Abertay Ethical Hacking Society
  • Home
  • Information
    • Constitution
    • Change Logs
      • Website
      • Discord
      • Github
      • Server
    • Meetings
      • 2021-2022
    • Honourary Members
  • Contributing
    • Contributions
      • Using Git
      • Formatting and Best Practise
  • Society Events
    • Securi-Tay
      • History
  • Help Guides
    • Programming / Scripting
      • AWK
      • Bash Scripting
      • C Coding
      • Java Coding
      • LaTeX
      • Markdown
      • Project Ideas
      • Python Scripting
      • Tools
    • Software
      • Operating Systems
        • Installing Arch
        • Installing Kali
        • Linux Commands for Beginners
        • MacOS
      • Tools
        • PGP
          • A guide to using PGP on Android
          • A guide to using PGP on macOS
          • PGP
        • Radare2
        • Nmap
        • Regular Expressions
        • The Browser Exploitation Framework (BeEF)
        • Vim
        • Vimium
        • Zsh
    • Networking
      • Domain Name System (DNS)
      • Remote access to your Abertay network drive
      • Secure Shell (SSH)
      • TLS 1.3
      • Wireshark
      • Subnetting
    • Techniques
      • A guide to creating malicious macro-enabled Excel worksheets
      • Open Source Intelligence (OSINT)
      • Google-Fu
    • Jobs
      • Common Interview Questions
    • Home Lab
      • PiHole
  • Glossary
    • Infosec Terms
    • Computing Terms
    • Hardware Terms
    • General Terms
    • Development Terms
    • Networking Terms
  • Members
    • Profiles
      • AG
      • Isaac
      • Sam
  • Other
    • Other
      • Data Dumps
      • Meetups
      • Meltdown & Spectre
      • Movies
      • Project topic suggestions
      • Recommended Reading
Powered by GitBook
On this page
  • General Security
  • Web App Hacking
  • Mobile App Security
  • Python Programming
  • Java Programming
  • C Programming
  • Powershell
  • Malware Analysis/Reverse Engineering
  • Digital Forensics
  • Networking
  • Misc
  • Operating Systems
  • Linux
  • macOS & iOS

Was this helpful?

  1. Other
  2. Other

Recommended Reading

PreviousProject topic suggestions

Last updated 2 years ago

Was this helpful?

This page lists some good books recommended by current and past students for a variety of subjects related to the degree. Feel free to add books as you read them if they are relevant!

General Security

  • – Ben Clark (2014)

  • – Alan J White, Ben Clark (2017)

  • – Chris McNab (2016)

  • - John Erickson (2008)

  • - Peter Kim (2015)

  • - Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathon Ness, Branko Spasojevic, Ryan Linn, Stephen Sims (2015)

Web App Hacking

  • – Dafydd Stuttard, Marcus Pinto (2011)

  • - Justin Clarke-Salt (2012)

  • - Michal Zalewski (2011)

Mobile App Security

  • - Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse (2015)

  • - David Thiel (2016)

Python Programming

Java Programming

C Programming

Powershell

Malware Analysis/Reverse Engineering

Digital Forensics

Networking

  • Looking for recommendations for this section

Misc

Operating Systems

Linux

macOS & iOS

– Justin Seitz (2014)

- Zed A. Shaw (2013)

- T.J. O'Connor (2012)

– Carlton Egremont III (1999)

– Zed A. Shaw (2015)

- Brian W. Kernighan and Dennis Ritchie (1988)

- Peter Van Der Linden (1994)

- Donald W. Jones, Jeffrey D. Hicks (2017)

– Michael Sikorski, Andrew Honig (2012)

- Mark Dowd, John McDonald, Justin Schuh (2006)

- Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte (2007)

- Ryan O'Neill (2016)

- Chris Eagle, Kara Nance (2021)

- Ahmet Balci, Dan Ungureanu, Jaromír Vondruška (2020)

- Harlan Carvey (2012)

- Harlan Carvey (2014)

- Harlan Carvey (2011)

- Keif Morris (2016)

- Daniel Barrett (2016)

- William Shotts (2019)

- Brian Ward (2014)

- OccupyTheWeb (2018)

- Raphaël Hertzog, Mati Ahroni, Jim O'Gorman (2017)

- () (2017)

- () (2016)

Red Team Field Manual
Blue Team Field Manual
Network Security Assessment Third Edition
Hacking: The Art of Exploitation
The Hacker Playbook 2
Grey Hat Hacking (Fourth Edition)
Web App Hackers Handbook Second Edition
SQL Injection Attacks and Defense
The Tangled Web - A Guide to Securing Modern Web Applications
Mobile Hackers Handbook
iOS Application Security
Black Hat Python
Learn Python The Hard Way
Violent Python
Mr Bunny’s Big Cup o’ Java
Learn C The Hard Way
The C Programming Language
Deep C Secrets
Learn Windows Powershell in a Month of Lunches (Third Edition)
Practical Malware Analysis
Art of Software Security Assessment
The Shellcoders Handbook
Learning Linux Binary Analysis
The Ghidra Book
Malware Reverse Engineering Handbook
Windows Forensics Analysis Toolkit (Windows 7)
Windows Forensics Analysis Toolkit (Windows 8)
Windows Registry Forensics
Infrastructure as Code
There's an entire series of books 'Hacking Exposed' for a whole lot of topics, I'm too lazy to add them all manually
Linux Pocket Book
The Linux Command Line
How Linux Works
Linux Basics for Hackers
Kali Linux Revealed
MacOS and iOS Internals, Volume I - User Mode
Jonathan Levin
Amazon
MacOS and iOS Internals, Volume III: Security & Insecurity
Jonathan Levin
Amazon