// By year
Best cybersecurity books from 2018
9 cybersecurity books published in 2018, ranked by rating. Each entry is an opinionated review with who the book is for.
01 · 2018
Practical Binary Analysis
Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
Dennis Andriesse on the binary toolchain you can actually script: ELF internals, dynamic taint analysis, symbolic execution and instrumentation with concrete code-along examples.
Advanced5/5Dennis Andriesse02 · 2018
Click Here to Kill Everybody
Security and Survival in a Hyper-Connected World
Bruce Schneier's policy-level argument that as everything becomes a computer (cars, medical devices, infrastructure, voting), the security failures that used to merely cost us money will start costing lives — and the regulatory shape of that future is being decided now.
Beginner4/5Bruce Schneier03 · 2018
Kubernetes Security
Liz Rice and Michael Hausenblas's freely-available O'Reilly short on the Kubernetes-specific security model: API server, RBAC, network policy, secrets, and the typical hardening steps that move a cluster from default to defensible.
Intermediate4/5Liz Rice, Michael Hausenblas04 · 2018
Malware Data Science
Attack Detection and Attribution
Saxe and Sanders apply machine-learning techniques (classification, clustering, deep learning) to malware detection and attribution, with working Python code and real corpora.
Intermediate4/5Joshua Saxe, Hillary Sanders05 · 2018
Social Engineering
The Science of Human Hacking
Christopher Hadnagy's broad procedural reference on social engineering as a discipline — recon, pretexting, elicitation, microexpressions, and the structured engagement model his consultancy operationalized.
Intermediate4/5Christopher Hadnagy06 · 2018
The Hacker Playbook 3
Practical Guide to Penetration Testing — Red Team Edition
Peter Kim's hands-on red-team field manual: assumed-breach scenarios, lateral movement, AV/EDR evasion, and the operational rhythm of a real engagement rather than a checklist of CVEs.
Intermediate4/5Peter Kim07 · 2018
Cybersécurité — Un ouvrage unique pour les managers
French-language management-oriented cybersecurity handbook by Hennion and Makhlouf: governance, ISO 27001, risk management, GDPR, business continuity — operational panorama, no technical depth.
Beginner3/5Romain Hennion, Anissa Makhlouf08 · 2018
Open Source Intelligence Techniques and Tools
Hassan and Hijazi's pedagogical introduction to OSINT framed inside the broader intelligence cycle (collection → processing → analysis → dissemination) rather than around a specific toolchain.
Beginner3/5Nihad A. Hassan, Rami Hijazi09 · 2018
Pentesting Azure Applications
The Definitive Guide to Testing and Securing Deployments
Matt Burrough on attacker behaviour against Azure tenants: identity, storage, VMs, key material handling, and the recon paths that work against real subscriptions.
Intermediate3/5Matt Burrough