Cybersecurity Books and References — A Good InfoSec Reading List

I have been asked a few times over the years for a good reading list of cybersecurity books and references to get to know more on the different aspects of the Information Security field. I decided to document this list here so it can be used by a broader public. There are some really nice books in here which I would recommend to everyone, from pentesters to CEOs, passing by incident responders and lawyers.

Note: I used “Cybersecurity books” just so I get good SEO results. To know why, you can read my post Information Security Synonyms.

I will start by providing general cybersecurity books that covers a large portion of the different subjects in the InfoSec field. Then I will provide some field specific books and references (like crypto, incident response, etc.). I will update this post as I discover more books and resources, so keep it in your browser favorites so you can come back from time to time to see if the list is updated!

General Cybersecurity Books and References

The following books cover most aspects of the InfoSec field. I would recommend to anyone to have them handy and refer to them when needed.

Defensive Security Handbook:

Defensive Security Handbook

This is one of my favorite books. I always have it close to me in case I need to go back to find a reference or an explanation. This book covers the basics of pretty much all aspects of the InfoSec field and is an excellent book to use when starting a security program. Even for well established programs, it’s good to go back to it to confirm we didn’t forgot anything. It also provides some useful tips on some widely used technologies (like Microsoft’s Windows Infrastructure). This book is well written and lightweight (but complete), making it an ideal reference to keep handy.

The Official (ISC)2 Guide to the CISSP CBK Reference:

The Official (ISC)2 Guide to the CISSP CBK Reference

This book is probably the most known book in the InfoSec world. This is because this is the InfoSec CBK used for the CISSP exam. This book of around 1000 pages is the bible of the InfoSec world. It covers all aspects of the field from the base up to an advanced level. You won’t go into the details as a white paper would and you won’t gain a doctorate level understanding of a field, but you will learn a lot of things on all the subjects. So with this book, you will have a good understanding of all aspects of InfoSec. The CISSP certification is often a requirements for some jobs so it’s definitely useful.

On vous voit: Comment déjouer les malveillants sur Internet (French Edition):

This one is for my French speaking peers so I’ll explain the following in French. C’est un excellent livre, accessible à tous mais où même les experts apprennent des choses! Je le recommande à tous comme lecture légère. On y parle de toute de sorte de sujet en liens avec la sécurité de l’information et des bonnes pratiques à adopter en ligne. On y parle aussi de sujets connexes comme le “dark net”, comment faire des achats sécuritaire en ligne, les types de surveillances que divers groupes pratiquent, etc.

Computerphile YouTube Channel:

Image of the channel page
Image of the channel page

The Computerphile YouTube channel is a channel I really like. They are able to simplify complex concepts and they often talk about security subjects. I recommend it to everyone!

Field Specific Books and References


The cryptopals crypto challenges:

The first page of the website

The cryptopals crypto challenges website offer challenges to learn how cryptography works with practice. They start from the very base with things like “Convert hex to base64”, “Fixed XOR [encryption]”, “Single-byte XOR cipher [encryption]” and eventually cover advanced subjects like RSA, Diffie-Hellman, SHA, AES, etc.

Introduction to Cryptography by Christof Paar:

Image of the channel page
They also provide cybersecurity books
Image of the channel page

The Introduction to Cryptography by Christof Paar YouTube channel is a channel really interesting. It’s a channel where a actual university class is filmed and then put un YouTube. We can see the professor give his course and students ask questions. Because of this, the content is of really high quality! The videos are long and we have the chance to cover a subject in great depth. It is from this channel that I learned how many algorithms work, like AES. I highly recommend it to anyone interesting in learning how crypto algorithms work.

Incident Response

Incident Response:

Incident Response

This is the first Incident Response book I read in my life. This book is an excellent resource as an introduction to Incident Response (IR) as well as how to manage a IR program. They provide many tips and resources to use when we need to respond to an incident. One of the main aspects I retained from this book is the organizational aspect of the team when we have a big incident and many stakeholders are implicated (chapter 4).

Intelligence-Driven Incident Response:

Intelligence-Driven Incident Response

I am currently reading this book, I’ll provide feedback when I finish it. This book looks really promising!


Documenting Software Architectures: Views and Beyond:

Documenting Software Architectures : Views and Beyond

I bought this book for a University course on software architecture. Although this book is about documenting architecture, many architecture patterns are explained, as well as how to document them. I won’t go into the details on how to document, when and up to what level of details, but I will tell you this: documentation is important. I would advise any developer that would like to become an architect, and any architect, to read this book. It is in this book that I learned about many patterns like “Pipe and Filter“.

Clean Code: A Handbook of Agile Software Craftsmanship:

Clean Code : A Handbook of Agile Software Craftsmanship

This is a classic in the development world. This book by Robert Martin, a.k.a Uncle Bob, describes many techniques and the philosophy to create clean code. You may be unaware, but the vast majority of the code people write is hard to maintain and inherently slows down future development. The different techniques available in this book can be used to reduce the amount of badly written code. I highly recommend anyone writing code to read this book.

Pentesting / Hacking

LiveOverflow YouTube Channel:

Image of the channel page
Image of the channel page

The LiveOverflow YouTube channel is a high quality and deeply technical channel where they address hacking techniques. The channel starts with basic principles so anyone technical interested to learn different hacking / pentesting subject could be interested in this one. I have been following this channel for many years now and everytime I watch a video, new or old, I learn something!

Blue Teaming — miscellaneous

Effective Threat Intelligence: Building and running an intel team for your organization:

Effective Threat Intelligence : Building and running an intel team for your organization

This book is one of my favorites I read recently. It’s easy to read for someone that have some base on the subject. They address Threat Intelligence (TI): what it is, how to do it, what to do with it, etc. They provide many hints on how to manage a TI program. I highly recommend this book to people who have some experience in the field and are curious to learn more about Threat Intelligence.




Passionate about information security, development and technology in general, I like to share my experience with different technologies. I also love travel!

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Automated Access Benefits

Exploiting GPS and the fixes we face in the future

{UPDATE} Táctica. Aperturas Abiertas Hack Free Resources Generator

{UPDATE} FNaF Quizlet - Fanfiction Freddys Puppet World Hack Free Resources Generator

Security Trivia Series: Hints on default-src CSP directive

What is the difference between verification, authentication and access management?

Covering privacy as a critical freedom tool and a foundation of Web 3 infrastructure.

Cloud security best practices: part 4 Application Security

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Tristan Dostaler

Tristan Dostaler

Passionate about information security, development and technology in general, I like to share my experience with different technologies. I also love travel!

More from Medium

Cyber Security: Password Attacks

Vulnerability Management Using Nessus

How to create a Systemd service in 2 easy steps.

Advent of Cyber 3 Day 14 — Dev(Insecure)Ops Walkthrough