Malware Analysis
Book |
Description |
The Art of Computer Virus Research and Defense by Peter Szor |
An encyclopedia and historical look at malware. Szor discusses classifications, behaviors, and analysis of malware. Ultimately providing you insight into how experts at AV companies look at computer viruses. I enjoyed the read and trip through time. It is amazing that many of the techniques are still used today. If you are interested in the subject of malware analysis, add this to your reading list. |
Self-Improvement
Book |
Description |
essentialism by Greg McKeown |
If you find that you just don't have enough time to accomplish your goals or feel overwhelmed by your day, this book will give you perspective. McKeown discusses how we spend so much time on pointless activities, and neglect the things that are truly important. This is one of my favorite books of this year. |
Other Blog's Recommended Reading
Site |
Description |
Book recommendations across pretty much every subject related to cyber security. |
My "To Read" List
Book |
Author |
Red Team Field Manual |
Ben Clark |
Coding For Penetration Testers |
Jason Andress and Ryan Linn |
The Browser Hacker's Handbook |
Wade Alcom, Christian Frichot, et al. |
Metasploit: The Penetration Tester's Guide |
Dave Kennedy |
The Shellcoder's Handbook |
Chris Anley, John Heasman, et al. |
Nmap Network Scanning |
Gordon Fyodor Lyon |
Red Team: How to Succeed By Thinking Like The Enemy |
Micha Zenko, Christopher Lane, et al. |
Social Engineering: The Art of Human Hacking |
Christopher Hadnagy |
Unix Shell Programming |
Stephen G. Kochan and Patrick Wood |
Classic Shell Scripting |
Arnold Robbins and Nelson H.F. Beebe |
Unauthorized Access: Physical Penetration Testing |
Wil Allsopp and Kevin Mitnick |