//Topic

Best Defensive books

20 books in our catalog cover Defensive, ranked by rating. Each entry is an opinionated review with who the book is for and who should skip it.

  1. 01 · 2023

    Security Chaos Engineering

    Sustaining Resilience in Software and Systems

    Kelly Shortridge and Aaron Rinehart on treating security as a property of complex adaptive systems: instead of preventing failure, you continuously simulate it, and design the organization to learn from each result.

    Advanced5/5Kelly Shortridge, Aaron Rinehart
  2. 02 · 2021

    Designing Secure Software

    A Guide for Developers

    Loren Kohnfelder, the original PKI author, on how to weave security thinking through requirements, design, implementation and operations rather than bolt it on at the end.

    Intermediate5/5Loren Kohnfelder
  3. 03 · 2020

    Building Secure and Reliable Systems

    Best Practices for Designing, Implementing, and Maintaining Systems

    Google's site-reliability and security teams jointly write down what it actually takes to build systems that are both safe and dependable, from threat models and design reviews to rollback culture and crisis response.

    Advanced5/5Heather Adkins, Betsy Beyer, Paul Blankinship, Piotr Lewandowski, Ana Oprea, Adam Stubblefield
  4. 04 · 2020

    Security Engineering

    A Guide to Building Dependable Distributed Systems

    Ross Anderson's comprehensive textbook on the design of secure systems, covering protocols, access control, side channels, economics of security, and policy.

    Advanced5/5Ross Anderson
  5. 05 · 2014

    Threat Modeling

    Designing for Security

    Adam Shostack's practitioner-oriented introduction to threat modeling: STRIDE, attack trees, and how to fit the practice into a real software-development lifecycle.

    Intermediate5/5Adam Shostack
  6. 06 · 2013

    The Practice of Network Security Monitoring

    Understanding Incident Detection and Response

    Richard Bejtlich's NSM playbook: how to deploy collection sensors, validate that you actually see what you think you see, and build detection workflows around open-source tools.

    Intermediate5/5Richard Bejtlich
  7. 07 · 2012

    Practical Malware Analysis

    The Hands-On Guide to Dissecting Malicious Software

    Still the gold standard textbook for static and dynamic malware analysis on Windows.

    Intermediate5/5Michael Sikorski, Andrew Honig
  8. 08 · 2024

    Evasive Malware

    A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats

    Kyle Cucci on the anti-analysis arms race: sandbox detection, anti-debug, anti-VM, packing, and the analyst-side tooling and tradecraft that get past those layers.

    Advanced4/5Kyle Cucci
  9. 09 · 2021

    How Cybersecurity Really Works

    A Hands-On Guide for Total Beginners

    Sam Grubb's gentle, exercise-driven introduction for non-specialists who need a working mental model of attacker behaviour and basic defence.

    Beginner4/5Sam Grubb
  10. 10 · 2021

    Practical Linux Forensics

    A Guide for Digital Investigators

    Bruce Nikkel's reference for forensic analysts working post-mortem on Linux images: filesystems, journaling, logs, persistence locations, and the chain of custody discipline around them.

    Intermediate4/5Bruce Nikkel
  11. 11 · 2020

    Web Security for Developers

    Real Threats, Practical Defense

    Malcolm McDonald's developer-side primer on the OWASP-class issues, framed around real attacks and defended with code patterns rather than vendor products.

    Beginner4/5Malcolm McDonald
  12. 12 · 2019

    Foundations of Information Security

    A Straightforward Introduction

    Jason Andress' compact tour of the field: confidentiality / integrity / availability, identification and authentication, network and OS controls, written for newcomers and adjacent disciplines.

    Beginner4/5Jason Andress
  13. 13 · 2017

    Network Security Through Data Analysis

    From Data to Action

    Michael Collins on building situational awareness from network telemetry: collection architecture, statistical baseline-setting, and the analytic patterns that turn raw flows into detection.

    Intermediate4/5Michael Collins
  14. 14 · 2017

    Practical Packet Analysis

    Using Wireshark to Solve Real-World Network Problems

    Chris Sanders' working manual for Wireshark, geared at troubleshooting and incident response rather than abstract protocol theory. Updated for Wireshark 2.x.

    Beginner4/5Chris Sanders
  15. 15 · 2017

    Zero Trust Networks

    Building Secure Systems in Untrusted Networks

    Evan Gilman and Doug Barth's pre-marketing-bubble treatment of zero-trust architecture — what it is when you actually implement it (trust evaluation, device identity, dynamic policy) versus what the vendor pitch turned it into.

    Intermediate4/5Evan Gilman, Doug Barth
  16. 16 · 2014

    Incident Response and Computer Forensics

    Luttgens, Pepe, and Mandia's working playbook for running an enterprise IR engagement: pre-engagement readiness, evidence acquisition, network and host forensics, and the project-management discipline that separates a controlled response from a panic.

    Intermediate4/5Jason T. Luttgens, Matthew Pepe, Kevin Mandia
  17. 17 · 2010

    Cryptography Engineering

    Design Principles and Practical Applications

    A working engineer's introduction to cryptography that takes implementation pitfalls more seriously than most.

    Intermediate4/5Niels Ferguson, Bruce Schneier, Tadayoshi Kohno
  18. 18 · 2007

    Linux Firewalls

    Attack Detection and Response with iptables, psad, and fwsnort

    Michael Rash, author of psad and fwsnort, on building and operating Linux-native packet filtering and intrusion-response tooling. Pre-nftables in detail but conceptually durable.

    Intermediate4/5Michael Rash
  19. 19 · 2007

    Techniques virales avancées

    Specialized follow-up to Filiol's Les virus informatiques. Dives into advanced malicious-code attack techniques and their defensive analysis.

    Advanced4/5Éric Filiol
  20. 20 · 2021

    Cyberjutsu

    Cybersecurity for the Modern Ninja

    Ben McCarty maps declassified medieval ninja scrolls onto modern adversary tradecraft. More analogy-driven than technical, useful for security-program framing.

    Beginner3/5Ben McCarty

Related topics