasson · 2024
Jean-Philippe Aumasson's working introduction to modern cryptography, written for engineers who need both intuition and enough mathematical depth to evaluate the choices a library is making for them.
IntermediateCryptographyRead reviewSilence on the Wire
Michal Zalewski · 2005
Michal Zalewski's classic on the indirect attack surface: timing channels, protocol-stack fingerprinting, and the often-overlooked side data leaked by every layer of a stack.
AdvancedNetworkingReconnaissanceRead reviewSocial Engineering
Christopher Hadnagy · 2018
Christopher Hadnagy's broad procedural reference on social engineering as a discipline — recon, pretexting, elicitation, microexpressions, and the structured engagement model his consultancy operationalized.
IntermediateSocial EngineeringFoundationsRead reviewSpam Nation
Brian Krebs · 2014
Brian Krebs's investigative deep-dive into the Russian-speaking pharma-spam economy of the late 2000s — the affiliate networks, the rivalries, and the people who ran them.
BeginnerCybercrimeNarrativeRead reviewTechniques virales avancées
Éric Filiol · 2007
Specialized follow-up to Filiol's Les virus informatiques. Dives into advanced malicious-code attack techniques and their defensive analysis.
AdvancedMalwareReverse EngineeringRead reviewThe Art of Deception
Kevin Mitnick, William L. Simon · 2002
Kevin Mitnick and William Simon's case-study collection of social-engineering attacks: PBX scams, helpdesk impersonation, dumpster-diving, the casual lies that sound true. The technology dates the book; the human side is timeless.
BeginnerSocial EngineeringNarrativeRead reviewThe Art of Intrusion
Kevin Mitnick, William L. Simon · 2005
Mitnick and Simon's follow-up to The Art of Deception: third-party stories from working hackers — casino slot exploits, prison-network breaches, post-9/11 intelligence ops — reconstructed and annotated by Mitnick.
BeginnerNarrativePentestingRead reviewThe Art of Mac Malware, Volume 1
Patrick Wardle · 2022
Patrick Wardle's deep dive on macOS malware analysis: persistence patterns, injection techniques, anti-analysis tricks, and the macOS-specific tooling needed to triage real samples.
AdvancedMalwaremacOSRead reviewThe Art of Memory Forensics
Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters · 2014
Ligh, Case, Levy, and Walters' canonical reference on memory analysis with Volatility — the technique, the tooling, and the operating-system internals it depends on, across Windows, Linux, and macOS.
AdvancedForensicsMalwareRead review