Books on Programming and Cybersecurity recommended by Zero Salarium Researchers


Books Recommended by Zero Salarium

Programming is the backbone of the digital world. If you want to sharpen your
cybersecurity skills, it’s the cornerstone you need to lay first.

Advanced Techniques for Exploit Writing, Malware Development, and
Obfuscation

Advanced Techniques for Exploit Writing, Malware Development, and
Obfuscation is a cutting-edge guide designed for security professionals,
advanced programmers, and curious learners who want to understand how
offensive techniques are developed and applied in real systems.

Product

C++ Crash Course: A Fast-Paced Introduction

A fast-paced, thorough introduction to modern C++ written for experienced
programmers. After reading C++ Crash Course, you’ll be proficient in
the core language concepts, the C++ Standard Library, and the Boost
Libraries.

Product

Reverse Engineering, Malware Development, and Privilege Escalation with
Modern C++

Unlock the Power of C++ for Real-World Offensive Security and Malware
Engineering.

Product

The Art of Mac Malware, Volume 2: Detecting Malicious Software

This first-of-its-kind guide to detecting stealthy Mac malware gives you
the tools and techniques to counter even the most sophisticated threats
targeting the Apple ecosystem.

Product

Metasploit, 2nd Edition

Metasploit: The Penetration Tester’s Guide has been the definitive
security assessment resource for over a decade. The Metasploit Framework
makes discovering, exploiting, and sharing vulnerabilities quick and
relatively painless, but using it can be challenging for newcomers.

Product

Black Hat Python, 2nd Edition: Python Programming for Hackers and
Pentesters

When it comes to creating powerful and effective hacking tools, Python is
the language of choice for most security analysts.

Product

Black Hat Bash: Creative Scripting for Hackers and Pentesters

Master the art of offensive bash scripting. This highly practical hands-on
guide covers chaining commands together, automating tasks, crafting
living-off-the-land attacks, and more!

Product

Bug Bounty Bootcamp: The Guide to Finding and Reporting Web
Vulnerabilities

Bug Bounty Bootcampteaches you how to hack web applications. You will
learn how to perform reconnaissance on a target, how to identify
vulnerabilities, and how to exploit them.



Source link