{"id":2414,"date":"2014-08-22T15:30:10","date_gmt":"2014-08-22T15:30:10","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2414"},"modified":"2019-11-15T07:13:51","modified_gmt":"2019-11-15T12:13:51","slug":"books-on-cybersecurity-5-recommendations-from-our-experts","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/books-on-cybersecurity-5-recommendations-from-our-experts\/2414\/","title":{"rendered":"Books on cybersecurity: 5+ recommendations from our experts"},"content":{"rendered":"<p>Recently we approached our security experts from the Global Research and Analysis Team and asked them which books they would recommend to other security experts (or those who would like to become experts). They named five (well, actually ten) books focused on computer security in general and malware analysis in particular.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>A small disclaimer first: Below is a handful of links to Amazon, and not just because our experts prefer buying there. Actually, it is from there we have acquired the preliminary list of popular books on the topic that we showed to our experts. They have marked the most interesting ones and recommended some others. In total we received feedback from our colleagues in 10 different countries, and that is why we provide links to a store accessible worldwide. Fortunately, all of the books listed below are available in both paper and electronic form.<\/p>\n<p>Let\u2019s go! <\/p><blockquote class=\"twitter-pullquote\"><p>Most of the books listed are available in paper and electronic forms.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FwE79&amp;text=Most+of+the+books+listed+are+available+in+paper+and+electronic+forms.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong><br>\n<img decoding=\"async\" class=\"alignleft wp-image-2428 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/08\/06020104\/1-1.jpg\" alt=\"1\" width=\"200\" height=\"251\">Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation<\/strong><br>\nBruce Dang; 2014<br>\n<a href=\"http:\/\/www.amazon.com\/Practical-Reverse-Engineering-Reversing-Obfuscation\/dp\/1118787315\/\" target=\"_blank\" rel=\"noopener nofollow\">Link<\/a><\/p>\n<p>If you think, after reading the first chapter, that the presentation is somewhat inane you are wrong. Reading this book, I was at first just happy with its easy language, comprehensible even for a non-specialist, but then I had to pay the price. Just after the introduction there goes an avalanche of extremely detailed information about reverse engineering, Windows kernel specifics and processor architectures, without much regard for your qualification level. It\u2019s more a textbook than a reference for an experienced specialist. Security researchers\u2019 work usually starts with malware code analysis, and this book is just fine to get yourself familiarized with this task.<\/p>\n<p><strong><br>\n<img decoding=\"async\" class=\"alignright wp-image-2429 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/08\/06020104\/2-1.jpg\" alt=\"2\" width=\"200\" height=\"263\">The Practice of Network Security Monitoring: Understanding Incident Detection and Response<\/strong><br>\nRichard Bejtlich; 2013<br>\n<a href=\"http:\/\/www.amazon.com\/Practice-Network-Security-Monitoring-Understanding\/dp\/1593275099\" target=\"_blank\" rel=\"noopener nofollow\">Link<\/a><\/p>\n<p>This book offers a quality review of the tools for monitoring network security. What is specifically important, the description of tools is supplemented with practical examples of using them. It\u2019s unclear, however, why there are so many memory dumps showcased \u2013 this is especially eye-catching in a paper variant. But, according to our experts, if you are just getting acquainted with network security, this is one of the best textbooks around.<\/p>\n<p><strong><br>\n<img decoding=\"async\" class=\"alignleft size-full wp-image-2430\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/01\/06044811\/3.jpeg\" alt=\"3\" width=\"200\" height=\"252\">Threat Modeling: Designing for Security<\/strong><br>\nAdam Shostack; 2014<br>\n<a href=\"\/\/www.amazon.com\/Threat-Modeling-Designing-Adam-Shostack\/dp\/1118809998\" target=\"_blank\" rel=\"noopener nofollow\">Link<\/a><\/p>\n<p>Although each of us models the threats intuitively, few do it on the expert level. Adam Shostack is one of such rare professional. At Microsoft he\u2019s working on Security Development Lifecycle Threat Modeling, whatever that means, and the experience he had accumulated, is recounted in a 600-page thick book, suitable for both the beginners and the experienced specialists.<\/p>\n<p>Starting from the basic things such as four-way combination \u2013 \u201cWhat do we build\u201d, \u201cWhat may go wrong with the built thing\u201d, \u201cWhat can we do with something that has gone wrong\u201d and \u201cHow good is our analysis\u201d, Shostack goes in-depth with every aspect of threat modelling, offering techniques, software tools and petty tricks he has developed and refined over the course of his own work, those help building an efficient threat model for anything. By the way, the author emphasize the aspects more suitable for the applications developers, IT systems architects and security experts, which is useful too.<\/p>\n<p>The book is greatly prettified by a gentle trolling that the author uses regularly \u2013 as he describes a typical clich\u00e9 surfacing during the threats modeling process or during the meetings with the project participants (for instance, such absolutely \u201chumane\u201d, non-computer problem as \u201cwho is responsible for checking this SQL request?\u201d).<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/08\/06020105\/wide-1.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-2417\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/08\/06020105\/wide-1.jpg\" alt=\"wide\" width=\"1000\" height=\"848\"><\/a><\/p>\n<p>You can follow our security experts from the GReaT team in Twitter. The easiest way to do this is to subscribe to this list:<\/p>\n<p><a class=\"twitter-timeline\" data-dnt=\"true\" href=\"https:\/\/twitter.com\/KasperskyLabB2B\/lists\/great\" data-widget-id=\"502039559694065664\" target=\"_blank\" rel=\"noopener nofollow\">Tweets from https:\/\/twitter.com\/KasperskyLabB2B\/lists\/great<\/a><br>\n<script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=\/^http:\/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+\":\/\/platform.twitter.com\/widgets.js\";fjs.parentNode.insertBefore(js,fjs);}}(document,\"script\",\"twitter-wjs\");<\/script><\/p>\n<p><strong><br>\nAndroid Hacker\u2019s Handbook<img decoding=\"async\" class=\"alignright wp-image-2431 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/08\/06020104\/4-1.jpeg\" alt=\"4\" width=\"200\" height=\"253\"><\/strong><br>\nJoshua J. Drake; 2014<br>\n<a href=\"http:\/\/www.amazon.com\/Android-Hackers-Handbook-Joshua-Drake\/dp\/111860864X\" target=\"_blank\" rel=\"noopener nofollow\">Link<\/a><\/p>\n<p>Unlike PC ecosystem, where scientific and practical analysis is conducted for years due to the numbers and \u201cage\u201d of threats, Android is a pursuing new-comer. So in our list there is only one book on Android security and it is dedicated rather to the entire range of mobile threats \u2013 from OS vulnerabilities to secure application development, and not just to specific malware analysis.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>For some books age means nothing: they tell the basics.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FwE79&amp;text=For+some+books+age+means+nothing%3A+they+tell+the+basics.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Annotation says that it\u2019s \u201cthe first publication for IT professionals, responsible for smartphone security\u201d. The 500 pages tome is not enough to describe all aspects of mobile threats, but most of the problems in this book are specified at least. One of the authors of the book is a former Kaspersky Lab expert, by the way.<\/p>\n<p><strong><img decoding=\"async\" class=\"alignleft size-full wp-image-2432\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/08\/06020103\/5-1.jpeg\" alt=\"5\" width=\"200\" height=\"265\">The Art of Computer Virus Research and Defense<\/strong><br>\nPeter Szor; 2005<br>\n<a href=\"http:\/\/www.amazon.com\/The-Computer-Virus-Research-Defense\/dp\/0321304543\/\" target=\"_blank\" rel=\"noopener nofollow\">Link<\/a><\/p>\n<p>The only book of the five listed, released as long as 9 years ago. Before Android and iOS arrived, before tablets and BYOD, ahead of cyber weaponry and other elements of contemporary computer and networks reality. Nevertheless, the age isn\u2019t a problem for this book, due to one simple reason: cybersecurity industry development is shown in retrospection. And it is very important to understand what comes from where, no matter what field you are working in. For instance, mobile threats are developing along the same lines as PC threats (although at much higher velocity).<\/p>\n<p>And bonus tracks:<\/p>\n<p><strong><br>\n<img decoding=\"async\" class=\"alignright size-full wp-image-2433\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/08\/06020102\/6-1.jpeg\" alt=\"6\" width=\"200\" height=\"266\">Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software<\/strong><br>\nMichael Sikorski; 2012<br>\n<a href=\"http:\/\/www.amazon.com\/Practical-Malware-Analysis-Hands--Dissecting\/dp\/1593272901\" target=\"_blank\" rel=\"noopener nofollow\">Link<\/a><\/p>\n<p>An alternative or an addition to Bruce Dang\u2019s work.<\/p>\n<p><strong>Reversing: Secrets of Reverse Engineering<\/strong><br>\nEldad Eilam; 2005<br>\n<a href=\"http:\/\/www.amazon.com\/Reversing-Secrets-Engineering-Eldad-Eilam\/dp\/0764574817\/\" target=\"_blank\" rel=\"noopener nofollow\">Link <\/a><\/p>\n<p>Examples in this book, also 9 years old, can look obsolete. However, the (relative) simplicity of the presentment may be more valuable for some, than actuality of the platforms and instruments.<\/p>\n<p><strong>The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities<\/strong> (Mark Dowd; 2006; <a href=\"http:\/\/www.amazon.com\/The-Software-Security-Assessment-Vulnerabilities\/dp\/0321444426\/\" target=\"_blank\" rel=\"noopener nofollow\">Link<\/a>).<\/p>\n<p><strong>The IDA Pro Book: The Unofficial Guide to the World\u2019s Most Popular Disassembler<\/strong> (Chris Eagle; 2011; <a href=\"http:\/\/www.amazon.com\/The-IDA-Pro-Book-Disassembler\/dp\/1593272898\/\" target=\"_blank\" rel=\"noopener nofollow\">Link<\/a>).<\/p>\n<p><strong>The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory<\/strong> (Michael Hale Ligh; 2014; <a href=\"http:\/\/www.amazon.com\/The-Art-Memory-Forensics-Detecting\/dp\/1118825098\/\" target=\"_blank\" rel=\"noopener nofollow\">Link<\/a>).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We recently approached our experts and asked which books they would recommend for would-be malware analysts. Here is their list.<\/p>\n","protected":false},"author":53,"featured_media":15780,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2156,282,2157],"class_list":{"0":"post-2414","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-books-on-cybersecurity","10":"tag-cybersecurity","11":"tag-malware-analysts"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/books-on-cybersecurity-5-recommendations-from-our-experts\/2414\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/books-on-cybersecurity-5-recommendations-from-our-experts\/8013\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/books-on-cybersecurity-5-recommendations-from-our-experts\/2414\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/books-on-cybersecurity-5-recommendations-from-our-experts\/2414\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/books-on-cybersecurity\/","name":"books on cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2414"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2414\/revisions"}],"predecessor-version":[{"id":30746,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2414\/revisions\/30746"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15780"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2414"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}