//Topic
Best Defensive books
20 books in our catalog cover Defensive, ranked by rating. Each entry is an opinionated review with who the book is for and who should skip it.
01 · 2023
Security Chaos Engineering
Sustaining Resilience in Software and Systems
Kelly Shortridge and Aaron Rinehart on treating security as a property of complex adaptive systems: instead of preventing failure, you continuously simulate it, and design the organization to learn from each result.
Advanced5/5Kelly Shortridge, Aaron Rinehart02 · 2021
Designing Secure Software
A Guide for Developers
Loren Kohnfelder, the original PKI author, on how to weave security thinking through requirements, design, implementation and operations rather than bolt it on at the end.
Intermediate5/5Loren Kohnfelder03 · 2020
Building Secure and Reliable Systems
Best Practices for Designing, Implementing, and Maintaining Systems
Google's site-reliability and security teams jointly write down what it actually takes to build systems that are both safe and dependable, from threat models and design reviews to rollback culture and crisis response.
Advanced5/5Heather Adkins, Betsy Beyer, Paul Blankinship, Piotr Lewandowski, Ana Oprea, Adam Stubblefield04 · 2020
Security Engineering
A Guide to Building Dependable Distributed Systems
Ross Anderson's comprehensive textbook on the design of secure systems, covering protocols, access control, side channels, economics of security, and policy.
Advanced5/5Ross Anderson05 · 2014
Threat Modeling
Designing for Security
Adam Shostack's practitioner-oriented introduction to threat modeling: STRIDE, attack trees, and how to fit the practice into a real software-development lifecycle.
Intermediate5/5Adam Shostack06 · 2013
The Practice of Network Security Monitoring
Understanding Incident Detection and Response
Richard Bejtlich's NSM playbook: how to deploy collection sensors, validate that you actually see what you think you see, and build detection workflows around open-source tools.
Intermediate5/5Richard Bejtlich07 · 2012
Practical Malware Analysis
The Hands-On Guide to Dissecting Malicious Software
Still the gold standard textbook for static and dynamic malware analysis on Windows.
Intermediate5/5Michael Sikorski, Andrew Honig08 · 2024
Evasive Malware
A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats
Kyle Cucci on the anti-analysis arms race: sandbox detection, anti-debug, anti-VM, packing, and the analyst-side tooling and tradecraft that get past those layers.
Advanced4/5Kyle Cucci09 · 2021
How Cybersecurity Really Works
A Hands-On Guide for Total Beginners
Sam Grubb's gentle, exercise-driven introduction for non-specialists who need a working mental model of attacker behaviour and basic defence.
Beginner4/5Sam Grubb10 · 2021
Practical Linux Forensics
A Guide for Digital Investigators
Bruce Nikkel's reference for forensic analysts working post-mortem on Linux images: filesystems, journaling, logs, persistence locations, and the chain of custody discipline around them.
Intermediate4/5Bruce Nikkel11 · 2020
Web Security for Developers
Real Threats, Practical Defense
Malcolm McDonald's developer-side primer on the OWASP-class issues, framed around real attacks and defended with code patterns rather than vendor products.
Beginner4/5Malcolm McDonald12 · 2019
Foundations of Information Security
A Straightforward Introduction
Jason Andress' compact tour of the field: confidentiality / integrity / availability, identification and authentication, network and OS controls, written for newcomers and adjacent disciplines.
Beginner4/5Jason Andress13 · 2017
Network Security Through Data Analysis
From Data to Action
Michael Collins on building situational awareness from network telemetry: collection architecture, statistical baseline-setting, and the analytic patterns that turn raw flows into detection.
Intermediate4/5Michael Collins14 · 2017
Practical Packet Analysis
Using Wireshark to Solve Real-World Network Problems
Chris Sanders' working manual for Wireshark, geared at troubleshooting and incident response rather than abstract protocol theory. Updated for Wireshark 2.x.
Beginner4/5Chris Sanders15 · 2017
Zero Trust Networks
Building Secure Systems in Untrusted Networks
Evan Gilman and Doug Barth's pre-marketing-bubble treatment of zero-trust architecture — what it is when you actually implement it (trust evaluation, device identity, dynamic policy) versus what the vendor pitch turned it into.
Intermediate4/5Evan Gilman, Doug Barth16 · 2014
Incident Response and Computer Forensics
Luttgens, Pepe, and Mandia's working playbook for running an enterprise IR engagement: pre-engagement readiness, evidence acquisition, network and host forensics, and the project-management discipline that separates a controlled response from a panic.
Intermediate4/5Jason T. Luttgens, Matthew Pepe, Kevin Mandia17 · 2010
Cryptography Engineering
Design Principles and Practical Applications
A working engineer's introduction to cryptography that takes implementation pitfalls more seriously than most.
Intermediate4/5Niels Ferguson, Bruce Schneier, Tadayoshi Kohno18 · 2007
Linux Firewalls
Attack Detection and Response with iptables, psad, and fwsnort
Michael Rash, author of psad and fwsnort, on building and operating Linux-native packet filtering and intrusion-response tooling. Pre-nftables in detail but conceptually durable.
Intermediate4/5Michael Rash19 · 2007
Techniques virales avancées
Specialized follow-up to Filiol's Les virus informatiques. Dives into advanced malicious-code attack techniques and their defensive analysis.
Advanced4/5Éric Filiol20 · 2021
Cyberjutsu
Cybersecurity for the Modern Ninja
Ben McCarty maps declassified medieval ninja scrolls onto modern adversary tradecraft. More analogy-driven than technical, useful for security-program framing.
Beginner3/5Ben McCarty