Skip to main content
skai@phnom-penh ~ zsh
$ initializing skai.tech v1.42.1
$ loading modules: [design, code, ai, cloud] ... done
$ compiling interface ......... done
$ deploying to production ...... done
> ready. launching SKAI
KevSKAI Cybersecurity Bookshelf

100+ Essential Books.
Every Key Insight in One Reference.

A comprehensive knowledge extraction from the most important books in cybersecurity. Organized by domain, designed for practitioners.

Explore
100+
Books Covered
17
Security Domains
500+
Key Concepts
1000+
Practical Takeaways

Part I: Hacker Stories & Culture

24 books

Ghost in the Wires

Kevin Mitnick & William L. Simon | 2011 | Autobiography

The autobiography of the world's most wanted hacker, proving that social engineering — not technical brilliance — is the most powerful attack vector.

The Art of Deception

Kevin Mitnick & William L. Simon | 2002 | Social Engineering

A systematic breakdown of how social engineers exploit human trust, with real-world attack scenarios and the organizational policies needed to defend against them.

The Art of Intrusion

Kevin Mitnick & William L. Simon | 2005 | Case Studies

True hacker stories told by the hackers themselves, revealing how real-world intrusions combine technical flaws with human error.

The Art of Invisibility

Kevin Mitnick & Robert Vamosi | 2017 | Privacy & OPSEC

A practical guide to digital privacy and anonymity from someone who spent years evading the FBI.

The Fugitive Game

Jonathan Littman | 1997 | Hacker Biography

A journalist's account of Kevin Mitnick's years as a fugitive, offering a more sympathetic and nuanced portrait than law enforcement's "dangerous hacker" narrative.

Takedown

Tsutomu Shimomura & John Markoff | 1996 | Hacker Pursuit

The story of how security researcher Tsutomu Shimomura tracked down Kevin Mitnick using network forensics and old-fashioned detective work.

The Mac Hacker's Handbook

Charlie Miller & Dino Dai Zovi | 2009 | macOS Security

A comprehensive guide to finding and exploiting vulnerabilities in macOS, written by two of the most accomplished Apple platform security researchers.

iOS Hacker's Handbook

Charlie Miller et al. | 2012 | Mobile Security

The definitive technical guide to iOS security architecture and exploitation, from the team that repeatedly won Pwn2Own by breaking iPhones.

A Bug Hunter's Diary

Tobias Klein | 2011 | Vulnerability Research

A step-by-step diary of real vulnerability discoveries across multiple platforms, showing the actual thought process behind finding and exploiting bugs.

Metasploit: The Penetration Tester's Guide

David Kennedy et al. | 2011 | Penetration Testing

The comprehensive guide to the world's most widely used penetration testing framework, from reconnaissance to post-exploitation.

The Hacker (Gary McKinnon)

Andrew Jones | 2008 | Hacker Biography

The story of Gary McKinnon, who hacked into 97 US military and NASA computers searching for UFO evidence, triggering the biggest military computer hack prosecution in history.

Kingpin

Kevin Poulsen | 2011 | Cybercrime

The rise and fall of Albert Gonzalez, who stole 170 million credit card numbers while simultaneously working as a Secret Service informant.

Fatal System Error

Joseph Menn | 2010 | Cybercrime

How organized cybercrime evolved from individual hackers to Russian and Eastern European criminal enterprises that operate with tacit government protection.

Hacker, Hoaxer, Whistleblower, Spy

Gabriella Coleman | 2014 | Hacktivism

An anthropologist's deep dive into Anonymous, exploring how a leaderless, chaotic collective became one of the most significant political forces of the digital age.

Julian Assange: The Unauthorised Autobiography

Julian Assange (ghostwritten) | 2011 | Autobiography

Assange's own account of his journey from Australian teenage hacker to WikiLeaks founder, published against his wishes.

WikiLeaks: Inside Julian Assange's War on Secrecy

David Leigh & Luke Harding | 2011 | Journalism / Cyber

Guardian journalists reveal the inside story of working with WikiLeaks on the Afghan and Iraq war logs and the diplomatic cables release.

Underground

Suelette Dreyfus & Julian Assange | 1997 | Hacker Culture

The untold story of the international hacking underground in the late 1980s and early 1990s, based on extensive interviews with the hackers themselves.

When Google Met WikiLeaks

Julian Assange | 2014 | Technology & Power

Assange's account of his meeting with Google's Eric Schmidt, arguing that Google is not merely a tech company but an extension of US foreign policy.

No Place to Hide

Glenn Greenwald | 2014 | Privacy / Surveillance

The journalist who broke the Snowden story reveals the full scope of NSA mass surveillance and its implications for democracy.

We Are Anonymous

Parmy Olson | 2012 | Hacktivism

The definitive journalistic account of Anonymous and LulzSec, tracing the movement from 4chan trolling to global hacktivism.

Epic Win for Anonymous

Cole Stryker | 2011 | Internet Culture

How 4chan's culture of anonymity, trolling, and meme creation spawned Anonymous and reshaped internet activism.

The Cuckoo's Egg

Cliff Stoll | 1989 | Hacker Tracking

An astronomer-turned-sysadmin tracks a 75-cent accounting discrepancy to a KGB-sponsored hacker, pioneering the field of computer forensics.

Hackers: Heroes of the Computer Revolution

Steven Levy | 1984 | Hacker Culture

The origin story of hacker culture from MIT's Tech Model Railroad Club through the personal computer revolution, defining the hacker ethic that shaped the industry.

Cult of the Dead Cow

Joseph Menn | 2019 | Hacker History

The untold story of the oldest and most influential hacking group in America, which invented hacktivism and helped create the concept of "information security" as a discipline.

Part II: Cryptography

6 books

Applied Cryptography

Bruce Schneier | 1996 | Cryptography

The encyclopedia of cryptographic algorithms and protocols that introduced an entire generation of engineers to the science of securing information.

Serious Cryptography

Jean-Philippe Aumasson | 2017 | Modern Cryptography

A practical guide to modern cryptography that focuses on the algorithms and protocols actually used in real-world systems.

Cryptography and Network Security

William Stallings | Updated regularly | Textbook

The standard academic textbook on cryptography, covering mathematical foundations, algorithms, protocols, and network security applications.

Crypto101

Laurens Van Houtven | Free Online | Crypto Intro

A free, accessible introduction to cryptography for programmers who need to understand and use crypto correctly without a math PhD.

Understanding Cryptography

Christof Paar & Jan Pelzl | 2009 | Cryptography

A clear, structured introduction to cryptography with worked examples that makes the mathematics accessible without dumbing it down.

Real-World Cryptography

David Wong | 2021 | Applied Crypto

How cryptography is actually used in modern systems — TLS, Signal, cryptocurrency, hardware security modules — with practical guidance for developers.

Bruce Schneier Collection

7 books

Secrets and Lies

Bruce Schneier | 2000 | Security Philosophy

Schneier's pivot from pure cryptography to systems thinking — arguing that security is a process, not a product.

Beyond Fear

Bruce Schneier | 2003 | Risk Analysis

A framework for thinking rationally about security in a post-9/11 world, cutting through fear to evaluate countermeasures objectively.

Schneier on Security

Bruce Schneier | 2008 | Security Commentary

A curated collection of Schneier's most insightful blog posts and essays on security, privacy, and technology policy.

Liars and Outliers

Bruce Schneier | 2012 | Trust & Society

An exploration of how society functions despite the constant presence of defectors, and why trust systems matter more than security technology.

Click Here to Kill Everybody

Bruce Schneier | 2018 | IoT Security / Policy

A warning that the Internet of Things is creating a world where computer security becomes everything-security, and a call for government regulation.

A Hacker's Mind

Bruce Schneier | 2023 | Systems Thinking

Hacking isn't just about computers — it's about finding and exploiting unintended loopholes in any system, from tax codes to financial markets to democracy itself.

Data and Goliath

Bruce Schneier | 2015 | Surveillance Economics

How both governments and corporations collect, analyze, and exploit our personal data — and why we should care.

Part III: Fundamentals

5 books

CompTIA Security+ Study Guide

Mike Chapple & David Seidl | Updated regularly | Certification

The standard reference for the Security+ certification, covering the breadth of cybersecurity fundamentals.

Security Engineering

Ross Anderson | 2001/2020 | Security Design

The most comprehensive book ever written on how to design, build, and maintain secure systems — covering everything from nuclear command-and-control to bank ATMs.

Computer Security: Principles and Practice

William Stallings & Lawrie Brown | Updated regularly | Textbook

The definitive academic textbook on computer security, providing rigorous coverage of principles, technologies, and standards.

Cybersecurity Essentials

Charles Brooks | 2018 | Fundamentals

A broad introduction to cybersecurity principles designed for students and career changers.

The Basics of Hacking and Penetration Testing

Patrick Engebretson | 2013 | Beginner Pentesting

A step-by-step introduction to penetration testing methodology using free, open-source tools, designed for absolute beginners.

Part IV: Penetration Testing & Ethical Hacking

10 books

The Web Application Hacker's Handbook

Dafydd Stuttard & Marcus Pinto | 2011 | Web Security

The bible of web application penetration testing, systematically covering every attack class from authentication to business logic.

Penetration Testing

Georgia Weidman | 2014 | Pentesting

A hands-on guide to penetration testing that walks through a complete engagement from start to finish.

Hacking: The Art of Exploitation

Jon Erickson | 2008 | Exploitation

A deep dive into the fundamentals of exploitation — from C programming to assembly to shellcode.

The Hacker Playbook 3

Peter Kim | 2018 | Red Team

A practical, playbook-style guide to penetration testing and red teaming with updated techniques for modern environments.

Bug Bounty Bootcamp

Vickie Li | 2021 | Bug Bounty

A comprehensive guide to finding web vulnerabilities and succeeding in bug bounty programs.

Real-World Bug Hunting

Peter Yaworski | 2019 | Bug Bounty

A collection of real-world bug bounty write-ups organized by vulnerability type.

Black Hat Python

Justin Seitz & Tim Arnold | 2021 | Offensive Python

Python recipes for penetration testers — network sniffers, web scrapers, trojans, and forensic tools built from scratch.

Black Hat Go

Tom Steele et al. | 2020 | Offensive Go

Building penetration testing tools in Go — leveraging concurrency, cross-compilation, and performance for offensive security.

Gray Hat Hacking

Allen Harper et al. | Updated regularly | Comprehensive Hacking

A comprehensive reference covering exploitation, reverse engineering, malware analysis, and penetration testing from an ethical hacking perspective.

Advanced Penetration Testing

Wil Allsopp | 2017 | Advanced Pentesting

Techniques for simulating sophisticated threat actors — combining cyber, physical, and social attack vectors.

Part V: Network Security

5 books

Network Security Assessment

Chris McNab | 2016 | Network Testing

A systematic methodology for assessing the security of network infrastructure.

Nmap Network Scanning

Gordon "Fyodor" Lyon | 2009 | Network Scanning

The definitive guide to Nmap, written by its creator.

The Practice of Network Security Monitoring

Richard Bejtlich | 2013 | Network Defense

How to build and operate a network security monitoring program that detects intrusions by collecting, analyzing, and escalating network evidence.

Attacking Network Protocols

James Forshaw | 2017 | Protocol Analysis

A deep dive into finding and exploiting vulnerabilities in network protocols through traffic capture, reverse engineering, and fuzzing.

Network Security Through Data Analysis

Michael Collins | 2014 | Network Analytics

Using data analysis and visualization techniques to detect threats and understand network behavior.

Part VI: Web Application Security

5 books

Web Security for Developers

Malcolm McDonald | 2020 | Web Security

A practical introduction to web security for developers who need to build secure applications.

The Tangled Web

Michal Zalewski | 2011 | Browser Security

A deep technical exploration of the browser security model — its assumptions, contradictions, and vulnerabilities.

OWASP Testing Guide

OWASP Foundation | Updated regularly | Methodology

The open-source standard methodology for web application security testing.

Web Application Security

Andrew Hoffman | 2020 | Web Security

A modern guide covering both offensive and defensive approaches for today's web stack.

API Security in Action

Neil Madden | 2020 | API Security

A comprehensive guide to securing APIs — covering authentication, authorization, rate limiting, and encryption.

Part VII: Reverse Engineering & Malware Analysis

7 books

Practical Malware Analysis

Michael Sikorski & Andrew Honig | 2012 | Malware Analysis

The definitive hands-on guide to analyzing malicious software, from static analysis to advanced anti-analysis technique defeat.

Reversing: Secrets of Reverse Engineering

Eldad Eilam | 2005 | Reverse Engineering

A comprehensive introduction to reverse engineering software without source code.

The IDA Pro Book

Chris Eagle | 2011 | Disassembly

The comprehensive guide to IDA Pro — the industry-standard disassembler used by reverse engineers worldwide.

The Art of Memory Forensics

Ligh, Case, Levy & Walters | 2014 | Memory Forensics

The definitive guide to analyzing volatile memory (RAM) to find evidence that disk forensics misses.

Practical Binary Analysis

Dennis Andriesse | 2018 | Binary Analysis

Advanced techniques for analyzing binary programs — disassembly, instrumentation, symbolic execution, and taint analysis.

Malware Analyst's Cookbook

Ligh, Adair, Hartstein & Richard | 2010 | Malware Tools

A recipe book of tools and techniques for malware analysis — from setting up analysis environments to extracting indicators of compromise.

Learning Malware Analysis

Monnappa K A | 2018 | Malware Analysis

A structured learning path for malware analysis covering static, dynamic, memory, and code analysis techniques.

Part VIII: Operating System Security

5 books

The Linux Command Line

William Shotts | 2019 | Linux Fundamentals

A comprehensive guide to mastering the Linux command line — the essential skill for any cybersecurity professional.

Linux Basics for Hackers

OccupyTheWeb | 2018 | Hacker Linux

Linux fundamentals taught through the lens of hacking — using Kali Linux as the platform.

How Linux Works

Brian Ward | 2021 | Linux Internals

A deep dive into how Linux actually works — boot process, kernel, devices, networking, and processes.

Windows Internals

Russinovich, Solomon & Ionescu | Updated regularly | Windows Internals

The definitive reference on Windows architecture and internal mechanisms.

macOS and iOS Internals

Jonathan Levin | 2016-2019 | Apple Internals

A three-volume deep dive into Apple's operating systems — XNU kernel, security architecture, and system frameworks.

Part IX: Cloud & Infrastructure Security

5 books

Hacking the Cloud

Matt Burrough | 2019 | Cloud Security

Offensive security techniques for cloud environments — AWS, Azure, and GCP.

Kubernetes Security

Liz Rice & Michael Hausenblas | 2018 | Container Security

How to secure Kubernetes clusters and the containerized workloads running on them.

AWS Security

Dylan Shields | 2022 | AWS Security

A practical guide to securing AWS environments.

Practical Cloud Security

Chris Dotson | 2019 | Cloud Security

A vendor-neutral guide to cloud security principles that apply across AWS, Azure, GCP, and private cloud.

Cloud Security and Privacy

Tim Mather et al. | 2009 | Cloud Governance

A comprehensive framework for understanding cloud security risks, governance, and compliance obligations.

Part X: Digital Forensics & Incident Response

5 books

Incident Response & Computer Forensics

Luttgens, Pepe & Mandia | 2014 | Incident Response

The Mandiant team's comprehensive guide to investigating computer security incidents.

Blue Team Handbook: Incident Response

Don Murdoch | 2014 | IR Reference

A concise, field-reference handbook for incident responders — checklists, commands, and procedures.

File System Forensic Analysis

Brian Carrier | 2005 | Disk Forensics

A deep dive into file system structures — FAT, NTFS, Ext, UFS — teaching forensic analysts to find evidence at the byte level.

Intelligence-Driven Incident Response

Scott Roberts & Rebekah Brown | 2017 | Threat Intel + IR

How to integrate threat intelligence into every phase of incident response.

Digital Forensics with Kali Linux

Shashank Parashar | 2020 | Forensics Tools

Using Kali Linux's forensic tools for evidence acquisition, analysis, and reporting.

Part XI: Social Engineering

4 books

Social Engineering: The Science of Human Hacking

Christopher Hadnagy | 2018 | Social Engineering

The comprehensive modern guide to social engineering — combining psychology, neuroscience, and practical techniques.

Phishing Dark Waters

Christopher Hadnagy | 2015 | Phishing

Everything about phishing — how attackers craft campaigns, why people fall for them, and how to defend.

Influence: The Psychology of Persuasion

Robert Cialdini | 1984/2021 | Psychology

The foundational psychology of persuasion — six (now seven) principles that explain why people say yes.

Human Hacking

Christopher Hadnagy | 2021 | Applied Social Skills

Social engineering principles applied ethically to everyday life.

Part XII: Red Team & Offensive Security

5 books

Red Team Development and Operations

Joe Vest & James Tubberville | 2020 | Red Team

The comprehensive guide to building and running a red team program.

Red Team Field Manual (RTFM)

Ben Clark | 2014 | Quick Reference

A pocket reference of commands, scripts, and techniques for penetration testers and red teamers.

Blue Team Field Manual (BTFM)

Alan White | 2017 | Blue Team Reference

The defensive counterpart to RTFM — commands and procedures for incident responders and SOC analysts.

Operator Handbook

Netmux | 2020 | Multi-Domain Reference

A comprehensive reference spanning red team, blue team, and OSINT operations.

Tribe of Hackers: Red Team

Marcus Carey & Jennifer Jin | 2019 | Career Interviews

Interviews with leading red team professionals sharing their experiences and methodologies.

Part XIII: Cyber Warfare & Geopolitics

9 books

Sandworm

Andy Greenberg | 2019 | Cyber Warfare

The story of Russia's most dangerous hacker group, which launched the most destructive cyberattacks in history including NotPetya.

Countdown to Zero Day

Kim Zetter | 2014 | Cyber Warfare

The definitive account of Stuxnet — the first cyber weapon designed to cause physical destruction.

Cyber War

Richard Clarke | 2010 | Cyber Warfare

A former White House cybersecurity advisor's warning that nation-states are preparing for cyber warfare.

The Fifth Domain

Richard Clarke & Robert Knake | 2019 | Cyber Strategy

How cyberspace became the fifth domain of warfare and what must be done to defend it.

This Is How They Tell Me the World Ends

Nicole Perlroth | 2021 | Zero-Day Market

The explosive investigation into the global zero-day exploit market.

The Perfect Weapon

David Sanger | 2018 | Cyber Conflict

How cyber weapons have become the perfect tool for geopolitical conflict — deniable, cheap, and devastating.

Dark Territory

Fred Kaplan | 2016 | Cyber Policy

The secret history of US government cyber operations from Reagan to Obama.

Dawn of the Code War

John Carlin | 2018 | Cyber Law Enforcement

How the US government developed its strategy for fighting nation-state cyber attacks through law enforcement.

This Machine Kills Secrets

Andy Greenberg | 2012 | Leaks & Crypto

How cryptography and anonymous communication tools enable whistleblowing at unprecedented scale.

Part XIV: Security Management & Strategy

5 books

The CISO's Next Move

Raj Badhwar | 2021 | Security Leadership

Strategic guidance for CISOs navigating security leadership.

Security Metrics

Andrew Jaquith | 2007 | Measurement

How to measure security performance with meaningful metrics that drive decisions.

Measuring and Managing Information Risk (FAIR)

Jack Freund & Jack Jones | 2014 | Risk Quantification

The FAIR framework for quantifying cybersecurity risk in financial terms.

Building a Security Program

Chris Williams | 2020 | Program Management

A practical guide to building an information security program from scratch.

Transformational Security Awareness

Perry Carpenter | 2019 | Security Culture

How to build security awareness programs that actually change behavior.

Part XV: Privacy

2 books

Permanent Record

Edward Snowden | 2019 | Autobiography / Surveillance

Edward Snowden's account of how he went from NSA contractor to the most famous whistleblower in history.

Dragnet Nation

Julia Angwin | 2014 | Privacy

A journalist's experiment in escaping digital surveillance — discovering how nearly impossible true privacy has become.

Part XVI: Threat Intelligence

3 books

The Threat Intelligence Handbook

Recorded Future | 2018 | Threat Intel

A comprehensive framework for building and operationalizing a cyber threat intelligence program.

Structured Analytic Techniques

Richards Heuer & Randolph Pherson | 2010 | Intelligence Analysis

A toolkit of 50+ structured analysis techniques to overcome cognitive biases.

Psychology of Intelligence Analysis

Richards Heuer | 1999 | Cognitive Bias

A CIA analyst's guide to understanding how cognitive limitations affect intelligence analysis.

Part XVII: Career & Mindset

4 books

Tribe of Hackers

Marcus Carey & Jennifer Jin | 2019 | Career Interviews

70 cybersecurity leaders share their career journeys and advice for the next generation.

The Pentester Blueprint

Phillip Wylie & Kim Crawley | 2020 | Career Guide

A step-by-step career guide for becoming a penetration tester.

Breaking Into Information Security

Andy Gill | 2019 | Career Guide

Practical advice for breaking into cybersecurity through hands-on practice.

Cybersecurity Career Master Plan

Dr. Gerald Auger | 2021 | Career Strategy

A strategic framework for planning and advancing a cybersecurity career.

Need a Security Audit?

SKAI Technology offers comprehensive cybersecurity assessments. Our team brings the knowledge of 100+ industry-leading books into every engagement.