// By year

Best cybersecurity books from 2014

9 cybersecurity books published in 2014, ranked by rating. Each entry is an opinionated review with who the book is for.

  1. 01 · 2014

    Countdown to Zero Day

    Stuxnet and the Launch of the World's First Digital Weapon

    Kim Zetter's investigative reconstruction of Stuxnet, the joint US/Israeli operation that physically damaged Iranian uranium-enrichment centrifuges via a worm, and what its discovery revealed about state-level cyber capability.

    Beginner
    5/5Kim Zetter
  2. 02 · 2014

    The Art of Memory Forensics

    Detecting Malware and Threats in Windows, Linux, and Mac Memory

    Ligh, Case, Levy, and Walters' canonical reference on memory analysis with Volatility — the technique, the tooling, and the operating-system internals it depends on, across Windows, Linux, and macOS.

    Advanced
    5/5Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
  3. 03 · 2014

    Threat Modeling

    Designing for Security

    Adam Shostack's practitioner-oriented introduction to threat modeling: STRIDE, attack trees, and how to fit the practice into a real software-development lifecycle.

    Intermediate
    5/5Adam Shostack
  4. 04 · 2014

    @War

    The Rise of the Military-Internet Complex

    Shane Harris on the entanglement of US military doctrine, the intelligence community, and private contractors after cyberspace was declared the fifth warfighting domain.

    Beginner
    4/5Shane Harris
  5. 05 · 2014

    Android Security Internals

    An In-Depth Guide to Android's Security Architecture

    Nikolay Elenkov on the actual implementation of Android's security model: package manager internals, permissions, keystore, SELinux integration, verified boot.

    Advanced
    4/5Nikolay Elenkov
  6. 06 · 2014

    Incident Response and Computer Forensics

    Luttgens, Pepe, and Mandia's working playbook for running an enterprise IR engagement: pre-engagement readiness, evidence acquisition, network and host forensics, and the project-management discipline that separates a controlled response from a panic.

    Intermediate
    4/5Jason T. Luttgens, Matthew Pepe, Kevin Mandia
  7. 07 · 2014

    Penetration Testing

    A Hands-On Introduction to Hacking

    Georgia Weidman's lab-driven introduction to pentesting, walking the reader from setting up a target environment through scanning, exploitation, post-exploitation, and reporting.

    Beginner
    4/5Georgia Weidman
  8. 08 · 2014

    Practical Reverse Engineering

    x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

    A working reverser's textbook from three Microsoft / Quarkslab veterans, covering the architectures and toolchain you'll actually meet on real targets, including the Windows kernel and modern obfuscation patterns.

    Advanced
    4/5Bruce Dang, Alexandre Gazet, Elias Bachaalany
  9. 09 · 2014

    Spam Nation

    The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door

    Brian Krebs's investigative deep-dive into the Russian-speaking pharma-spam economy of the late 2000s — the affiliate networks, the rivalries, and the people who ran them.

    Beginner
    4/5Brian Krebs

Other years

Related topics