- Justin Seitz, “Black Hat Python”: Python Programming For Hackers and Pentesters: This book covers basic Python programming in relation to ethical hacking. It also includes topics like networking, building exploits and custom tools.
- Antony Lewis’s “The Basics Of Bitcoins and Blockchains”: This book gives a thorough introduction to Bitcoin and blockchain technology. It also explains how they work and what their potential applications are in cybersecurity.
- Jon Erickson’s Hacking: The Art of Exploitation: This book explores the basic concepts of computer security, hacking, and includes topics like memory corruption, buffer overflows and writing exploits.
- Justin Seitz, “Gray Hat Python”: Python Programming For Hackers and Reverse Engineers: This book builds on the concepts in “Black Hat Python”, with a focus upon reverse engineering and exploit techniques.
- “The Web Application Hacker’s Handbook” by Marcus Pinto and Dafydd Stoutard: This book provides a complete guide for identifying and exploiting security flaws in web applications.
- Georgia Weidman’s “Penetration Testing”: This book offers a practical introduction into penetration testing. It includes case studies and hands-on exercises.
- “Metasploit unleashed” by Metasploit Team: This book provides a complete guide to the Metasploit framework. It includes its use for vulnerability assessment and exploitation as well as post-exploitation activities.
- Kevin Mitnick’s “Ghost in the Wires”: Kevin Mitnick’s autobiography, which tells the story of Kevin Mitnick (one of the most famous and infamous hackers ever). This book gives an insider’s view of hacking and its motivations.
- Chey Cobb’s “Cryptography For Dummies”: This book provides a basic guide to cryptography concepts, such as encryption, key management, and decryption.
- Kevin D. Mitnick, William L. Simon, and William L. Simon, “The Art of Intrusion: The Real Stories Behind Hackers, Intruders, and Deceivers”, is a book that tells real stories of hacks and intrusions. It also provides an analysis of the tactics and techniques used by attackers.