HomebooksHumble Tech Book Bundle: Cybersecurity by Wiley

Humble Tech Book Bundle: Cybersecurity by Wiley

Humble Bundle

Tier 1

Price

$1.00

The Art of Deception: Controlling the Human Element of Security

The Art of Deception: Controlling the Human Element of Security

by Kevin D. Mitnick, William L. Simon

Nonfiction
Psychology
Technology
Hackers
3.8/5
7,247 ratings (Goodreads)
Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition

Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition

by Bruce Schneier

Nonfiction
Technology
Computers
Computer Science
3.9/5
1,796 ratings (Goodreads)
The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition

The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition

by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte

Hackers
Programming
Computer Science
Technology
4.2/5
332 ratings (Goodreads)
Threat Modeling: Designing for Security

Threat Modeling: Designing for Security

by Adam Shostack

Technology
Nonfiction
Programming
Computer Science
4.1/5
288 ratings (Goodreads)

Best Price

N/A

N/A

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World

by Marcus J. Carey, Jennifer Jin

Technology
Nonfiction
Hackers
Computer Science
3.9/5
263 ratings (Goodreads)
How I Rob Banks: And Other Such Places

How I Rob Banks: And Other Such Places

by FC Barker

Nonfiction
Audiobook
Technology
Hackers
3.9/5
177 ratings (Goodreads)
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

by Bruce Dang, Alexandre Gazet, Elias Bachaalany

Computer Science
Programming
Hackers
Technology
4.1/5
157 ratings (Goodreads)

Best Price

N/A

N/A

Tier 2

Price

$18.00

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

by Kevin D. Mitnick, William L. Simon

Nonfiction
Hackers
Technology
Computer Science
3.9/5
3,599 ratings (Goodreads)
Cryptography Engineering: Design Principles and Practical Applications

Cryptography Engineering: Design Principles and Practical Applications

by Niels Ferguson, Bruce Schneier, Tadayoshi Kohno

Computer Science
Programming
Technology
Nonfiction
4.2/5
407 ratings (Goodreads)
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Advanced Penetration Testing: Hacking the World's Most Secure Networks

by Wil Allsopp

Hackers
Technical
Programming
Technology
4.3/5
133 ratings (Goodreads)

Best Price

N/A

N/A

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

by Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters

Technology
Hackers
Computer Science
Technical
4.3/5
125 ratings (Goodreads)
The Language of Deception: Weaponizing Next Generation AI

The Language of Deception: Weaponizing Next Generation AI

by Justin Hutchens

Artificial Intelligence
Audiobook
4.0/5
33 ratings (Goodreads)

Best Price

N/A

N/A

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

by Jessey Bullock, Jeff T. Parker

Technology
Technical
Computers
Programming
3.8/5
28 ratings (Goodreads)

Best Price

N/A

N/A

Cybersecurity Blue Team Toolkit

Cybersecurity Blue Team Toolkit

by Nadean H. Tanner

4.0/5
3 ratings (Goodreads)

Tier 3

Price

$25.00

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2nd Edition

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2nd Edition

by Dafydd Stuttard, Marcus Pinto

Hackers
Programming
Technology
Computer Science
4.2/5
1,230 ratings (Goodreads)
Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition

Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition

by Ross Anderson

Computer Science
Technology
Nonfiction
Programming
4.2/5
703 ratings (Goodreads)
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

by Michael Hale Ligh, Steven Adair, Blake Hartstein, Matthew Richard

Technology
Hackers
Nonfiction
Technical
4.2/5
183 ratings (Goodreads)

Best Price

N/A

N/A

Unauthorised Access: Physical Penetration Testing For IT Security Teams

Unauthorised Access: Physical Penetration Testing For IT Security Teams

by Wil Allsopp

Nonfiction
Hackers
Technical
Computers
3.9/5
136 ratings (Goodreads)

Best Price

N/A

N/A

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

by Nick Furneaux

Technology
Computers
Hackers
Nonfiction
4.0/5
46 ratings (Goodreads)
Applied Incident Response

Applied Incident Response

by Steve Anson

4.3/5
27 ratings (Goodreads)
x86 Software Reverse-Engineering, Cracking, and Counter-Measures

x86 Software Reverse-Engineering, Cracking, and Counter-Measures

by Stephanie Domas, Christopher Domas

4.0/5
4 ratings (Goodreads)

Best Price

N/A

N/A