Cybersecurity


Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
The Art of Deception: Controlling the Human Element of Security
Social Engineering
Hacking: The Art of Exploitation w/CD
Dark Territory: The Secret History of Cyber War
The Perfect Weapon: How the Cyber Arms Race Set the World Afire
Permanent Record
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
Web Hacking Arsenal by Rafay  BalochSecurity Engineering by Ross J. AndersonIntroduction to Security and Applied Cryptography by Bruce SchneierPractical Malware Analysis by Michael SikorskiThe Web Application Hacker's Handbook by Dafydd Stuttard
Information Security
80 books — 84 voters
You'll See This Message When It Is Too Late by Josephine WolffThinking about Cybersecurity by Paul RosenzweigDawn of the Code War by John P. CarlinCult of the Dead Cow by Joseph MennThe Cuckoo's Egg by Clifford Stoll
Key Cybersecurity Reads
12 books — 1 voter

This Is How They Tell Me the World Ends by Nicole PerlrothDark Mirror by Barton GellmanPermanent Record by Edward SnowdenCountdown to Zero Day by Kim ZetterIk weet je wachtwoord by Daniël Verlaan
Gehackt! A Storytel Original series
96 books — 3 voters
Hackers by Steven LevyJulian Assange - The Unauthorised Autobiography by Julian AssangeВторжение. Краткая история русских хакеров by Даниил ТуровскийWe Are All Targets by Matt PotterCyberwar by Kathleen Hall Jamieson
History of Hackers
19 books — 4 voters

Industrial Automation and Control System Security Principles by Ronald L. KrutzIndustrial Cybersecurity by Pascal AckermanIndustrial Cybersecurity by Steve MustardIndustrial Network Security by David J. TeumimIndustrial Network Security by Eric D. Knapp
Industrial Cybersecurity
10 books — 1 voter
This Is How They Tell Me the World Ends by Nicole Perlroth1984 by George OrwellSandworm by Andy GreenbergRange by David   EpsteinIntroduction to Computer Security by Matt Bishop
Cybersecurity Fellows Reading List
16 books — 3 voters

Cybersecurity is a condition of existence, not a feature. It is not something you 'add' once value is created. Without Cybersecurity there is no trust, no continuity, no sovereignty of decision. ...more
Stephane Nappo

How can one identify the true owner of a cyber risk? When everyone is responsible, no one is responsible. This is an undisputed fact. To the best of my knowledge, organizations often rely on frameworks such as RACI matrices (Responsible, Accountable, Consulted, Informed) to formally assign ownership. From another perspective, however, the “true owner” of a cyber threat is its creator. And here is where the truth may reside. Whether it is hackers, insiders, corporate culture, a lack of CISO e ...more
Ludmila Morozova-Buss

More quotes...
Digital Forensics & Incident Response (DFIR) Discussions of DFIR/cybercrime books and writing of these books and topics in both fiction and n…more
16 members, last active 8 years ago
Let's share cybersecurity best reads…more
3 members, last active 7 years ago
The CISOs Book Club This is a book club for CISOs, Security and Risk Management Leaders and Cybersecurity profession…more
66 members, last active one year ago
Hacker in Heels Hacker in Heels is an online platform with content, courses, and community with the goal of help…more
16 members, last active 6 years ago