您的位置:首页 > 其它

信息安全推荐书籍

2015-10-30 07:41 330 查看
转自:http://dfir.org/?q=node/8/


Recommended Reading

This page lists books that I have found to be highly relevant and useful for learning topics within computer security, digital forensics, incident response, malware analysis, and reverse engineering, and other
related topics. These books range from introductory texts to advanced research works. While some of these books may seem dated, the information contained is still very useful to people learning today, and much of the information is essential to becoming proficient
in the information security realm.
Please note that, in order to avoid ranking individual books, each category is listed in alphabetical order and each book is listed in alphabetical order within its category.
If you notice any errors with this page or have books that you think should be listed then please contact me. I will only list books that I have personally read and for which I am willing to vouch.
Application Security - Native
TitleCommentsTechnical Level
The Art of Software Security AssessmentThe Bible of source code auditingIntermediate-Advanced. Ability to read C/C++ required to get full value.
Secure Coding in C and C++Arguably the best text for writing secure low-level codeAccessible to all that can read/write C and C++
Application Security - Web
TitleCommentsTechnical Level
The Browser Hacker's HandbookWritten by the authors of BeEF. A detailed look into many web security topicsCovers basic through advanced topics
The Database Hacker's HandbookThe most detailed book available for attacking databasesCovers basic through advanced topics
The Tangled WebA detailed look at the foundations of web protocols followed by a thorough examination of their weakness. Highly, highly recommendedAccessible to all. The beginning chapters cover background needed for later advanced topics
The Web Application Hacker's HandbookCovers a wide range of web security issuesIntermediate
Cryptography
TitleCommentsTechnical Level
Cryptography EngineeringThe (updated) standard for learning cryptographyRanges from background and introduction to deep algorithms and security considerations
Introduction to Modern CryptographyA well-done, formal look at cryptography. Used in many graduate level computer science programsAdvanced - full understanding requires deep mathematical knowledge
Database Forensics
TitleCommentsTechnical Level
Microsoft SQL Server InternalsExamination of MSSQL akin to the OS-level examination of Windows InternalsIntermediate - learn database basics before reading
SQL Server Forensic AnalysisA deep look at forensic analysis of MSSQL SystemsIntermediate - learn database basics before reading
Digital Forensics and Incident Response
TitleCommentsTechnical Level
File System Forensic AnalysisThe definitive resource for file system forensicsIntermediate-Advanced
Forensic DiscoveryA foundational text of computer forensics by two of the earliest pioneersIntermediate
Real Digital ForensicsA concise introduction to forensic processesBeginner-Intermediate
Windows Forensic Analysis, Second EditionThis book, along with the 4th edition, are the best books available for Windows disk forensicsRanges from basic concepts to advanced analysis
Windows Forensic Analysis, Fourth EditionThis book, along with the 2nd edition, are the best books available for Windows disk forensicsRanges from basic concepts to advanced analysis
Exploitation / Penetration Testing
TitleCommentsTechnical Level
A Guide to Kernel ExploitationAdvanced exploitation of a range of operating systemsAdvanced
Android Hacker's HandbookA deep dive into exploitation of Android systemsIntermediate
The Hacker PlaybookA step-by-step guide to breaking into modern networks with a wide array of techniques and toolsAccess to All
Hacking: The Art of Exploitation, 1st EditionA foundational work of low-level exploitationIntermediate
iOS Hacker's HandbookA deep dive into exploitation of iOS devicesIntermediate-Advanced
The Mac Hacker's HandbookA deep dive into exploitation of Mac systemsIntermediate-Advanced
Rtfm: Red Team Field ManualA concise, well written guide that should be in every penetration tester's travel bagAccessible to all people with a pen test background
The Shellcoder's HandbookCrafting shellcode and exploitsIntermediate-Advanced
Linux Usage
TitleCommentsTechnical Level
Linux in a NutshellThe best text to learn how to use LinuxBeginner-Intermediate
Running LinuxAnother great text from which to learn LinuxBeginner-Intermediate
Malware Development and Analysis

Note: Many of these books contain information related to Reverse Engineering
TitleCommentsTechnical Level
The Art of Computer Virus Research and DefenseA deep look at many facets of malware analysisIntermediate
Malware Analyst's CookbookA "recipe" approach to many topics in malware analysisIntermediate-Advanced
Malware ForensicsA well done introduction to malware analysisBeginner
Practical Malware AnalysisA very approachable book to many topics in malware analysisIntermediate
Rootkits: Subverting the Windows KernelA study of many rootkit techniques still in use todayIntermediate-Advanced
The Rootkit ArsenalAn 800 page epic of rootkit development and analysisIntermediate-Advanced
Memory Forensics
TitleCommentsTechnical Level
The Art of Memory ForensicsA 900 page exploration of memory forensics across the major operating systems. NOTE: I am a co-author of this bookRanges from introductory material to advanced analysis
What Makes It Page?A deep look into the Windows memory managerIntermediate-Advanced
Network Forensics
TitleCommentsTechnical Level
The Practice of Network Security
Monitoring
Beyond just packet analysis to how to integrate network forensics into a real world environmentIntermediate
Practical Packet AnalysisAn excellent resource for learning to identify and analyze network trafficBeginner-Intermediate
Wireshark (R) 101A deep exploration of WiresharkBeginner-Intermediate
Networking
TitleCommentsTechnical Level/th>
CCNA Cisco Certified Network Associate Study
Guide
A primer on real world networking and networksIntermediate
CompTIA Network+ All-In-One Exam GuideAn essential book for those looking to learn networkingBeginner
TCP/IP IllustratedThe Bible of networking protocols. A must readIntermediate
Operating Systems Internals - Android
TitleCommentsTechnical Level
Android Security InternalsA deep look at Android from both the operating system internals and security perspective.Intermediate
Operating Systems Internals - General
TitleCommentsTechnical Level
Intel Architecture ManualsVery well done documentation on the hardware architecture. Free to downloadIntermediate-Advanced
Modern Operating SystemsThe classic book from TanenbaumIntermediate-Advanced
Operating System Concepts"The dinosaur book" of OS internals.Intermediate-Advanced
Operating Systems Internals - Linux
TitleCommentsTechnical Level
Linux Device Drivers, 3rd EditionBest resource to learn Linux's driver architectureIntermediate-Advanced
Linux Kernel Development, 3rd EditionRob Love on programming in the Linux kernelIntermediate-Advanced
The Linux Programming InterfaceExcellent book on programming the Linux environmentIntermediate-Advanced
Understanding the Linux Kernel, Third EditionThe equivalent of Windows Internals for LinuxIntermediate-Advanced
Operating Systems Internals - Mac
TitleCommentsTechnical Level
Mac OS X Internals: A Systems ApproachWindows Internals for MacIntermediate-Advanced
Mac OS X and iOS InternalsRead this after reading Mac OS X InternalsIntermediate-Advanced
Operating Systems Internals - Windows
TitleCommentsSkill Level
Windows InternalsRead this book if you want to understand WindowsIntermediate-Advanced
Windows System Programming
(4th Edition)
A step-by-step guide through the Windows APIIntermediate
Programming - Concepts and Algorithms
TitleCommentsTechnical Level
Compilers: Principles, Techniques, and
Tools
The famous dragon book on compilersAdvanced - Don't read until you have a solid understanding of programming and runtime environments
Design PatternsRequired reading for any serious programmerIntermediate
Linkers and LoadersRequired reading for understanding program linking and runtime loadingIntermediate
Programming - Language Specific

Note: The reason there are few books here is due to languages having amazing learning resources online
TitleCommentsTechnical Level
Advanced Programming
in the UNIX(R) Environment
Deep exploration of programming related to Linux, Mac, and BSDBeginner-Intermediate
Black Hat PythonGreat book using Python for offensive security purposesBeginner-Intermediate
The C Programming Language, 2nd Edition"K and R" - required if you want to be proficient with CIntermediate-Advanced
Violent PythonLearn Python programming and directly apply it to forensics and securityBasic to advanced topics
Reverse Engineering
TitleCommentsTechnical Level
Assembly Language Step-by-stepThe best resource to learn assembly. Later books focused on "high level" assembly as opposed to actual instructionsIntermediate-Advanced
Hacker Disassembling UncoveredA great resource for advanced topics in reverse engineeringIntermediate-Advanced
Hacking the XboxA well written and fun book from which to learn reversingIntermediate
The IDA Pro BookThe best resource to learn IDAIntermediate
Reversing: Secrets of Reverse EngineeringOne of my favorite books. A chapter is dedicated to reversing a Windows API back to C so perfectly that compiling it matches the hash of the Windows DLLIntermediate-Advanced
Practical Reverse EngineeringReversing across Intel and ARMIntermediate
Tradecraft - Digital
TitleCommentsTechnical Level
Silence on the Wirelcamtuf's exploration of vulnerabilities and attacks that most people would never think of. Strongly recommendedBeginner-Advanced
Tradecraft - Traditional

Note: I originally found several of these books from The Grugq's list
TitleCommentsTechnical Level
Agent StormReal life story of a European convert who joined Al Qaeda while working for the CIAAccessible to all
The Art of IntelligenceTradecraft and real-world analysis from Henry CrumptonBeginner-Intermediate
Black BannersDeep coverage of FBI tradecraft while investing the USS Cole bombings, 9/11, and other events in the Middle EastAccessible to all
Chinese Intelligence OperationsA well-written, deep study of Chinese intelligence servicesAdvanced
The Main EnemyAn incredibly detailed history of the CIA vs the KGB during the Cold WarAccessible to All
See No EvilTradecraft and lessons from a former CIA analyst in the Middle EastIntermediate
Spy Handler: Memoir of a KGB OfficerWritten by the KGB officer whom handled Robert Hanssen and Aldrich Ames. A great text to learn real world tactics and techniquesBeginner-Intermediate
Terrorism and Counterintelligence:
How Terrorist Groups Elude Detection
A deep examination of modern terrorist groups and counterintelligence useIntermediate
Thwarting Enemies at Home and
Abroad: How to Be a Counterintelligence Officer
Read this first - a textbook on how to be a counter intel officer along with terms, techniques, and tacticsBeginner - make this your first book
内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息
标签: