Cyber Security


Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Hacking: The Art of Exploitation w/CD
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Social Engineering
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
The Art of Deception: Controlling the Human Element of Security
Metasploit: The Penetration Tester's Guide
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Penetration Testing: A Hands-On Introduction to Hacking
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Data is not just information; it’s the thread that binds our identities to the hands that pull it.
Timsux Wales

Security is an outcome of thoughtful design, not a product you install or a checklist you complete.
Timsux Wales

More quotes...
From May 04, 2013 to June 03, 2013. If you've been worrying about how vulnerable we're becoming …more
1 member, last active 13 years ago
Welcome to the Cyber Security Book Club — a community for infosec professionals, ethical hackers…more
2 members, last active 5 months ago