// By year

Best cybersecurity books from 2018

9 cybersecurity books published in 2018, ranked by rating. Each entry is an opinionated review with who the book is for.

  1. 01 · 2018

    Practical Binary Analysis

    Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly

    Dennis Andriesse on the binary toolchain you can actually script: ELF internals, dynamic taint analysis, symbolic execution and instrumentation with concrete code-along examples.

    Advanced
    5/5Dennis Andriesse
  2. 02 · 2018

    Click Here to Kill Everybody

    Security and Survival in a Hyper-Connected World

    Bruce Schneier's policy-level argument that as everything becomes a computer (cars, medical devices, infrastructure, voting), the security failures that used to merely cost us money will start costing lives — and the regulatory shape of that future is being decided now.

    Beginner
    4/5Bruce Schneier
  3. 03 · 2018

    Kubernetes Security

    Liz Rice and Michael Hausenblas's freely-available O'Reilly short on the Kubernetes-specific security model: API server, RBAC, network policy, secrets, and the typical hardening steps that move a cluster from default to defensible.

    Intermediate
    4/5Liz Rice, Michael Hausenblas
  4. 04 · 2018

    Malware Data Science

    Attack Detection and Attribution

    Saxe and Sanders apply machine-learning techniques (classification, clustering, deep learning) to malware detection and attribution, with working Python code and real corpora.

    Intermediate
    4/5Joshua Saxe, Hillary Sanders
  5. 05 · 2018

    Social Engineering

    The Science of Human Hacking

    Christopher Hadnagy's broad procedural reference on social engineering as a discipline — recon, pretexting, elicitation, microexpressions, and the structured engagement model his consultancy operationalized.

    Intermediate
    4/5Christopher Hadnagy
  6. 06 · 2018

    The Hacker Playbook 3

    Practical Guide to Penetration Testing — Red Team Edition

    Peter Kim's hands-on red-team field manual: assumed-breach scenarios, lateral movement, AV/EDR evasion, and the operational rhythm of a real engagement rather than a checklist of CVEs.

    Intermediate
    4/5Peter Kim
  7. 07 · 2018

    Cybersécurité — Un ouvrage unique pour les managers

    French-language management-oriented cybersecurity handbook by Hennion and Makhlouf: governance, ISO 27001, risk management, GDPR, business continuity — operational panorama, no technical depth.

    Beginner
    3/5Romain Hennion, Anissa Makhlouf
  8. 08 · 2018

    Open Source Intelligence Techniques and Tools

    Hassan and Hijazi's pedagogical introduction to OSINT framed inside the broader intelligence cycle (collection → processing → analysis → dissemination) rather than around a specific toolchain.

    Beginner
    3/5Nihad A. Hassan, Rami Hijazi
  9. 09 · 2018

    Pentesting Azure Applications

    The Definitive Guide to Testing and Securing Deployments

    Matt Burrough on attacker behaviour against Azure tenants: identity, storage, VMs, key material handling, and the recon paths that work against real subscriptions.

    Intermediate
    3/5Matt Burrough

Other years

Related topics