At OpSecX, we understand the importance of security education. We believe that books are great resources that provide detailed and in-depth knowledge on a topic and serves as a great reference material. If you are into books, then we recommend the following books in various security domains. These are some of the brilliant books handpicked by OpSecX and written by exceptional authors in the security industry.

Web Security Books This section contains books that covers web security, database security and browser security.

The Tangled Web - A Guide to Securing Modern Web Applications The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2nd Edition The Browser Hacker's Handbook A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security The Database Hacker's Handbook

Cryptography Books This section contains books that covers cryptography and it's application in Computer Security

Cryptography Engineering: Design Principles and Practical Applications Applied Cryptography 2nd Edition Serious Cryptography: A Practical Introduction to Modern Encryption Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

Mobile Security Books This section contains books that talks about Mobile Security covering Android and iOS security internals and application security.

Android Hacker's Handbook Android Security Internals: An In-Depth Guide to Android's Security Architecture The Mobile Application Hacker's Handbook iOS Hacker's Handbook iOS Application Security

Reverse Engineering & Malware Analysis This section contains books that covers Practical Reverse Engineering, Malware analysis, Advanced Memory Forensics and the tools used.

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation Practical Malware Analysis - The Hands-On Guide to Dissecting Malicious Software The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux and Mac Memory IDA Pro Book, 2nd Edition

Exploitation Books This section contains books that covers Fuzzing, System Internals, Windows & Linux Exploitation and Assembly Language.

Fuzzing: Brute Force Vulnerability Discovery The Shellcoders Handbook Gray Hat Hacking The Ethical Hackers Handbook, 5th Edition Writing Security Tools and Exploits Windows Internals, Part 1: System architecture, processes, threads, memory management, and more (7th Edition)

Security Engineering Books This section contains books that covers different programming languages like Python, Go etc. and their application in Security Engineering for scripting, tool development, and security automation. Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Black Hat Python Black Hat Go: Go Programming For Hackers and Pentesters Coding for Penetration Testers: Building Better Tools

Penetration Testing & Network Security Books This section contains books that covers Network Security, Penetration testing and the tools used. Hacking: The Art of Exploitation 2nd Edition Metasploit: The Penetration Tester's Guide Advanced Penetration Testing: Hacking the World's Most Secure Networks Kali Linux Wireless Penetration Testing: Beginner's Guide Red Team Field Manual Blue Team Field Manual Practical Packet Analysis, 3rd Edition Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning Attacking Network Protocols

IoT/Hardware Hacking Books This section contains books that covers hardware and IoT Hacking.

The Hardware Hacker: Adventures in Making and Breaking Hardware Car Hacker's Handbook Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions Practical Internet of Things Security Introduction to Hardware Security and Trust

Social Engineering Books This section contains books that covers the art of Social Engineering. The Art of Deception: Controlling the Human Element of Security The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Ghost in the Wires Social Engineering: The Art of Human Hacking