Got a computer security guru on your shopping list and don’t know what to get them? Or tired of getting socks and sweaters for Christmas and want something you can really use? We have put together a list of some of the best selling security books for 2014!
Check out these excellent computer security books:
Great book for those new to the security field or seasoned expert looking for a reference guide. Learn computer security testing with easy to follow, step-by-step tutorials using Kali Linux. In-depth sections on Metasploit, Exploiting Windows and Linux Systems, Wi-Fi security testing, Social Engineering attacks and much more. If you are looking for a security book to get you started in the field, this is it!
A no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page. The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell.
A follow-up to the perennial best-seller Gray Hat Python, Justin Seitz’s Black Hat Python explores the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, extending the popular web hacking tool Burp Suite, and more.
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. Experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics-now the most sought after skill in the digital forensics and incident response fields.
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice.
Looking for more ideas?
- Kali Linux Network Scanning Cookbook
- Metasploit: The Penetration Tester’s Guide
- The Practice of Network Security Monitoring
- Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
- Blue Team Handbook: Incident Response Edition
- BackTrack 5 Wireless Penetration Testing Beginner’s Guide
We hope you enjoyed the list, have a great Holiday season!