# Books

Some of the books I own and recommend.&#x20;

* [Penetration Testing A Hands-On Introduction to Hacking](https://www.amazon.co.uk/Penetration-Testing-Hands-Introduction-Hacking/dp/1593275641)
* [Black Hat Python: Python Programming for Hackers and Pentesters. ](https://www.amazon.co.uk/Black-Hat-Python-Programming-Pentesters/dp/1593275900/ref=sr_1_1?keywords=Black+hat+hacking+python\&qid=1564501942\&s=gateway\&sr=8-1)
* [Operator Handbook: Red Team + OSINT + Blue Team](https://www.amazon.co.uk/Operator-Handbook-Team-OSINT-Reference/dp/B085RR67H5/ref=sr_1_1?dchild=1\&keywords=operator+handbook\&qid=1597245286\&sr=8-1)
* [Social Engineering: The Art of Human Hacking](https://www.amazon.co.uk/Social-Engineering-Art-Human-Hacking/dp/0470639539/ref=sr_1_5?s=books\&ie=UTF8\&qid=1552667684\&sr=1-5\&keywords=social+engineering)
* [Practical Packet Analysis with Wireshark](https://www.amazon.co.uk/Practical-Packet-Analysis-Wireshark-Real-World/dp/1593272669)
* [NMAP Networking Scanning](https://www.amazon.co.uk/Nmap-Network-Scanning-Official-Discovery/dp/0979958717/ref=sr_1_1?s=books\&ie=UTF8\&qid=1525383449\&sr=1-1\&keywords=NMAP+Networking+Scanning)
* [Blue Team Field Manual](https://www.amazon.co.uk/Blue-Team-Field-Manual-BTFM/dp/154101636X/ref=sr_1_1?s=books\&ie=UTF8\&qid=1525383588\&sr=1-1\&keywords=Blue+Team+Field+Manual)
* [Red Team Manual](https://www.amazon.co.uk/Rtfm-Red-Team-Field-Manual/dp/1494295504/ref=pd_bxgy_14_img_2?_encoding=UTF8\&psc=1\&refRID=PQX25QGFY2RMZBRHZVVH)
* [Python Essential Reference](https://www.amazon.co.uk/Python-Essential-Reference-Developers-Library/dp/0672329786/ref=sr_1_1?s=books\&ie=UTF8\&qid=1525383668\&sr=1-1\&keywords=Python+Essential+Reference)
* [DEVOPS Troubleshooting](https://www.amazon.co.uk/DevOps-Troubleshooting-Linux-Server-Practices/dp/0321832043/ref=sr_1_1?s=books\&ie=UTF8\&qid=1525383652\&sr=1-1\&keywords=DEVOPS+Troubleshooting)
* [Hacking 7 Exposed](https://www.amazon.co.uk/Hacking-Exposed-7-Stuart-Mcclure/dp/0071780289/ref=sr_1_1?ie=UTF8\&qid=1525384281\&sr=8-1\&keywords=hacking+7+exposed)
* [The Hacker’s playbook 2](https://www.amazon.co.uk/Hacker-Playbook-Practical-Penetration-Testing/dp/1512214566/ref=pd_bxgy_14_img_3?_encoding=UTF8\&psc=1\&refRID=29ZCA24EGFSWATKQ86FC)
* [The Code Book](https://www.amazon.co.uk/Code-Book-Secret-History-Code-breaking/dp/1857028899/ref=sr_1_1?ie=UTF8\&qid=1525384914\&sr=8-1\&keywords=the+code+book)
* [Attacking Network Protocols](https://www.amazon.co.uk/Attacking-Network-Protocols-James-Forshaw/dp/1593277504/ref=pd_sim_14_6/260-4821206-7657725?_encoding=UTF8\&pd_rd_i=1593277504\&pd_rd_r=d6d75a02-a93c-11e9-926f-9ff78f286e92\&pd_rd_w=7fjlu\&pd_rd_wg=M4trQ\&pf_rd_p=1b8636ae-4f21-4403-a813-e8849dd46de4\&pf_rd_r=KB1ZCAW7398HV6TM127Z\&psc=1\&refRID=KB1ZCAW7398HV6TM127Z)
* [Practical Malware Analysis](https://www.amazon.co.uk/Practical-Malware-Analysis-Hands-Dissecting/dp/1593272901)
* [Gray Hat Hacking](https://www.amazon.co.uk/Gray-Hacking-Ethical-Hackers-Handbook/dp/0071742557/ref=sr_1_5?crid=1JK2OKYIW7ETF\&keywords=grey+hat+hacking+book+3rd\&qid=1564501871\&s=gateway\&sprefix=grey+hat+%2Caps%2C125\&sr=8-5)
