Nice Books Logo
  • Home
  • Books
    • arts books
    • memoirs books
    • business books
    • calendars books
    • children books
    • christian books
    • comics books
    • technology books
    • cookbooks books
    • hobbies books
    • education books
    • engineering books
    • health books
    • history books
    • entertainment books
    • law books
    • lgbtq books
    • literature books
    • medical books
    • mystery books
    • relationships books
    • politics books
    • reference books
    • spirituality books
    • romance books
    • science books
    • fantasy books
    • selfhelp books
    • sports books
    • teen books
    • preparation books
    • travel books
  • Genres
  • New Release

Books Related To Hackable: How to Do Application Security Right

  1. Home
  2. Books Related To Hackable: How to Do Application Security Right
alice-and-bob-learn-application-security-B08L8JX4RD
View Detail

Alice and Bob Learn Application Security

ptfm-purple-team-field-manual-B08T7Y3TP2
View Detail

PTFM: Purple Team Field Manual

practical-threat-intelligence-and-datadriven-threat-hunting-a-handson-guide-to-B07T47QPCS
View Detail

Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to…

the-pentester-blueprint-starting-a-career-as-an-ethical-hacker-B08M5KWCRR
View Detail

The Pentester BluePrint: Starting a Career as an Ethical Hacker

aws-penetration-testing-beginners-guide-to-hacking-aws-with-tools-such-as-kali-B08JVMY5Q5
View Detail

AWS Penetration Testing: Beginner's guide to hacking AWS with tools such as Kali…

generation-zero-reclaiming-my-parents-american-dream-B08N6ZKC3T
View Detail

Generation Zero: Reclaiming My Parents’ American Dream

the-smartest-person-in-the-room-the-root-cause-and-new-solution-for-cybersecurity-B08T6QK6FN
View Detail

The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity

practical-cybersecurity-architecture-a-guide-to-creating-and-implementing-robust-B08J3QHHRM
View Detail

Practical Cybersecurity Architecture: A guide to creating and implementing robust…

human-hacking-win-friends-influence-people-and-leave-them-better-off-for-having-B087287Y3M
View Detail

Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having…

better-great-than-never-believing-its-possible-is-where-champions-begin-B08LYC6NL4
View Detail

Better Great Than Never: Believing It's Possible Is Where Champions Begin

devsecops-a-leaders-guide-to-producing-secure-software-without-compromising-flow-B08QRRNX6K
View Detail

DevSecOps: A leader’s guide to producing secure software without compromising flow,…

security-engineering-a-guide-to-building-dependable-distributed-systems-B08P69FT4Q
View Detail

Security Engineering: A Guide to Building Dependable Distributed Systems

hands-on-hacking-become-an-expert-at-next-gen-penetration-testing-and-purple-B08GJXSMK3
View Detail

Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple…

web-security-for-developers-real-threats-practical-defense-B07V78WH7V
View Detail

Web Security for Developers: Real Threats, Practical Defense

web-application-security-exploitation-and-countermeasures-for-modern-web-B085FW7J86
View Detail

Web Application Security: Exploitation and Countermeasures for Modern Web…

container-security-fundamental-technology-concepts-that-protect-B088B9KKGC
View Detail

Container Security: Fundamental Technology Concepts that Protect…

practical-iot-hacking-the-definitive-guide-to-attacking-the-internet-of-things-B085BVVSN6
View Detail

Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

cyber-warfare-truth-tactics-and-strategies-strategic-concepts-and-truths-to-help-you-and-B084ZN2HBD
View Detail

Cyber Warfare – Truth, Tactics, and Strategies: Strategic concepts and truths to help you and…

red-team-development-and-operations-a-practical-guide-B0842BMMCC
View Detail

Red Team Development and Operations: A practical guide

tribe-of-hackers-blue-team-tribal-knowledge-from-the-best-in-defensive-cybersecurity-B08GC1QHGY
View Detail

Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity

zero-trust-networks-building-secure-systems-in-untrusted-networks-B072WD347M
View Detail

Zero Trust Networks: Building Secure Systems in Untrusted Networks

threat-modeling-a-practical-guide-for-development-teams-B08NFKBQM4
View Detail

Threat Modeling: A Practical Guide for Development Teams

hacking-multifactor-authentication-B08KG65Q3V
View Detail

Hacking Multifactor Authentication

you-can-stop-stupid-stopping-losses-from-accidental-and-malicious-actions-B08JSB5CHG
View Detail

You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions

learning-go-an-idiomatic-approach-to-realworld-go-programming-B08XYGCM71
View Detail

Learning Go: An Idiomatic Approach to Real-World Go Programming

html-and-css-quickstart-guide-the-simplified-beginners-B08TT68MQG
View Detail

HTML and CSS QuickStart Guide: The Simplified Beginners…

ciso-compass-navigating-cybersecurity-leadership-challenges-with-insights-from-B07LH3DRLR
View Detail

CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from…

aws-certified-security-study-guide-specialty-scsc01-exam-B08RSBQPMV
View Detail

AWS Certified Security Study Guide: Specialty (SCS-C01) Exam

threat-modeling-designing-for-security-B00IG71FAS
View Detail

Threat Modeling: Designing for Security

measuring-and-managing-information-risk-a-fair-approach-B00N9YPW5C
View Detail

Measuring and Managing Information Risk: A FAIR Approach

ghost-why-perfect-women-shrink-B08PVXMGQP
View Detail

Ghost: Why Perfect Women Shrink

a-bug-bounty-hunting-journey-overcome-your-limits-and-become-a-successful-hunter-B08TJ5FPP4
View Detail

A bug bounty hunting journey: Overcome your limits and become a successful hunter

intrusion-detection-honeypots-detection-through-deception-B08XW7V3CV
View Detail

Intrusion Detection Honeypots: Detection through Deception

social-engineering-the-science-of-human-hacking-B07F24YV2M
View Detail

Social Engineering: The Science of Human Hacking

practical-cloud-security-a-guide-for-secure-design-and-deployment-B07PHJVS2Y
View Detail

Practical Cloud Security: A Guide for Secure Design and Deployment

the-threat-intelligence-handbook-a-practical-guide-for-security-teams-to-unlocking-the-B07L7ZH119
View Detail

The Threat Intelligence Handbook: A Practical Guide for Security Teams to Unlocking the…

practical-vulnerability-management-a-strategic-approach-to-managing-cyber-risk-B07VG4JPPQ
View Detail

Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk

running-hashicorp-vault-in-production-B08JJLGMZ3
View Detail

Running HashiCorp Vault in Production

retail-pride-the-guide-to-celebrating-your-accidental-career-B08JNDR73Y
View Detail

Retail Pride: The Guide to Celebrating Your Accidental Career

zero-trust-security-an-enterprise-guide-B08Y7P3XPR
View Detail

Zero Trust Security: An Enterprise Guide

handson-aws-penetration-testing-with-kali-linux-set-up-a-virtual-lab-and-pentest-B07C61YYJ4
View Detail

Hands-On AWS Penetration Testing with Kali Linux: Set up a virtual lab and pentest…

nmap-6-cookbook-the-fatfree-guide-to-network-security-scanning-B00T3P4TA0
View Detail

Nmap 6 Cookbook: The Fat-Free Guide to Network Security Scanning

black-hat-python-2nd-edition-python-programming-for-hackers-and-pentesters-B08CTGR1XC
View Detail

Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters

how-to-investigate-like-a-rockstar-live-a-real-crisis-to-master-the-secrets-of-forensic-B074THN82S
View Detail

How to Investigate Like a Rockstar: Live a real crisis to master the secrets of forensic…

crafting-the-infosec-playbook-security-monitoring-and-incident-response-master-plan-B00XB1P4RO
View Detail

Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan

tribe-of-hackers-red-team-tribal-knowledge-from-the-best-in-offensive-cybersecurity-B07VWHCQMR
View Detail

Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity

tribe-of-hackers-security-leaders-tribal-knowledge-from-the-best-in-cybersecurity-B086QB8FMD
View Detail

Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity…

black-hat-go-go-programming-for-hackers-and-pentesters-B073NPY29N
View Detail

Black Hat Go: Go Programming For Hackers and Pentesters

the-web-application-hackers-handbook-finding-and-exploiting-security-flaws-B005LVQA9S
View Detail

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

cybersecurity-attack-and-defense-strategies-counter-modern-threats-and-employ-stateoftheart-tools-and-techniques-to-protect-your-organization-against-cybercriminals-2nd-edition-B081SSGKF5
View Detail

Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition

beyond-the-basic-stuff-with-python-best-practices-for-writing-clean-code-B07S2N8Q48
View Detail

Beyond the Basic Stuff with Python: Best Practices for Writing Clean Code

big-breaches-cybersecurity-lessons-for-everyone-B08XK21PSY
View Detail

Big Breaches: Cybersecurity Lessons for Everyone

building-secure-and-reliable-systems-best-practices-for-designing-implementing-and-B088Y67XG4
View Detail

Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and…

cybersecurity-blue-team-toolkit-B07QBDQ699
View Detail

Cybersecurity Blue Team Toolkit

how-to-measure-anything-in-cybersecurity-risk-B01J4XYM16
View Detail

How to Measure Anything in Cybersecurity Risk

cybersecurity-ops-with-bash-attack-defend-and-analyze-from-the-command-line-B07Q63J3WP
View Detail

Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line

practical-reverse-engineering-x86-x64-arm-windows-kernel-reversing-tools-and-obfuscation-B00IA22R2Y
View Detail

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

tribe-of-hackers-cybersecurity-advice-from-the-best-hackers-in-the-world-B07VPLR1DS
View Detail

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World

realworld-bug-hunting-a-field-guide-to-web-hacking-B072SQZ2LG
View Detail

Real-World Bug Hunting: A Field Guide to Web Hacking

ultimate-guide-for-being-anonymous-avoiding-prison-time-for-fun-and-profit-hacking-the-B071RSW5M4
View Detail

Ultimate Guide for being Anonymous: Avoiding prison time for fun and profit (Hacking the…

sandworm-a-new-era-of-cyberwar-and-the-hunt-for-the-kremlins-most-dangerous-hackers-B07GD4MFW2
View Detail

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

agile-application-security-enabling-security-in-a-continuous-delivery-pipeline-B075HMJWBK
View Detail

Agile Application Security: Enabling Security in a Continuous Delivery Pipeline

the-essential-guide-to-cybersecurity-for-smbs-B086BDFYZP
View Detail

The Essential Guide to Cybersecurity for SMBs

practical-mobile-forensics-forensically-investigate-and-analyze-ios-android-and-windows-10-devices-4th-edition-B07YSTKGD5
View Detail

Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devices, 4th Edition

hacking-the-art-of-exploitation-2nd-edition-B004OEJN3I
View Detail

Hacking: The Art of Exploitation, 2nd Edition

ghidra-software-reverse-engineering-for-beginners-analyze-identify-and-avoid-B08MFQJGT3
View Detail

Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid…

gpen-giac-certified-penetration-tester-allinone-exam-guide-B088P2WBSV
View Detail

GPEN GIAC Certified Penetration Tester All-in-One Exam Guide

what-they-didnt-tell-me-how-to-be-a-resilient-leader-and-build-teams-you-can-B08P3XN7TN
View Detail

What They Didn’t Tell Me: How to Be a Resilient Leader and Build Teams You Can…

aws-certified-security-specialty-allinone-exam-guide-exam-scsc01-B08DL62HVP
View Detail

AWS Certified Security Specialty All-in-One Exam Guide (Exam SCS-C01)

learn-kubernetes-security-securely-orchestrate-scale-and-manage-your-B087Q9G51R
View Detail

Learn Kubernetes Security: Securely orchestrate, scale, and manage your…

threat-hunting-hacking-and-intrusion-detection-scada-dark-web-and-apts-cyber-secrets-1-B089R35Q62
View Detail

Threat Hunting, Hacking, and Intrusion Detection - (SCADA, Dark Web, and APTs): Cyber Secrets 1

learning-by-practicing-hack-detect-leveraging-the-cyber-kill-chain-for-practical-B07L3F9YB7
View Detail

Learning by Practicing - Hack & Detect: Leveraging the Cyber Kill Chain for Practical…

startup-secure-baking-cybersecurity-into-your-company-from-founding-to-exit-B092TSY1QL
View Detail

Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit

the-ghidra-book-the-definitive-guide-B0852N9Y4Q
View Detail

The Ghidra Book: The Definitive Guide

cyberjutsu-cybersecurity-for-the-modern-ninja-B0852NZ1JX
View Detail

Cyberjutsu: Cybersecurity for the Modern Ninja

modern-computer-architecture-and-organization-learn-x86-arm-and-riscv-B083QJG28Y
View Detail

Modern Computer Architecture and Organization: Learn x86, ARM, and RISC-V…

applied-incident-response-B083XF121Z
View Detail

Applied Incident Response

hunting-cyber-criminals-a-hackers-guide-to-online-intelligence-gathering-tools-and-B083VZTL52
View Detail

Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and…

engineering-trustworthy-systems-get-cybersecurity-design-right-the-first-time-B07F2RV9HN
View Detail

Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

present-future-business-science-and-the-deep-tech-revolution-B08WHVXVVS
View Detail

Present Future: Business, Science, and the Deep Tech Revolution

how-to-hack-like-a-pornstar-a-step-by-step-process-for-breaking-into-a-bank-hacking-B01MTDLGQQ
View Detail

How to Hack Like a PORNSTAR: A step by step process for breaking into a BANK (Hacking…

blue-team-field-manual-btfm-rtfm-B077WF4WYV
View Detail

Blue Team Field Manual (BTFM) (RTFM)

open-source-intelligence-methods-and-tools-a-practical-guide-to-online-intelligence-B07F5Y6P56
View Detail

Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence

basic-security-testing-with-kali-linux-third-edition-B07HB7MFQR
View Detail

Basic Security Testing With Kali Linux, Third Edition

how-to-teach-anything-break-down-complex-topics-and-explain-with-clarity-while-keeping-engagement-and-motivation-learning-how-to-learn-book-13-B08TVXZYCP
View Detail

How to Teach Anything: Break Down Complex Topics and Explain with Clarity, While Keeping Engagement and Motivation (Learning how to Learn Book 13)

we-are-bellingcat-global-crime-online-sleuths-and-the-bold-future-of-news-B08N4SBFM6
View Detail

We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News

how-to-think-like-a-manager-for-the-cissp-exam-B08D9L1BTF
View Detail

How To Think Like A Manager for the CISSP Exam

banner

Popular Genres

  • children books 339
  • literature books 256
  • arts books 211
  • christian books 192
  • hobbies books 144
  • teen books 141
  • business books 137
  • spirituality books 132
  • cookbooks books 119

Follow Us

  • FACEBOOK
  • TWITTER
  • LINKEDIN
  • PINTEREST
  • INSTAGRAM
  • YOUTUBE

Trending Books

healing-kitchen-1628600942
Healing Kitchen
( 209 Reviews )
hans-christian-andersens-complete-fairy-tales-B076X7872Z
Hans Christian Andersen's Complete Fairy Tales
( 210 Reviews )
song-of-the-stars-a-christmas-story-0310722918
Song of the Stars: A Christmas Story
( 200 Reviews )
the-united-states-constitution-B00GJZ70LC
The United States Constitution
( 869 Reviews )
Footer Logo

The RIGHT book in the RIGHT hands at the RIGHT time can let you make RIGHT decision in your life.

About Us

  • 242 W 41st St, New York City, NY 10011, USA
  • contact@nicebooks.net
  • Contact Us
  • Privacy Policy

Copyright Ⓒ 2025 Nice Books Inc. All Rights Reserved.

  • Home
  • Books
    • arts books
    • memoirs books
    • business books
    • calendars books
    • children books
    • christian books
    • comics books
    • technology books
    • cookbooks books
    • hobbies books
    • education books
    • engineering books
    • health books
    • history books
    • entertainment books
    • law books
    • lgbtq books
    • literature books
    • medical books
    • mystery books
    • relationships books
    • politics books
    • reference books
    • spirituality books
    • romance books
    • science books
    • fantasy books
    • selfhelp books
    • sports books
    • teen books
    • preparation books
    • travel books
  • Genres
  • New Release