Information Security Books
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide by Mike Chapple, et.al.
-
11 Strategies of a World-Class Cybersecurity Operations Center by Kathryn Knerler, et. al.
-
A Data-Driven Computer Defense by Roger A. Grimes
-
Blue Team Field Manual by Alan J. White and Ben Clark
-
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative AI Recipes to Supercharge Your Cybersecurity Skills by Clint Bodungen
-
CISO Evolution by Matthew Sharp
-
Cybersecurity Incident Management Master's Guide: Volume 1 – Preparation, Threat Response, & Post-Incident Activity by Colby Clark
-
Cybersecurity Leadership by Mansur Hasib
-
Effective Threat Investigation for SOC Analysts by Mosafa Yahia
-
Introducing Regular Expressions by Michael Fitzgerald
-
Learn PowerShell in a Month of Lunches by James Petty, et. al.
-
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali by OccupytheWeb
-
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning by Gordon "Fyodor" Lyon
-
OSINT Techniques: Resources for Uncovering Online Information by Michael Bazzell
-
Rethinking Infosec by Greg van der Gaast
-
Social Engineering: The Science of Human Hacking by Chris Hadnagy
-
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes by Dawn Capelli
-
The Cuckoo's Egg by Cliff Stoll
-
The Definitive Guide to KQL: Using Kusto Query Language for Operations, Defending, and Threat Hunting by Mark Morowczynski, et. al
-
Threat Modeling: Designing for Security by Adam Shostack
-
Windows Internals: System Architecture, Processes, Threads, Memory Management, and More, Part 1 by Pavel Yosifovich, Mark E. Russinovich, et. al.
-
Preventing Ransomware by Abhijit Mohanta
-
Defensive Security Handbook by Amanda Berlin and Lee Brotherston
-
Incident Response for Windows by Anatoly Tykushin
-
Microsoft Security Copilot by Bi Yue Xu
-
CISO Desk Reference Guide, Volume 2 by Bill Bonney, Gary Haslip and Matt Stamper
-
The Foundations of Threat Hunting by Chad Maurice, Jeremy Thompson and William Copeland
-
Automating Security Detection Engineering by Dennis Chow
-
Cybersecurity Leadership Demystified by Dr. Erdal Ozkaya
-
Practical Cyber Threat Intelligence: Gather, Process, and Anlyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices
-
Mastering Cyber Intelligence by Jean Nestor and M. Dahj
-
Crafting the InfoSec Playbook by Jeff Bollinger, Brandon Enright & Matthew Valites
-
Operationalizing Threat Intelligence by Joseph Opacki and Kyle Wilhoit
-
Cybersecurity Blue Team Strategies by Kunal Sehgal and Nikolaos Thymianis
-
Intelligence-Driven Incident Response by Rebekah Brown & Scott J. Roberts
-
Microsoft Sentinel in Action, Second Edition by Richard Diver, Gary Bushey & John Perkins
-
Cyber Intelligence-Driven Risk: How to Build and Use Cyber Intelligence for Business Risk Decisions by Richard O. Moore, III
-
Cybersecurity Tabletop Exercises – From Planning to Execution by Robert Lelewski and John Hollenberger
-
Incident Response with Threat Intelligence by Roberto Martinez
-
The Phantom CISO by Mishaal Khan
-
Visual Threat Intelligence by Thomas Roccia
Affordable Information Security Training
Information Security Books
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide by Mike Chapple, et.al.
-
11 Strategies of a World-Class Cybersecurity Operations Center by Kathryn Knerler, et. al.
-
A Data-Driven Computer Defense by Roger A. Grimes
-
Blue Team Field Manual by Alan J. White and Ben Clark
-
ChatGPT for Cybersecurity Cookbook: Learn Practical Generative AI Recipes to Supercharge Your Cybersecurity Skills by Clint Bodungen
-
CISO Evolution by Matthew Sharp
-
Cybersecurity Incident Management Master's Guide: Volume 1 – Preparation, Threat Response, & Post-Incident Activity by Colby Clark
-
Cybersecurity Leadership by Mansur Hasib
-
Effective Threat Investigation for SOC Analysts by Mosafa Yahia
-
Introducing Regular Expressions by Michael Fitzgerald
-
Learn PowerShell in a Month of Lunches by James Petty, et. al.
-
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali by OccupytheWeb
-
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning by Gordon "Fyodor" Lyon
-
OSINT Techniques: Resources for Uncovering Online Information by Michael Bazzell
-
Rethinking Infosec by Greg van der Gaast
-
Social Engineering: The Science of Human Hacking by Chris Hadnagy
-
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes by Dawn Capelli
-
The Cuckoo's Egg by Cliff Stoll
-
The Definitive Guide to KQL: Using Kusto Query Language for Operations, Defending, and Threat Hunting by Mark Morowczynski, et. al
-
Threat Modeling: Designing for Security by Adam Shostack
-
Windows Internals: System Architecture, Processes, Threads, Memory Management, and More, Part 1 by Pavel Yosifovich, Mark E. Russinovich, et. al.
-
Preventing Ransomware by Abhijit Mohanta
-
Defensive Security Handbook by Amanda Berlin and Lee Brotherston
-
Incident Response for Windows by Anatoly Tykushin
-
Microsoft Security Copilot by Bi Yue Xu
-
CISO Desk Reference Guide, Volume 2 by Bill Bonney, Gary Haslip and Matt Stamper
-
The Foundations of Threat Hunting by Chad Maurice, Jeremy Thompson and William Copeland
-
Automating Security Detection Engineering by Dennis Chow
-
Cybersecurity Leadership Demystified by Dr. Erdal Ozkaya
-
Practical Cyber Threat Intelligence: Gather, Process, and Anlyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices
-
Mastering Cyber Intelligence by Jean Nestor and M. Dahj
-
Crafting the InfoSec Playbook by Jeff Bollinger, Brandon Enright & Matthew Valites
-
Operationalizing Threat Intelligence by Joseph Opacki and Kyle Wilhoit
-
Cybersecurity Blue Team Strategies by Kunal Sehgal and Nikolaos Thymianis
-
Intelligence-Driven Incident Response by Rebekah Brown & Scott J. Roberts
-
Microsoft Sentinel in Action, Second Edition by Richard Diver, Gary Bushey & John Perkins
-
Cyber Intelligence-Driven Risk: How to Build and Use Cyber Intelligence for Business Risk Decisions by Richard O. Moore, III
-
Cybersecurity Tabletop Exercises – From Planning to Execution by Robert Lelewski and John Hollenberger
-
Incident Response with Threat Intelligence by Roberto Martinez
-
The Phantom CISO by Mishaal Khan
-
Visual Threat Intelligence by Thomas Roccia
