18 Books on Hacking for $30! (5-9)
Photo by Annie Spratt on Unsplash

18 Books on Hacking for $30! (5-9)

This series of posts reviews each title in a 18-for-$30 Humble bundle on Hacking. I already covered the first four books. The rummage continues: here come the next five!


"Crypto Dictionary" is quite a bit more fun than reading a phone book (heh, remember those?), but I had to think hard about what the target audience would be. The best idea I came up with: perhaps the dictionary has a place in the lobby of a tech VC firm, where founders waiting to make their blockchain pitch can casually browse and look up terms they are not familiar with.

"Cyberjutsu" takes published sources about the tactics, techniques, and procedures (TTPs) used by ninja in feudal Japan and applies them to modern cybersecurity (with handy mappings to NIST SP 800-53). From building [network] maps and identifying and guarding weak spots, to insider threats and covert channels, it is intriguing how warfare principles documented in the middle ages are still relevant today with an appropriate interpretation. This is a general interest title that folks with some IT background will find very readable: if you are familiar with the technical (non-security) context, the cybersecurity overlay will snap easily in place thanks to each included concept's rooting in ninja lore, while the specific mappings to NIST controls will give you a starting point to build on.

"The Art of Cyberwarfare" details major cyber exploits from the last two decades or so, with a focus on those driven or sponsored by nation-states as well as major criminal organizations. It is an enjoyable and engaging narrative which, in the second part, evolves into a discussion of actual techniques and culminates into a hypothetical case study. Most of the techniques discussed revolve around email exploitation and C&C channels: don't expect the book to be a complete and deep guide into the discipline, but rather a good reference on the evolution and current state of high-profile cyberwarfare, combined with sufficient coverage of technical aspects to get you started on analyzing actual incidents from forensic data including email headers, domain registrations, and malware samples.

"Ethical Hacking" intends to take beginners through a crash course in hacking, and my assessment is that it succeeds in accomplishing that, at least on some level: it covers good ground in terms of the variety of tools available to a hacker, but assumes some fundamental knowledge from the reader while investing a fair number of pages on relatively trivial matters. For example, the section on root kits in the second half of the book switches to the C language abruptly and uses it for an example kernel module implementation; this is the kind of approach that can make a budding hacker dangerous to themselves and not necessarily effective. In summary, the book offered me a couple of interesting pointers to tools that I'd like to read more about and experiment with (e.g. Maltego, DSE frameworks), but if you are a novice, avoid simply following the recipes and make sure you take the time to understand what you don't know, before and after working through this book: if you got the bundle, I'd recommend "Hacking: The Art of Exploitation" as your first book; read "Ethical Hacking" afterwards.

??"Designing Secure Software" targets software engineers without background in security as its ideal audience, even though I found several useful bits in it too: notably the diagram of secure software patterns (Figure 4-1) or chapters 6 and 7, which can help guide security teams in their interactions with stakeholders. This is the kind of book that I could see fitting well in our office Product Security library at Zoox ; it can easily be the first part in a reading sequence, with Adam Shostack's "Threat Modeling: Designing for Security" as a more specialized follow-up.


This post concludes the general hacking and security titles in the bundle. The next installment (UPDATE: now live as part 3) will be about area-specific texts: on Web Application Security, IoT, Car Hacking, API hacking and so on.

Jiten Patel

Senior Principle Cybersecurity Engineer at Aptiv

2 年

Thanks Hristo for sharing summary of these books. I was searching some good books on Cybersecurity and your summary helps me to pick some from this list.

要查看或添加评论,请登录

Hristo Bojinov的更多文章

  • Normalcy and Tech Management

    Normalcy and Tech Management

    The inspiration for this came from Chapter 26 in "The Myth of Normal" which resonated with my work experience (as a…

    4 条评论
  • Pricing Education: A Worksheet

    Pricing Education: A Worksheet

    Not too many years ago, someone respectable described to me K-12 education in the United States as "glorified daycare"…

    2 条评论
  • Afterthoughts on Cybersecurity

    Afterthoughts on Cybersecurity

    I think a lot about computer security concepts and practice, and this one thought track has been recurring, practically…

    1 条评论
  • Computer Science Courses You Missed (Part 6: Career Calculus)

    Computer Science Courses You Missed (Part 6: Career Calculus)

    The typical college curriculum does not cover what a career in software looks like in general, and neither does it…

    2 条评论
  • Computer Science Courses You Missed (Part 5: Writing)

    Computer Science Courses You Missed (Part 5: Writing)

    Why does writing merit a mention in this sequence on Computer Science? I hope you will find the answer in at least one…

  • Computer Science Courses You Missed (Part 4: Mastery)

    Computer Science Courses You Missed (Part 4: Mastery)

    After three sections on core Computer Science subject matter (1, 2, 3), we switch to meta-topics: first up is the…

  • Computer Science Courses You Missed (Part 3: Complexity & Computation)

    Computer Science Courses You Missed (Part 3: Complexity & Computation)

    This is Part 3 of a sequence (Part 1 and Part 2 are relevant, though they are not prerequisites). Here, I explain why…

    1 条评论
  • 18 Books on Hacking for $30! (10-18)

    18 Books on Hacking for $30! (10-18)

    In this final installment (see also part 1 and part 2) I review the domain-specific titles in the bundle and compare my…

  • 18 Books on Hacking for $30! (1-4)

    18 Books on Hacking for $30! (1-4)

    A colleague recently pointed out this Humble book bundle which consists of 18 (that's right eighteen!) books about…

  • Computer Science Courses You Missed (Part 2: Algorithms)

    Computer Science Courses You Missed (Part 2: Algorithms)

    Knowing how to write solid code (the topic of Part 1 in this series) is only a small part of being a well-rounded…

    3 条评论

社区洞察

其他会员也浏览了