InfoSec Book Recommendations for Students
 Share
The version of the browser you are using is no longer supported. Please upgrade to a supported browser.Dismiss

View only
 
ABCDEFGHIJKLMNOPQRSTUVWX
1
Which option most accurately describes your title?What are your favorite infosec books that you would recommend to students?
2
Security ManagerTwo of Network security monitoring
3
Security ArchitectStoll - Cuckoo's Egg
4
Security Engineergray hat hacking, jacquith's metrics books
5
Security EngineerHacking: the art of exploitation (Erickson), The Art of Deception (Mitnick), Secrets and Lies (Schneier)
6
Security EngineerRed Team Field Manual
7
Security ManagerI would actually recommend podcasts such as Risky Business, Paul's Security Weekly, SANS daily update etc.
8
Security ArchitectThe Web Application Hackers Handbook , Metasploit the Penetration Testers Guide, Practical Packet Analysis
9
Director of InfosecThe Cuckoo's Egg
10
Security AnalystAnything that teaches scripting skills that match the environment they want to be in. Learn PowerShell in a Month of Lunches for Windows environments.
11
Security EngineerPhoenix project
12
Security ManagerCliff stoll’s “the cuckoo’s egg”. Many of the Bruce Schneier books.
13
Security EngineerSANS material. Counterhack. Hacker playbook.
14
Security AnalystToo many good books to list, but rather than books, ideally they'd have read a bunch of reports/papers related to real world attacks / threat actors.
15
Security AnalystJosh Pauli's web application security book; Patrick Engebretson's pen testing book; review humble bundle offerings, review free packt pub offerings, a current day version of Ed Skoudis' counter have reloaded.
16
Security AnalystRTFM/BTFM
17
Security ManagerMitnick, The Art of Intrusion
18
Security EngineerCrypto by Stephan Levy; Hacking Exposed series; Bulletproof SSL and TLS; Violent Python, Practical Malware Analysis, Red Team Field Manual (RTFM)
19
Security EngineerWeb Application Hacker's Handbook
20
Security ManagerThe Phoenix Project
21
Director of InfosecDepends on the kid and interest.
22
Security EngineerI'd focus on core concepts books early on or other highly rated books as they get more specific.
23
Security Managerhttps://www.amazon.com/Mastering-Windows-Network-Forensics-Investigation/dp/1118163826
24
Security AnalystRed Team Field Manual, Blue Team Field Manual, Practical Packet Analysis, The Practice of Network System Monitoring
25
Security ManagerCountdown to Zero Day - The mix of thriller and technical concepts appeals and allows a self-evaluation on motives and interests.
26
Security EngineerThis one is probably a little off base, but Exploding the phone by Phil Lapseley. There are many parallels with the security issues with the telephone network back in the day and computers now. Also shows core security concepts remain relatively stable even when technology changes.
27
Security EngineerThwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer and Social Engineering: The Art of Human Hacking
28
CISOSocial Engineering, The Art of Human Hacking Getting Things Done Brag - The Art of Tooting Your Own Horn Without Blowing It Selling the Invisible TCP/IP Illustrated Learn Python The Hard Way
29
Security Architecttoo many to say one. let's say cuckoo's egg but larger inspiration https://cybercanon.paloaltonetworks.com/
30
Security ArchitectThe Cuckoo’s Egg
31
Security AnalystRed Team, Micah Zenko
32
Security EngineerNon-technical: The Cuckoo's Egg, Art of Deception, We Are Anonymous, Kingpin, Spam Nation, Future Crimes. Technical: Network Security Bible (Cole), Network Intrusion Detection (Novak), Security Engineering (Anderson), Practice of Network Security Monitoring (Bejtlich), Shellcoders Handbook (Koziol), Penetration Testing (Weidman), Intrusion Detection with Snort (Koziol) - recommend getting on threat feeds though, ie, US CERT, SANS Internet Storm Center.
33
Security Engineerpractical nsm; rtfm;badminton; palo alto cyber cannon.
34
Director of InfosecThe Art of War, Making Small Talk, How to Win Friends and Influence People
35
Security Analystsubscribe to Safaribooksonline
36
Security ManagerWeb App Hackers Handbook, Shell Coders Handbook, Red Team Field Manual, Blue Team Handbook, Getting Things Done, 7 Habits of Highly Effective People, The Go Giver.
37
CISOAny of sever O’Reilley titles
38
Penetration TesterRisky Business podcast
39
Security AnalystThe SANS Institute quick reference guides.
40
Security EngineerRed/Blue team field manuals
41
Security ManagerThe Practice of Network Security, Practical Network Security
42
Security AnalystPractical Packet Analysis by Chris Sanders
43
Security ArchitectMetasploit: The Penetration Tester's Guide, Red Team Field Manual, Blue Team Field Manual
44
Security AnalystThere are 100's and it depends on what field they get into. Network Forensics
45
Security ManagerThe tangled web
46
Security Engineertcp/ip illustrated, stevens counterhack-ed skoudis art of deception-mitnick
47
Security AnalystSchneier on Security Bruce Schneier: the big picture
48
Security ArchitectCCNA Portable Command Guide
49
Director of InfosecI like to think more in present days, where we can find a lot of available (also legal) information in the internet. So I would like to recommend "cybrary.it" as it is a great place to start and also to go deeper in many infosec skills.
50
Penetration TesterThe Tangled Web, black hat python, secrets and lies, liars and outliers, practical malware analysis, hacking the art of exploitation.
51
Penetration TesterThe Web Application Hacker's Handbook, Penetration Testing (Georgia Weidman), Principles (Ray Dalio, Self-Management), excerpts from The Best of 2600 (historical purposes), any other computing or security book that catches their eye.
52
Security AnalystApplied Cryptography by Schneier, File System Forensic Analysis by Carrier
53
Security EngineerNot text book but The Cuckoo's Egg by Clifford Stoll is worth a read as is "Kingpin" by Kevin Poulsen, Practical Reverse Engineering, The Hacker's Playbook, Ghost in the Wires for the social engineering aspect.
54
Security AnalystThe Basics of Digital Forensics (Sammons), Windows Forensic Analysis Toolkit (Carvey), Windows Registry Forensics (Carvey), Gray Hat Python (Seitz), Practical Malware Analysis (Sikorski, Honig)
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
Loading...