
We are often asked what books are worth reading for those who make the first steps in the field of information security? Our team of penetration testing experts compiled a collection of books that will help you master the practical issues of information security.

')
Security researcher and security specialist Jon Erickson wrote a book that, instead of simply examining vulnerabilities and exploits, explores deeper approaches to finding errors made by software developers.

Back in 2003, the American engineer Andrew Huang published the Xbox repair and modification manual. But this is not a simple instruction, but a book in which approaches and practical examples of reverse engineering are described.

The book by researchers Dafydd Stuttard and Marcus Pinto describes in detail the basics of web applications and web servers, the exploitation of logical vulnerabilities, SQL injections and other practical examples of attacks on web applications. The guide to the law has earned the glory of a pentester's handbook.

The book describes the approaches to reverse engineering of x86, x64 and ARM platforms, rootkits and Windows drivers, protection techniques of virtual machines.

The book details the complexities and typical tasks that security experts encounter during penetration testing. Security expert Peter Kim examines practical network attacks, antivirus bypass, and attacks on various defenses.