Top 7 cybersecurity books for ethical hackers in 2020 - Security Boulevard

Top 7 cybersecurity books for ethical hackers in 2020

Top ethical hacking books for 2020

Ethical hacking is a huge field with a number of different specializations within it. Since ethical hackers are expected to perform an assessment of the security of an organization’s complete network environment, a number of books exist that provide extremely in-depth descriptions of how to hack into a particular type of target or perform specialized activities (like reverse engineering or cryptanalysis).

This list is focused on some of the best books for the ethical hacking generalist. Preference was given to books that provide a solid overview of ethical hacking or that focus on common targets (like web applications).

1. “Ghost in the Wires” by Kevin Mitnick and William L. Simon

“Ghost in the Wires” by Kevin Mitnick is a great book to read if you want to get into the “why” of ethical hacking. Mitnick is one of the most successful social engineers in history and his story of the cat-and-mouse game of his exploits is an extremely engaging one. Social engineering is one of the most effective techniques in an ethical hacker’s toolkit and Mitnick is a master of it.

“Ghost in the Wires” is not the book that will teach you how to hack into a computer or extract user credentials from Active Directory. What it will do is provide an entertaining entry into the world of ethical hacking and useful tricks and case studies for future social engineering engagements.

2. “The 24 Deadly Sins of Software Engineering” by David LeBlanc, Michael Howard and John Viega

“The 24 Deadly Sins of Software Engineering” by Michael Howard, David LeBlanc and John Viega is a foundational book for ethical hackers. This book takes a look at the most common mistakes that developers make that open up their applications to potential exploitation. The book includes (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Howard Poston. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/WmSbNjCR1lk/