From f6ba0ddbff6705aa25904cd6315f4d78ed8b0ea9 Mon Sep 17 00:00:00 2001 From: Flower Dev <67862441+Flower-dev@users.noreply.github.com> Date: Tue, 12 Oct 2021 20:17:52 +0200 Subject: [PATCH] BOOKS.md : new books --- BOOKS.md | 15 ++++++++++++++- 1 file changed, 14 insertions(+), 1 deletion(-) diff --git a/BOOKS.md b/BOOKS.md index b235269..ba729b5 100644 --- a/BOOKS.md +++ b/BOOKS.md @@ -2,17 +2,30 @@ > Grab a book and relax. Some of the best books in the industry. -- [Android Hacker's Handbook by Joshua J. Drake et al. (2014)](http://www.wiley.com/WileyCDA/WileyTitle/productCd-111860864X.html) - [Advanced Penetration Testing: Hacking the World's Most Secure Networks by Wil Allsopp (2017)](https://www.goodreads.com/book/show/32027337-advanced-penetration-testing) +- [Android Hacker's Handbook by Joshua J. Drake et al. (2014)](http://www.wiley.com/WileyCDA/WileyTitle/productCd-111860864X.html) +- Android Security Internals: An In-Depth Guide to Android's Security Architecture by Nikolay Elenkov (2015) +- Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation by James Forshaw (2018) +- Black Hat Go: Go Programming for Hackers and Pentesters by Tom Steele, Chris Patten, and Dan Kottmann (2020) - [Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz (2014)](https://www.goodreads.com/book/show/22299369-black-hat-python) - [Breaking into Information Security: Learning the Ropes 101 - Andrew Gill](https://leanpub.com/ltr101-breaking-into-infosec) - [Car Hacker's Handbook by Craig Smith (2016)](https://www.nostarch.com/carhacking) +- Cyberjutsu: Cybersecurity for the Modern Ninja by Ben McCarty (2021) +- Foundations of Information Security: A Straightforward Introduction by Jason Andress (2019) +- Game Hacking: Developing Autonomous Bots for Online Games by Nick Cano (2016) - [Gray Hat Python: Python Programming for Hackers and Reverse Engineers by Justin Seitz (2009)](https://www.goodreads.com/book/show/5044768-gray-hat-python) - [Hacking: The Art of Exploitation by Jon Erickson (2004)](https://www.goodreads.com/book/show/61619.Hacking) - [iOS Hacker's Handbook by Charlie Miller et al. (2012)](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118204123.html) - [Metasploit: The Penetration Tester's Guide by David Kennedy (2011)](https://www.nostarch.com/metasploit) - [OWASP Testing Guide: Stable](https://owasp.org/www-project-web-security-testing-guide/stable/) - [Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman (2014)](https://nostarch.com/pentesting) +- Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments by Matt Burrough (2018) +- Pratical Binary Analysis: Build Your Own Linux Tools for Binary instrumentation, Analysis, and Disassembly by Dennis Andriesse (2019) +- Pratical Forensic Imaging: Securing Digital Evidence with Linux Tools by Bruce Nikkel (2016) +- Pratical IoT Hacking: The Definitive Guide to Attacking the Internet of Things by Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou and Beau Woods (2021) +- Real-World Bug Hunting: A Field Guide to Web Hacking by Peter Yaworski (2019) +- Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats by Alex Matrosov, Eugene Rodionov, and Sergey Bratus (2019) +- The Car Hacker's Handbook: A Guide for the Penetration Tester by Craig Smith (2016) - [The Browser Hacker's Handbook by Wade Alcorn et al. (2014)](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118662091.html) - [The Database Hacker's Handbook, David Litchfield et al. (2005)](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764578014.html) - [The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim (2014)](https://www.goodreads.com/book/show/21846565-the-hacker-playbook)