Backsecurity

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

threat huntingThis category page provides an overview of the latest and most popular technology books focused on threat hunting. Readers can browse best-selling titles like Practical Threat Detection Engineering and Operationalizing Threat Intelligence to gain practical skills for detecting threats and improving security. The page highlights key topics like building detection capabilities, leveraging threat intelligence, validating defenses, and more. Experienced cybersecurity professionals as well as those new to the field will find relevant books matching their experience level and interests.

Bestsellers

A range of our top selling security products from the last year.

(1-1 of 4) 
Practical Threat Detection Engineering
Practical Threat Detection Engineering
Jul 2023Ellipse328 PagesEllipseHalf Star 5

$47.99
Operationalizing Threat Intelligence
Operationalizing Threat Intelligence
Jun 2022Ellipse460 Pages

$37.99
The Foundations of Threat Hunting
The Foundations of Threat Hunting
Jun 2022Ellipse246 Pages

$33.99
Malware Science
Malware Science
Dec 2023Ellipse230 Pages

$35.99

What's New

Our latest security releases from the last few months.

(1-1 of 1) 
Malware Science
Malware Science
Dec 2023Ellipse230 Pages

$35.99

Rising Stars

Recently released security books which are getting a lot of attention.

(1-1 of 10) 
Attacking and Exploiting Modern Web Applications
Attacking and Exploiting Modern Web Appl ...
Aug 2023Ellipse338 PagesEllipseHalf Star 5

$31.99
Automotive Cybersecurity Engineering Handbook
Automotive Cybersecurity Engineering Han ...
Oct 2023Ellipse392 PagesEllipseHalf Star 5

$43.99
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Official Google Cloud Certified Professi ...
Aug 2023Ellipse496 Pages

$47.99
Cloud Penetration Testing for Red Teamers
Cloud Penetration Testing for Red Teamer ...
Nov 2023Ellipse298 Pages

$39.99
ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide
ISACA Certified in Risk and Information ...
Sep 2023Ellipse316 Pages

$43.99
Burp Suite Cookbook
Burp Suite Cookbook
Oct 2023Ellipse450 PagesEllipseHalf Star 5

$39.99
Building and Automating Penetration Testing Labs in the Cloud
Building and Automating Penetration Test ...
Oct 2023Ellipse562 Pages

$39.99
Ethical Hacking Workshop
Ethical Hacking Workshop
Oct 2023Ellipse220 Pages

$43.99
Windows Forensics Analyst Field Guide
Windows Forensics Analyst Field Guide
Oct 2023Ellipse318 PagesEllipseHalf Star 5

$39.99
Implementing DevSecOps Practices
Implementing DevSecOps Practices
Dec 2023Ellipse258 Pages

$27.99

Audience Favourites

Our most rated security products by our Customers.

(1-1 of 1) 
Practical Threat Detection Engineering
Practical Threat Detection Engineering
Jul 2023Ellipse328 Pages

$47.99

Listen & Learn

Engaging security audiobooks for learning on the go.

(1-1 of 1) 
Operationalizing Threat Intelligence
Operationalizing Threat Intelligence
Dec 2022Ellipse11 h and 44 min

$46.99

Career Pathways

A collection of reading lists made by our expert authors to help get you your next job.
Mastering CybersecurityMastering CybersecurityMastering Cybersecurity
Mastering CybersecurityThis comprehensive reading list is curated for those looking to get started with Cybersecurity. It offers unique insights on the evolution of the threat landscape, providing expert tips and techniques to help you develop defense strategies against th ...
How to Become an Ethical HackerHow to Become an Ethical HackerHow to Become an Ethical Hacker
How to Become an Ethical HackerExplore this reading list to learn legal hacking, enterprise defense testing, and penetration techniques in a controlled environment. It covers practicing ethical hacking, intermediate-level penetration testing, web app vulnerability exploitation, an ...
Become a Kali Linux NinjaBecome a Kali Linux NinjaBecome a Kali Linux Ninja
Become a Kali Linux NinjaMaster the art of ethical hacking with the ins and outs of pentesting with Kali Linux. It leads from advanced to complex penetration testing methods, covering wireless devices, web, and AWS cloud.
Kickstart Your CyberSecurity CareerKickstart Your CyberSecurity CareerKickstart Your CyberSecurity Career
Kickstart Your CyberSecurity CareerCybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started. This reading list consistss of books wr ...
Digital Forensics and Incident Response MasterclassDigital Forensics and Incident Response MasterclassDigital Forensics and Incident Response Masterclass
Digital Forensics and Incident Response MasterclassLearn digital forensics and incident response with real-life scenarios. Ideal for cybersecurity enthusiasts and business security professionals.

Popular Authors (5)

(1 -1 of 5) 

Ms. Vandana Verma Sehgal
LinkedinGithub
1. https://www.linkedin.com/in/vandana-verma/?originalSubdomain=in 2. https://infosecvandana.com/ 2. https://github.com/vermava 3. https://twitter.com/infosecvandana 4. https://www.youtube.com/channel/UCyr-gas4Un-3YBEDIUQtNjg 5. https://www.youtube.com/watch?v=MIyM6JKv7pQ 6. https://www.youtube.com/watch?v=FHKG3b07PtA 7. https://pl-pl.facebook.com/bloggersmeetup/videos/vandana-verma-sehgal-of-owasp-explains-why-app-modernization-is-so-critical-to-l/490587351941275/ 8. https://www.rsaconference.com/experts/vandana-verma-sehgal 9. https://owasp.o...
Most popular book by Ms. Vandana Verma Sehgal
Implementing DevSecOps Practices
Kamil Mrzygłód
LinkedinGithub
Kamil Mrzygłód is a skilled software developer, architect, and Microsoft Azure MVP. He is focused on delivering fast, reliable, and flexible cloud solutions based on the Microsoft Azure platform. He has spoken at multiple conferences and meetups, working on open source software (OSS) projects and driving workshops for different people and companies. In recent years, he has developed an interest in Azure serverless architectures, data analysis, and big data components. Currently, he works as an independent cloud consultant for various clients. H...
Most popular book by Kamil Mrzygłód
Hands-On Azure for Developers
Stian Thorgersen
LinkedinGithub
Stian Thorgersen started his career at Arjuna Technologies building a cloud federation platform, years before most companies were even ready for a single-vendor public cloud. He later joined Red Hat, looking for ways to make developers' lives easier, which is where the idea of Keycloak started. In 2013, Stian co-founded the Keycloak project with another developer at Red Hat. Today, Stian is the Keycloak project lead and is also the top contributor to the project. He is still employed by Red Hat as a senior principal software engineer focusing o...
Most popular book by Stian Thorgersen
Keycloak - Identity and Access Management for Modern Applications
José Manuel Ortega
LinkedinGithub
Jos Manuel Ortega is a software engineer, focusing on new technologies, open source, security, and testing. His career goal has been to specialize in Python and security testing projects. In recent years, he has developed an interest in security development, especially in pentesting with Python. Currently, he is working as a security tester engineer and his functions in the role involves the analysis and testing of the security of applications in both web and mobile environments. He has taught at university level and collaborated with the offic...
Most popular book by José Manuel Ortega
Mastering Python for Networking and Security
Viktor Hedberg
LinkedinGithub
Viktor is a Cyber Security Consultant / Security Advisor for Truesec, based in Sweden. Specializing in Microsoft technologies whether on-premises or in the cloud, Viktor strives to secure all workloads as well as taking part in Incident Response to help organizations respond, recover, and rebuild from an attack. He has 10 years of experience in the IT industry, during this time he has worked for a number of government entities and as a consultant helped a number of global organizations with designing and implementing various Microsoft workloads...
Most popular book by Viktor Hedberg
Microsoft Information Protection Administrator SC-400 Certification Guide

threat hunting concept discovery