Backsecurity

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

forensicsThis web page features the latest and most popular technology books in the forensics category. Browse our selection of digital forensics, computer forensics, mobile forensics, network forensics and other related titles. Learn essential techniques and best practices from top experts to strengthen your organization's security posture and cyber threat detection capabilities.

Bestsellers

A range of our top selling security products from the last year.

(1-1 of 10) 
Cloud Forensics Demystified
Cloud Forensics Demystified
Feb 2024Ellipse384 Pages

$35.99
Digital Forensics and Incident Response
Digital Forensics and Incident Response
Dec 2022Ellipse532 PagesEllipseHalf Star 5

$43.99
Learn Computer Forensics – 2nd edition
Learn Computer Forensics – 2nd edition
Jul 2022Ellipse434 Pages

$39.99
Practical Mobile Forensics
Practical Mobile Forensics
Apr 2020Ellipse400 PagesEllipseHalf Star 5

$29.99
Windows Forensics Analyst Field Guide
Windows Forensics Analyst Field Guide
Oct 2023Ellipse318 PagesEllipseHalf Star 5

$39.99
Learning Android Forensics
Learning Android Forensics
Dec 2018Ellipse328 Pages

$39.99
Digital Forensics and Incident Response
Digital Forensics and Incident Response
Jan 2020Ellipse448 Pages

$47.99
iOS Forensics for Investigators
iOS Forensics for Investigators
May 2022Ellipse316 PagesEllipseHalf Star 5

$37.99
Learning Python for Forensics
Learning Python for Forensics
May 2016Ellipse488 Pages

$51.99
Practical Memory Forensics
Practical Memory Forensics
Mar 2022Ellipse304 Pages

$35.99

What's New

Our latest security releases from the last few months.

(1-1 of 1) 
Cloud Forensics Demystified
Cloud Forensics Demystified
Feb 2024Ellipse384 Pages

$35.99

Rising Stars

Recently released security books which are getting a lot of attention.

(1-1 of 10) 
Attacking and Exploiting Modern Web Applications
Attacking and Exploiting Modern Web Appl ...
Aug 2023Ellipse338 PagesEllipseHalf Star 5

$31.99
Automotive Cybersecurity Engineering Handbook
Automotive Cybersecurity Engineering Han ...
Oct 2023Ellipse392 PagesEllipseHalf Star 5

$43.99
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Official Google Cloud Certified Professi ...
Aug 2023Ellipse496 Pages

$47.99
Cloud Penetration Testing for Red Teamers
Cloud Penetration Testing for Red Teamer ...
Nov 2023Ellipse298 Pages

$39.99
ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide
ISACA Certified in Risk and Information ...
Sep 2023Ellipse316 Pages

$43.99
Burp Suite Cookbook
Burp Suite Cookbook
Oct 2023Ellipse450 PagesEllipseHalf Star 5

$39.99
Building and Automating Penetration Testing Labs in the Cloud
Building and Automating Penetration Test ...
Oct 2023Ellipse562 Pages

$39.99
Ethical Hacking Workshop
Ethical Hacking Workshop
Oct 2023Ellipse220 Pages

$43.99
Windows Forensics Analyst Field Guide
Windows Forensics Analyst Field Guide
Oct 2023Ellipse318 PagesEllipseHalf Star 5

$39.99
Implementing DevSecOps Practices
Implementing DevSecOps Practices
Dec 2023Ellipse258 Pages

$27.99

Audience Favourites

Our most rated security products by our Customers.

(1-1 of 4) 
iOS Forensics for Investigators
iOS Forensics for Investigators
May 2022Ellipse316 Pages

$37.99
Practical Mobile Forensics
Practical Mobile Forensics
Apr 2020Ellipse400 Pages

$29.99
Windows Forensics Analyst Field Guide
Windows Forensics Analyst Field Guide
Oct 2023Ellipse318 Pages

$39.99
Digital Forensics and Incident Response
Digital Forensics and Incident Response
Dec 2022Ellipse532 Pages

$43.99

Quick Learns

Our security books which are under 200 pages long.

(1-1 of 2) 
Mastering Python Forensics
Mastering Python Forensics
Oct 2015Ellipse192 Pages

$36.99
iOS Forensics Cookbook
iOS Forensics Cookbook
Jan 2016Ellipse184 Pages

$29.99

Beginner's Corner

Our top picks for starting your security journey.

(1-1 of 10) 
Practical Windows Forensics
Practical Windows Forensics
Jun 2016Ellipse322 Pages

$43.99
Learning Android Forensics
Learning Android Forensics
Apr 2015Ellipse322 Pages

$43.99
Practical Mobile Forensics
Practical Mobile Forensics
Jul 2014Ellipse328 Pages

$39.99
Learning Network Forensics
Learning Network Forensics
Feb 2016Ellipse274 Pages

$43.99
iOS Forensics Cookbook
iOS Forensics Cookbook
Jan 2016Ellipse184 Pages

$29.99
Mobile Forensics Cookbook
Mobile Forensics Cookbook
Dec 2017Ellipse302 Pages

$35.99
Windows Forensics Cookbook
Windows Forensics Cookbook
Aug 2017Ellipse274 Pages

$39.99
Digital Forensics and Incident Response
Digital Forensics and Incident Response
Jul 2017Ellipse324 Pages

$39.99
Digital Forensics with Kali Linux
Digital Forensics with Kali Linux
Apr 2020Ellipse334 Pages

$47.99
Practical Mobile Forensics
Practical Mobile Forensics
Apr 2020Ellipse400 PagesEllipseHalf Star 5

$29.99

2024 Essentials

The must-have security books and resources for this year.

(1-1 of 1) 
Cloud Forensics Demystified
Cloud Forensics Demystified
Feb 2024Ellipse384 Pages

$35.99

Listen & Learn

Engaging security audiobooks for learning on the go.

(1-1 of 3) 
Digital Forensics and Incident Response, Third Edition Audiobook
Digital Forensics and Incident Response, ...
Feb 2023Ellipse12 h and 43 min

$57.99
iOS Forensics for Investigators
iOS Forensics for Investigators
Dec 2022Ellipse5 h and 50 min

$45.99
Learn Computer Forensics
Learn Computer Forensics
Nov 2022Ellipse9 h and 17 min

$46.99

Career Pathways

A collection of reading lists made by our expert authors to help get you your next job.
Mastering CybersecurityMastering CybersecurityMastering Cybersecurity
Mastering CybersecurityThis comprehensive reading list is curated for those looking to get started with Cybersecurity. It offers unique insights on the evolution of the threat landscape, providing expert tips and techniques to help you develop defense strategies against th ...
How to Become an Ethical HackerHow to Become an Ethical HackerHow to Become an Ethical Hacker
How to Become an Ethical HackerExplore this reading list to learn legal hacking, enterprise defense testing, and penetration techniques in a controlled environment. It covers practicing ethical hacking, intermediate-level penetration testing, web app vulnerability exploitation, an ...
Become a Kali Linux NinjaBecome a Kali Linux NinjaBecome a Kali Linux Ninja
Become a Kali Linux NinjaMaster the art of ethical hacking with the ins and outs of pentesting with Kali Linux. It leads from advanced to complex penetration testing methods, covering wireless devices, web, and AWS cloud.
Kickstart Your CyberSecurity CareerKickstart Your CyberSecurity CareerKickstart Your CyberSecurity Career
Kickstart Your CyberSecurity CareerCybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started. This reading list consistss of books wr ...
Digital Forensics and Incident Response MasterclassDigital Forensics and Incident Response MasterclassDigital Forensics and Incident Response Masterclass
Digital Forensics and Incident Response MasterclassLearn digital forensics and incident response with real-life scenarios. Ideal for cybersecurity enthusiasts and business security professionals.

Popular Authors (5)

(1 -1 of 5) 

Ms. Vandana Verma Sehgal
LinkedinGithub
1. https://www.linkedin.com/in/vandana-verma/?originalSubdomain=in 2. https://infosecvandana.com/ 2. https://github.com/vermava 3. https://twitter.com/infosecvandana 4. https://www.youtube.com/channel/UCyr-gas4Un-3YBEDIUQtNjg 5. https://www.youtube.com/watch?v=MIyM6JKv7pQ 6. https://www.youtube.com/watch?v=FHKG3b07PtA 7. https://pl-pl.facebook.com/bloggersmeetup/videos/vandana-verma-sehgal-of-owasp-explains-why-app-modernization-is-so-critical-to-l/490587351941275/ 8. https://www.rsaconference.com/experts/vandana-verma-sehgal 9. https://owasp.o...
Most popular book by Ms. Vandana Verma Sehgal
Implementing DevSecOps Practices
Kamil Mrzygłód
LinkedinGithub
Kamil Mrzygłód is a skilled software developer, architect, and Microsoft Azure MVP. He is focused on delivering fast, reliable, and flexible cloud solutions based on the Microsoft Azure platform. He has spoken at multiple conferences and meetups, working on open source software (OSS) projects and driving workshops for different people and companies. In recent years, he has developed an interest in Azure serverless architectures, data analysis, and big data components. Currently, he works as an independent cloud consultant for various clients. H...
Most popular book by Kamil Mrzygłód
Hands-On Azure for Developers
Stian Thorgersen
LinkedinGithub
Stian Thorgersen started his career at Arjuna Technologies building a cloud federation platform, years before most companies were even ready for a single-vendor public cloud. He later joined Red Hat, looking for ways to make developers' lives easier, which is where the idea of Keycloak started. In 2013, Stian co-founded the Keycloak project with another developer at Red Hat. Today, Stian is the Keycloak project lead and is also the top contributor to the project. He is still employed by Red Hat as a senior principal software engineer focusing o...
Most popular book by Stian Thorgersen
Keycloak - Identity and Access Management for Modern Applications
José Manuel Ortega
LinkedinGithub
Jos Manuel Ortega is a software engineer, focusing on new technologies, open source, security, and testing. His career goal has been to specialize in Python and security testing projects. In recent years, he has developed an interest in security development, especially in pentesting with Python. Currently, he is working as a security tester engineer and his functions in the role involves the analysis and testing of the security of applications in both web and mobile environments. He has taught at university level and collaborated with the offic...
Most popular book by José Manuel Ortega
Mastering Python for Networking and Security
Viktor Hedberg
LinkedinGithub
Viktor is a Cyber Security Consultant / Security Advisor for Truesec, based in Sweden. Specializing in Microsoft technologies whether on-premises or in the cloud, Viktor strives to secure all workloads as well as taking part in Incident Response to help organizations respond, recover, and rebuild from an attack. He has 10 years of experience in the IT industry, during this time he has worked for a number of government entities and as a consultant helped a number of global organizations with designing and implementing various Microsoft workloads...
Most popular book by Viktor Hedberg
Microsoft Information Protection Administrator SC-400 Certification Guide