转自:http://dfir.org/?q=node/8/

Recommended Reading

This page lists books that I have found to be highly relevant and useful for learning topics within computer security, digital forensics, incident response, malware analysis, and reverse engineering, and other related topics. These books range from introductory texts to advanced research works. While some of these books may seem dated, the information contained is still very useful to people learning today, and much of the information is essential to becoming proficient in the information security realm.

Please note that, in order to avoid ranking individual books, each category is listed in alphabetical order and each book is listed in alphabetical order within its category.

If you notice any errors with this page or have books that you think should be listed then please contact me. I will only list books that I have personally read and for which I am willing to vouch.

Application Security - Native

Title Comments Technical Level
The Art of Software Security AssessmentThe Bible of source code auditingIntermediate-Advanced. Ability to read C/C++ required to get full value.
Secure Coding in C and C++Arguably the best text for writing secure low-level codeAccessible to all that can read/write C and C++


Application Security - Web

Title Comments Technical Level
The Browser Hacker's HandbookWritten by the authors of BeEF. A detailed look into many web security topicsCovers basic through advanced topics
The Database Hacker's HandbookThe most detailed book available for attacking databasesCovers basic through advanced topics
The Tangled WebA detailed look at the foundations of web protocols followed by a thorough examination of their weakness. Highly, highly recommendedAccessible to all. The beginning chapters cover background needed for later advanced topics
The Web Application Hacker's HandbookCovers a wide range of web security issuesIntermediate


Cryptography

Title Comments Technical Level
Cryptography EngineeringThe (updated) standard for learning cryptographyRanges from background and introduction to deep algorithms and security considerations
Introduction to Modern CryptographyA well-done, formal look at cryptography. Used in many graduate level computer science programsAdvanced - full understanding requires deep mathematical knowledge


Database Forensics

Title Comments Technical Level
Microsoft SQL Server InternalsExamination of MSSQL akin to the OS-level examination of Windows InternalsIntermediate - learn database basics before reading
SQL Server Forensic AnalysisA deep look at forensic analysis of MSSQL SystemsIntermediate - learn database basics before reading


Digital Forensics and Incident Response

Title Comments Technical Level
File System Forensic AnalysisThe definitive resource for file system forensicsIntermediate-Advanced
Forensic DiscoveryA foundational text of computer forensics by two of the earliest pioneersIntermediate
Real Digital ForensicsA concise introduction to forensic processesBeginner-Intermediate
Windows Forensic Analysis, Second EditionThis book, along with the 4th edition, are the best books available for Windows disk forensicsRanges from basic concepts to advanced analysis
Windows Forensic Analysis, Fourth EditionThis book, along with the 2nd edition, are the best books available for Windows disk forensicsRanges from basic concepts to advanced analysis


Exploitation / Penetration Testing

Title Comments Technical Level
A Guide to Kernel ExploitationAdvanced exploitation of a range of operating systemsAdvanced
Android Hacker's HandbookA deep dive into exploitation of Android systemsIntermediate
The Hacker PlaybookA step-by-step guide to breaking into modern networks with a wide array of techniques and toolsAccess to All
Hacking: The Art of Exploitation, 1st EditionA foundational work of low-level exploitationIntermediate
iOS Hacker's HandbookA deep dive into exploitation of iOS devicesIntermediate-Advanced
The Mac Hacker's HandbookA deep dive into exploitation of Mac systemsIntermediate-Advanced
Rtfm: Red Team Field ManualA concise, well written guide that should be in every penetration tester's travel bagAccessible to all people with a pen test background
The Shellcoder's HandbookCrafting shellcode and exploitsIntermediate-Advanced


Linux Usage

Title Comments Technical Level
Linux in a NutshellThe best text to learn how to use LinuxBeginner-Intermediate
Running LinuxAnother great text from which to learn LinuxBeginner-Intermediate


Malware Development and Analysis
Note: Many of these books contain information related to Reverse Engineering

Title Comments Technical Level
The Art of Computer Virus Research and DefenseA deep look at many facets of malware analysisIntermediate
Malware Analyst's CookbookA "recipe" approach to many topics in malware analysisIntermediate-Advanced
Malware ForensicsA well done introduction to malware analysisBeginner
Practical Malware AnalysisA very approachable book to many topics in malware analysisIntermediate
Rootkits: Subverting the Windows KernelA study of many rootkit techniques still in use todayIntermediate-Advanced
The Rootkit ArsenalAn 800 page epic of rootkit development and analysisIntermediate-Advanced


Memory Forensics

Title Comments Technical Level
The Art of Memory ForensicsA 900 page exploration of memory forensics across the major operating systems. NOTE: I am a co-author of this bookRanges from introductory material to advanced analysis
What Makes It Page?A deep look into the Windows memory managerIntermediate-Advanced


Network Forensics

Title Comments Technical Level
The Practice of Network Security MonitoringBeyond just packet analysis to how to integrate network forensics into a real world environmentIntermediate
Practical Packet AnalysisAn excellent resource for learning to identify and analyze network trafficBeginner-Intermediate
Wireshark (R) 101A deep exploration of WiresharkBeginner-Intermediate


Networking

Title Comments Technical Level/th>
CCNA Cisco Certified Network Associate Study GuideA primer on real world networking and networksIntermediate
CompTIA Network+ All-In-One Exam GuideAn essential book for those looking to learn networkingBeginner
TCP/IP IllustratedThe Bible of networking protocols. A must readIntermediate


Operating Systems Internals - Android

Title Comments Technical Level
Android Security InternalsA deep look at Android from both the operating system internals and security perspective.Intermediate


Operating Systems Internals - General

Title Comments Technical Level
Intel Architecture ManualsVery well done documentation on the hardware architecture. Free to downloadIntermediate-Advanced
Modern Operating SystemsThe classic book from TanenbaumIntermediate-Advanced
Operating System Concepts"The dinosaur book" of OS internals.Intermediate-Advanced


Operating Systems Internals - Linux

Title Comments Technical Level
Linux Device Drivers, 3rd EditionBest resource to learn Linux's driver architectureIntermediate-Advanced
Linux Kernel Development, 3rd EditionRob Love on programming in the Linux kernelIntermediate-Advanced
The Linux Programming InterfaceExcellent book on programming the Linux environmentIntermediate-Advanced
Understanding the Linux Kernel, Third EditionThe equivalent of Windows Internals for LinuxIntermediate-Advanced


Operating Systems Internals - Mac

Title Comments Technical Level
Mac OS X Internals: A Systems ApproachWindows Internals for MacIntermediate-Advanced
Mac OS X and iOS InternalsRead this after reading Mac OS X InternalsIntermediate-Advanced


Operating Systems Internals - Windows

Title Comments Skill Level
Windows InternalsRead this book if you want to understand WindowsIntermediate-Advanced
Windows System Programming (4th Edition)A step-by-step guide through the Windows APIIntermediate


Programming - Concepts and Algorithms

Title Comments Technical Level
Compilers: Principles, Techniques, and ToolsThe famous dragon book on compilersAdvanced - Don't read until you have a solid understanding of programming and runtime environments
Design PatternsRequired reading for any serious programmerIntermediate
Linkers and LoadersRequired reading for understanding program linking and runtime loadingIntermediate


Programming - Language Specific
Note: The reason there are few books here is due to languages having amazing learning resources online

Title Comments Technical Level
Advanced Programming in the UNIX(R) EnvironmentDeep exploration of programming related to Linux, Mac, and BSDBeginner-Intermediate
Black Hat PythonGreat book using Python for offensive security purposesBeginner-Intermediate
The C Programming Language, 2nd Edition"K and R" - required if you want to be proficient with CIntermediate-Advanced
Violent PythonLearn Python programming and directly apply it to forensics and securityBasic to advanced topics


Reverse Engineering

Title Comments Technical Level
Assembly Language Step-by-stepThe best resource to learn assembly. Later books focused on "high level" assembly as opposed to actual instructionsIntermediate-Advanced
Hacker Disassembling UncoveredA great resource for advanced topics in reverse engineeringIntermediate-Advanced
Hacking the XboxA well written and fun book from which to learn reversingIntermediate
The IDA Pro BookThe best resource to learn IDAIntermediate
Reversing: Secrets of Reverse EngineeringOne of my favorite books. A chapter is dedicated to reversing a Windows API back to C so perfectly that compiling it matches the hash of the Windows DLLIntermediate-Advanced
Practical Reverse EngineeringReversing across Intel and ARMIntermediate


Tradecraft - Digital

Title Comments Technical Level
Silence on the Wirelcamtuf's exploration of vulnerabilities and attacks that most people would never think of. Strongly recommendedBeginner-Advanced


Tradecraft - Traditional
Note: I originally found several of these books from The Grugq's list

Title Comments Technical Level
Agent StormReal life story of a European convert who joined Al Qaeda while working for the CIAAccessible to all
The Art of IntelligenceTradecraft and real-world analysis from Henry CrumptonBeginner-Intermediate
Black BannersDeep coverage of FBI tradecraft while investing the USS Cole bombings, 9/11, and other events in the Middle EastAccessible to all
Chinese Intelligence OperationsA well-written, deep study of Chinese intelligence servicesAdvanced
The Main EnemyAn incredibly detailed history of the CIA vs the KGB during the Cold WarAccessible to All
See No EvilTradecraft and lessons from a former CIA analyst in the Middle EastIntermediate
Spy Handler: Memoir of a KGB OfficerWritten by the KGB officer whom handled Robert Hanssen and Aldrich Ames. A great text to learn real world tactics and techniquesBeginner-Intermediate
Terrorism and Counterintelligence: How Terrorist Groups Elude DetectionA deep examination of modern terrorist groups and counterintelligence useIntermediate
Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence OfficerRead this first - a textbook on how to be a counter intel officer along with terms, techniques, and tacticsBeginner - make this your first book
Logo

瓜分20万奖金 获得内推名额 丰厚实物奖励 易参与易上手

更多推荐