// By year
Best cybersecurity books from 2014
9 cybersecurity books published in 2014, ranked by rating. Each entry is an opinionated review with who the book is for.
01 · 2014
Countdown to Zero Day
Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter's investigative reconstruction of Stuxnet, the joint US/Israeli operation that physically damaged Iranian uranium-enrichment centrifuges via a worm, and what its discovery revealed about state-level cyber capability.
Beginner5/5Kim Zetter02 · 2014
The Art of Memory Forensics
Detecting Malware and Threats in Windows, Linux, and Mac Memory
Ligh, Case, Levy, and Walters' canonical reference on memory analysis with Volatility — the technique, the tooling, and the operating-system internals it depends on, across Windows, Linux, and macOS.
Advanced5/5Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters03 · 2014
Threat Modeling
Designing for Security
Adam Shostack's practitioner-oriented introduction to threat modeling: STRIDE, attack trees, and how to fit the practice into a real software-development lifecycle.
Intermediate5/5Adam Shostack04 · 2014
@War
The Rise of the Military-Internet Complex
Shane Harris on the entanglement of US military doctrine, the intelligence community, and private contractors after cyberspace was declared the fifth warfighting domain.
Beginner4/5Shane Harris05 · 2014
Android Security Internals
An In-Depth Guide to Android's Security Architecture
Nikolay Elenkov on the actual implementation of Android's security model: package manager internals, permissions, keystore, SELinux integration, verified boot.
Advanced4/5Nikolay Elenkov06 · 2014
Incident Response and Computer Forensics
Luttgens, Pepe, and Mandia's working playbook for running an enterprise IR engagement: pre-engagement readiness, evidence acquisition, network and host forensics, and the project-management discipline that separates a controlled response from a panic.
Intermediate4/5Jason T. Luttgens, Matthew Pepe, Kevin Mandia07 · 2014
Penetration Testing
A Hands-On Introduction to Hacking
Georgia Weidman's lab-driven introduction to pentesting, walking the reader from setting up a target environment through scanning, exploitation, post-exploitation, and reporting.
Beginner4/5Georgia Weidman08 · 2014
Practical Reverse Engineering
x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
A working reverser's textbook from three Microsoft / Quarkslab veterans, covering the architectures and toolchain you'll actually meet on real targets, including the Windows kernel and modern obfuscation patterns.
Advanced4/5Bruce Dang, Alexandre Gazet, Elias Bachaalany09 · 2014
Spam Nation
The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
Brian Krebs's investigative deep-dive into the Russian-speaking pharma-spam economy of the late 2000s — the affiliate networks, the rivalries, and the people who ran them.
Beginner4/5Brian Krebs