Security


The Art of Deception: Controlling the Human Element of Security
Hacking: The Art of Exploitation w/CD
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Security Engineering: A Guide to Building Dependable Distributed Systems
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Secrets and Lies: Digital Security in a Networked World
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Metasploit: The Penetration Tester's Guide
Threat Modeling: Designing for Security
The Tangled Web: A Guide to Securing Modern Web Applications
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Exploding the Phone by Phil  LapsleyThe Internet Police by Nate AndersonOn Internet Freedom by Marvin AmmoriBeyond WikiLeaks by Benedetta BreviniCopyright Unbalanced by Jerry Brito
EFF's Reading List: Books of 2013
17 books — 2 voters
You'll See This Message When It Is Too Late by Josephine WolffThinking about Cybersecurity by Paul RosenzweigDawn of the Code War by John P. CarlinCult of the Dead Cow by Joseph MennThe Cuckoo's Egg by Clifford Stoll
Key Cybersecurity Reads
12 books — 1 voter

The Volunteer by Michael RossSpies Against Armageddon by Dan RavivThe Mission, the Men, and Me by Pete BlaberInside Delta Force by Eric L. HaneyRed Teams and Counterterrorism Training (Volume 7) by Stephen Sloan
Red Teams Bookshelf
23 books — 4 voters
Hackers by Steven LevyJulian Assange - The Unauthorised Autobiography by Julian AssangeWe Are All Targets by Matt PotterВторжение. Краткая история русских хакеров by Даниил ТуровскийThe Cathedral & the Bazaar by Eric S. Raymond
History of Hackers
19 books — 4 voters

Dwight D. Eisenhower
If you want total security, go to prison. There you're fed, clothed, given medical care and so on. The only thing lacking... is freedom. ...more
Dwight D. Eisenhower

When a man touches a woman's body, he is not just touching her body. It goes MUCH DEEPER than that for a woman. He is touching parts of her soul-parts as diverse as how she feels about being a grandmother some day, to what is her favorite ice cream, to how much she loves her pet, and to her opinion of how the current President is governing. The man wants a sexual encounter and love is far from his mind; she desires permanence, commitment, safety, and security. ...more
Jim Anderson, Unmasked: Exposing the Cultural Sexual Assualt

More quotes...
The Cybersecurity Book Club It's Goodreads' book club to discuss – online and in person – the best books on digital security…more
189 members, last active 41 days ago
I am starting this group so people can share there books and ideas.
1 member, last active 7 years ago
Sharing books and studies on studies on China, the United States, and the bilateral relations.
2 members, last active 5 years ago
#NatSecGirlSquad Book Club A virtual book club for those interested in reading new titles in security studies. Visit https:…more
12 members, last active 5 years ago