Cybersecurity


Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
The Art of Deception: Controlling the Human Element of Security
Social Engineering
Hacking: The Art of Exploitation w/CD
Dark Territory: The Secret History of Cyber War
The Perfect Weapon: How the Cyber Arms Race Set the World Afire
Permanent Record
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
This Is How They Tell Me the World Ends by Nicole PerlrothDark Mirror by Barton GellmanPermanent Record by Edward SnowdenDigital Danger by Eric ColeCountdown to Zero Day by Kim Zetter
Gehackt! A Storytel Original series
97 books — 4 voters
Web Hacking Arsenal by Rafay  BalochCult of the Dead Cow by Joseph MennThe Cuckoo's Egg by Clifford StollHacking by Jon EricksonGhost in the Wires by Kevin D. Mitnick
The Best Hacking Books
76 books — 45 voters

Confident Cyber Security by Jessica BarkerKingdom of Lies by Kate FazziniThe Art of Deception by Kevin D. MitnickDigital Danger by Eric ColeQuiet by Susan Cain
Women in Cybersecurity
23 books — 4 voters

You'll See This Message When It Is Too Late by Josephine WolffDigital Danger by Eric ColeThinking about Cybersecurity by Paul RosenzweigDawn of the Code War by John P. CarlinCult of the Dead Cow by Joseph Menn
Key Cybersecurity Reads
13 books — 2 voters

The much-lamented "cybersecurity skills gap" is a myth. Or more precisely, it's a symptom. The real disease is a generational leadership gap. ...more
Ludmila Morozova-Buss

Naiyem Chowdhury Rony
What began as a tool for privacy became a playground for crime.
Naiyem Chowdhury Rony, The Dark Web Diaries

More quotes...
Kick off this new year with a thrilling reading challenge
2 members, last active one year ago
Cybersecurity Book Club - LinkedIn Group
1 member, last active 3 years ago
Here are some suggested books to read during your cybersecurity journey! Check back often as we …more
2 members, last active 6 years ago
A place for Security Weekly hosts, employees, and listeners to share book's that they have read.…more
5 members, last active 4 years ago