Recommended Reading - This contains a "live" list of recommended/curated books to read or have as part of a library with links to obtain the books. The list is updated as new recommendations are made.
-
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
-
The Linux Command Line, 2nd Edition: A Complete Introduction
-
Efficient Linux at the Command Line: Boost Your Command-Line Skills
-
Linux Administration: The Linux Operating System and Command Line Guide for Linux Administrators
-
Network Security with pfSense: Architect, deploy, and operate enterprise-grade firewalls
-
Simplifying Regular Expression Using Python: Learn RegEx Like Never Before
-
Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters
-
Mastering Python: Write powerful and efficient code using the full range of Python's capabilities
-
The Python Workshop: Write Python code to solve challenging real-world problems
-
Applied Computational Thinking with Python: Algorithm design for complex real-world problems
-
Open Source Projects - Beyond Code: A blueprint for scalable and sustainable open source projects
-
Hands-On Data Structures and Algorithms with Python, Third Edition
-
Learn Python Programming: An in-depth introduction to the fundamentals of Python
-
Clean Code in Python: Develop maintainable and efficient code
-
Software Architecture for Busy Developers: Talk and act like a software architect in one weekend
-
Python GUI Programming with Tkinter: Design and build functional and user-friendly GUI applications
-
Applied Cryptography: Protocols, Algorithms and Source Code in C
-
Computer Security Handbook, Set (Volume 1 and 2) 6th Edition
-
The Official (ISC)2 CISSP CBK Reference (Cissp: Certified Information Systems Security Professional)
-
Cryptography And Network Security: Principles and Practices 4th Edition
-
OSINT Techniques: Resources for Uncovering Online Information
-
Security Engineering: A Guide to Building Dependable Distributed Systems 3rd Edition
-
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities
-
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
-
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
-
zseano's methodology - Identifying security vulnerabilities in web applications
-
The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity
-
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
-
Nmap Network Exploration and Security Auditing Cookbook - Third Edition
-
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
-
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
-
Hacking APIs: Breaking Web Application Programming Interfaces
-
The Pentester BluePrint: Starting a Career as an Ethical Hacker
-
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems
-
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation