Hacker Book List

"Information Security Standards and Laws and Regulations (Second Edition)" (Note: Wuhan University Press)

"HTTP Authoritative Guide"

"HTML5 Authority Guide"

"JavaScript Definitive Guide (6th Edition)"

"TCP/IP Detailed Volume 1: Protocol"

"SQL Programming Fundamentals (Original Book 3rd Edition)"

"PHP and MySQL Web Development (Fourth Edition)"

"PHP Security Fundamentals"

"PHP Application Security Programming"

"Advanced PHP Application Vulnerability Audit Technology"

"Mastering Regular Expressions (3rd Edition)"

"Regular Guidelines"

"Niaoge's Linux Private Kitchen Basic Learning (Third Edition)"

"Linux Shell Script Guide"

"C Primer Plus (6th Edition) Chinese Version"

"Data Structure (C Language Edition)" (Note: Machinery Industry Press)

"Compiling Principles: Principles, Techniques and Tools" (Note: Machinery Industry Press)

"C++ Primer Plus (6th Edition) Chinese Version"

"Python Core Programming (Second Edition)"

"Python Black Hat: Hacking and Penetration Testing Programming"

"Python stunt: use Python to become a top hacker"

"Proficient in Hacker Script"

"Analysis and Defense of XSS Cross-site Scripting Attacks"

"XSS Filter Evasion Cheat Sheet Chinese Version"

"Robust Defenses for Cross-Site Request Forgery Chinese Translation"

"SQL Injection Attack and Defense (Second Edition)"

"SQL Injection Self-study Guide"

"Upload Attack Framework"

"Upload verification bypass"

"In-Depth Analysis of Web Security"

"Web Dilemma: A Guide to Modern Web Application Security"

"The Definitive Guide to Web Application Security"

"White Hat Talks about Web Security"

"White Hat Talks about Browser Security"

"Web Security Test"

"Web Application Security Threats and Prevention"

"Web Application Security Manual"

"The Secret of Web Front End Hacking Technology"

"Road to Security-Web Penetration Technology and Actual Case Analysis-2nd Edition"

"The Hacker Attack and Defense Technology Collection: Web Actual Combat"

"The Hacker Attack and Defense Technology Collection: Browser Actual Combat"

"Hacker Exposure: Cyber ​​Security Secrets and Solutions (7th Edition)"

"Code Audit: Enterprise-level Web Code Security Architecture"

"The Art of Kali Linux Penetration Testing"

"Kali Linux Penetration Testing in Action"

"Detailed Explanation of Kali Linux Penetration Testing Technology"

"Kali Linux Advanced Penetration Test"

"Web Penetration Testing: Using Kali Linux"


"Kali Linux & BackTrack Penetration Test Actual Combat"

"Metasploit Penetration Testing Guide"

"Metasploit Penetration Testing Devil Training Camp"

"Wireshark packet analysis combat (2nd edition)"

"Penetration Testing Guide: Tools and Methods You Must Know"

"The Secret of Network Scanning Technology: Principle, Practice and Realization of Scanner"

"Data Driven Security: Data Security Analysis, Visualization and Dashboard"

"Hacker Exposure: Wireless Network Security (Original Book 3rd Edition)"

"SRE: Google Operation and Maintenance Decryption"

"Enterprise Linux Security Operation and Maintenance Concept and Actual Combat"

"The Definitive Guide to Log Management and Analysis"

"Linux Server Security Policy Detailed Explanation"

"Linux Security Intrusion Prevention Detection and Recovery"

"Linux Firewall (Third Edition of the Original Book)"

"Network Security Monitoring Actual Combat: Deep Understanding of Incident Detection and Response"

"Advanced Guide to Internet Enterprise Security"

A collection of online penetration testing resources compiled abroad


0x02 expansion
 

"Hacker Tracking: Core Principles and Practice of Network Forensics"

"Gray Hat Hackers: Ethics, Penetration Testing, Attack Methods and Vulnerability Analysis Techniques for Justice Hackers"

"In-depth understanding of computer systems (2nd edition of the original book)"

"Computer Network (5th Edition)" (Note: Tsinghua University Press)

"Social Engineering: Human Hole in the Security System"

"The Art of Anti-deception"

"The Art of Anti-Invasion"

"TCP/IP Detailed Explanation·Volume 2: Implementation"

"Illustrated Cryptography 3rd Edition"

"Applied Cryptography: Protocols, Algorithms and C Source Programs (Original Book 2nd Edition)"

"Revelation of Network Analysis Technology: In-depth Analysis of Principles, Practice and WinPcap"

"Network Penetration Technology"

"Shellcoder Programming Secret"

"Network Security Monitoring: Collection, Detection and Analysis"

"Hacker Free Attack and Defense"

"Java Programming Thought (4th Edition)"

"Java Security (Second Edition)"

"Static Analysis of Safe Programming Code"

"Python Grey Hat-The Way of Python Programming for Hackers and Reverse Engineers"

"Electronic Data Forensics" (Note: Tsinghua University Press)

"Data Hiding Technology Revealed: Cracking Secret Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols"

"Data Driven Security: Data Security Analysis, Visualization and Dashboards"

"Threat Modeling: Design and Deliver Safer Software"

"Safety Model Best Practices"

"Introduction to Algorithms (2nd Edition of the Original Book)"

"The Way to Clean Code"

"Programmer's self-cultivation: link, load and library"

"Programmer's Roar"

Guess you like

Origin blog.csdn.net/qq513036862/article/details/86685708