| 1 |
|
Disrupt or Die: What the World Needs to Learn from Silicon Valley to Survive the Digital Era
by
4.07 avg rating — 42 ratings
|
|
| 2 |
|
Zero Trust Networks: Building Secure Systems in Untrusted Networks
by
4.02 avg rating — 216 ratings
|
|
| 3 |
|
Small Business Cyber Security: Your Customers Can Trust You...Right?
by
liked it 3.00 avg rating — 3 ratings
|
|
| 4 |
|
Learn Social Engineering: Learn the Art of Human Hacking with an Internationally Renowned Expert
by
4.27 avg rating — 11 ratings
|
|
| 5 |
|
The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America
by
3.86 avg rating — 1,670 ratings
|
|
| 6 |
|
Chaos Engineering
by
4.22 avg rating — 129 ratings
|
|
| 7 |
|
No More Magic Wands: Transformative Cybersecurity Change for Everyone
by
3.46 avg rating — 46 ratings
|
|
| 8 |
|
Abundance: The Future Is Better Than You Think (Exponential Technology Series)
by
4.05 avg rating — 11,618 ratings
|
|
| 9 |
|
Cybersecurity: A Business Solution: An executive perspective on managing cyber risk
by
really liked it 4.00 avg rating — 11 ratings
|
|
| 10 |
|
Exponential Organizations: Why New Organizations Are Ten Times Better, Faster, Cheaper Than Yours
by
4.07 avg rating — 4,831 ratings
|
|
| 11 |
|
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age
by
4.04 avg rating — 1,600 ratings
|
|
| 12 |
|
CISO Desk Reference Guide Volume 2: A Practical Guide for CISOs
by
4.80 avg rating — 5 ratings
|
|
| 13 |
|
American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road
by
4.41 avg rating — 52,643 ratings
|
|
| 14 |
|
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
by
4.48 avg rating — 605 ratings
|
|
| 15 |
|
World-Class Risk Management
by
really liked it 4.00 avg rating — 20 ratings
|
|
| 16 |
|
Cyberlaw: The Law of the Internet and Information Technology
by
3.43 avg rating — 14 ratings
|
|
| 17 |
|
DarkMarket: Cyberthieves, Cybercops and You
by
3.78 avg rating — 1,263 ratings
|
|
| 18 |
|
CISO Desk Reference Guide: A Practical Guide for CISOs
by
4.29 avg rating — 28 ratings
|
|
| 19 |
|
Take Back Control of Your Cybersecurity Now: Game Changing Concepts on AI and Cyber Governance Solutions for Executives
by
3.33 avg rating — 3 ratings
|
|
| 20 |
|
Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World
by
3.38 avg rating — 4,708 ratings
|
|
| 21 |
|
The Dark Net: Inside the Digital Underworld
by
3.64 avg rating — 4,991 ratings
|
|
| 22 |
|
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
by
really liked it 4.00 avg rating — 3,862 ratings
|
|
| 23 |
|
The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary
by
3.83 avg rating — 4,301 ratings
|
|
| 24 |
|
The Hardware Hacker: Adventures in Making and Breaking Hardware
by
4.29 avg rating — 549 ratings
|
|
| 25 |
|
Advanced Persistent Security
by
3.17 avg rating — 12 ratings
|
|
| 26 |
|
Women in Cybersecurity
by
liked it 3.00 avg rating — 4 ratings
|
|
| 27 |
|
Site Reliability Engineering: How Google Runs Production Systems
by
4.21 avg rating — 2,887 ratings
|
|
| 28 |
|
Spies Among Us: How To Stop The Spies, Terrorists, Hackers, And Criminals You Don't Even Know You Encounter Every Day
by
3.66 avg rating — 105 ratings
|
|
| 29 |
|
Cyber-Security: Geo-Politics, Law and Policy
by
liked it 3.00 avg rating — 2 ratings
|
|
| 30 |
|
Cybersecurity Leadership: Powering the Modern Organization
by
3.64 avg rating — 61 ratings
|
|
| 31 |
|
The Seventh Sense: Power, Fortune, and Survival in the Age of Networks
by
3.69 avg rating — 1,503 ratings
|
|
| 32 |
|
Information Disposition: A Practical Guide to the Secure, Compliant Disposal of Records, Media and IT Assets
by
it was amazing 5.00 avg rating — 1 rating
|
|
| 33 |
|
How to Measure Anything Workbook: Finding the Value of Intangibles in Business
by
4.08 avg rating — 216 ratings
|
|
| 34 |
|
Artificial Intelligence: A Modern Approach
by
4.20 avg rating — 4,431 ratings
|
|
| 35 |
|
Cybersecurity Dilemma
by
4.21 avg rating — 53 ratings
|
|
| 36 |
|
American Spies: Modern Surveillance, Why You Should Care, and What to Do About It
by
4.03 avg rating — 34 ratings
|
|
| 37 |
|
Cyberdeterrence and Cyberwar
by
3.20 avg rating — 85 ratings
|
|
| 38 |
|
Against the Gods: The Remarkable Story of Risk
by
3.96 avg rating — 14,396 ratings
|
|
| 39 |
|
How to Measure Anything in Cybersecurity Risk
by
4.05 avg rating — 378 ratings
Joshua
added it to currently-reading
See Review
|
|
| 40 |
|
Cyberspace and the State: Towards a Strategy for Cyberpower (Adelphi series)
by
3.95 avg rating — 22 ratings
|
|
| 41 |
|
Cybersecurity and Cyberwar: What Everyone Needs to Know
by
3.83 avg rating — 1,401 ratings
|
|
| 42 |
|
The Psychology of Information Security: Resolving conflicts between security compliance and human behaviour
by
3.62 avg rating — 40 ratings
|
|
| 43 |
|
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
by
3.97 avg rating — 3,367 ratings
|
|
| 44 |
|
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
by
4.17 avg rating — 8,221 ratings
Joshua
added it to to-read
See Review
|
|
| 45 |
|
Winning As a Ciso
by
2.60 avg rating — 5 ratings
|
|
| 46 |
|
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
by
4.28 avg rating — 15,712 ratings
Joshua
added it to to-read
See Review
|
|
| 47 |
|
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
by
3.75 avg rating — 2,744 ratings
Joshua
rated it 3 stars
See Review
|
|
| 48 |
|
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State
by
4.07 avg rating — 15,032 ratings
|
|
| 49 |
|
Worm: The First Digital World War
by
3.60 avg rating — 2,303 ratings
|
|
| 50 |
|
Where Wizards Stay Up Late: The Origins of the Internet
by
3.94 avg rating — 4,903 ratings
|
|
| 51 |
|
America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare
by
3.84 avg rating — 450 ratings
|
|
| 52 |
|
Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell
by
4.20 avg rating — 1,771 ratings
Joshua
added it to to-read
See Review
|
|
| 53 |
|
Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance
by
3.67 avg rating — 656 ratings
Joshua
added it to to-read
See Review
|
|
| 54 |
|
Rise of the Machines: A Cybernetic History
by
3.88 avg rating — 460 ratings
|
|
| 55 |
|
Dark Territory: The Secret History of Cyber War
by
3.90 avg rating — 3,167 ratings
Joshua
added it to to-read
See Review
|
|
| 56 |
|
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
by
3.69 avg rating — 1,111 ratings
|
|
| 57 |
|
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
by
3.97 avg rating — 8,050 ratings
|
|
| 58 |
|
Future Crimes
by
3.92 avg rating — 4,388 ratings
|
|
| 59 |
|
Cryptonomicon
by
4.23 avg rating — 116,561 ratings
Joshua
added it to to-read
See Review
|
|
| 60 |
|
Daemon (Daemon, #1)
by
4.16 avg rating — 48,356 ratings
Joshua
added it to to-read
See Review
|
|
| 61 |
|
Freedom™ (Daemon, #2)
by
4.26 avg rating — 30,224 ratings
|
|
| 62 |
|
Neuromancer (Sprawl #1)
by
3.89 avg rating — 361,084 ratings
Joshua
added it to to-read
See Review
|
|
| 63 |
|
Reamde
by
3.99 avg rating — 57,133 ratings
Joshua
added it to to-read
See Review
|
|
| 64 |
|
Snow Crash
by
4.01 avg rating — 296,544 ratings
Joshua
added it to to-read
See Review
|
|
| 65 |
|
The Blue Nowhere
by
3.99 avg rating — 11,890 ratings
|
|
| 66 |
|
The Girl With the Dragon Tattoo (Millennium, #1)
by
4.18 avg rating — 3,422,254 ratings
|
|
| 67 |
|
Trojan Horse (Jeff Aiken, #2)
by
3.80 avg rating — 2,272 ratings
|
|
| 68 |
|
Zero Day (Jeff Aiken, #1)
by
3.57 avg rating — 5,889 ratings
|
|
| 69 |
|
Breakpoint
by
3.37 avg rating — 566 ratings
Joshua
added it to to-read
See Review
|
|
| 70 |
|
The Florentine Deception
by
3.78 avg rating — 357 ratings
Joshua
added it to to-read
See Review
|
|
| 71 |
|
Code of the Cynja: Volume 2
by
really liked it 4.00 avg rating — 2 ratings
|
|
| 72 |
|
Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power
by
3.97 avg rating — 1,135 ratings
|
|
| 73 |
|
Cyber War: The Next Threat to National Security and What to Do About It
by
3.73 avg rating — 2,455 ratings
Joshua
added it to to-read
See Review
|
|
| 74 |
|
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
by
3.53 avg rating — 86 ratings
|
|
| 75 |
|
There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar
by
really liked it 4.00 avg rating — 44 ratings
|
|
| 76 |
|
Inside Cyber Warfare: Mapping the Cyber Underworld
by
3.37 avg rating — 213 ratings
|
|
| 77 |
|
Tallinn Manual on the International Law Applicable to Cyber Warfare
by
4.16 avg rating — 31 ratings
|
|
| 78 |
|
@war: The Rise of the Military- Internet Complex
by
3.76 avg rating — 1,259 ratings
|
|
| 79 |
|
Information Warfare: Chaos on the Electronic Superhighway
by
3.48 avg rating — 27 ratings
|
|
| 80 |
|
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) (SEI Series in Software Engineering)
by
3.90 avg rating — 42 ratings
|
|
| 81 |
|
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
by
4.07 avg rating — 265 ratings
Joshua
added it to to-read
See Review
|
|
| 82 |
|
Metasploit: The Penetration Tester's Guide
by
4.07 avg rating — 867 ratings
Joshua
added it to to-read
See Review
|
|
| 83 |
|
Security Metrics: Replacing Fear, Uncertainty, and Doubt
by
3.80 avg rating — 109 ratings
|
|
| 84 |
|
Measuring and Managing Information Risk: A FAIR Approach
by
4.30 avg rating — 111 ratings
|
|
| 85 |
|
Locked Down: Information Security for Lawyers
by
2.80 avg rating — 5 ratings
|
|
| 86 |
|
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
by
4.30 avg rating — 28,804 ratings
Joshua
added it to to-read
See Review
|
|
| 87 |
|
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization
by
3.97 avg rating — 31 ratings
|
|
| 88 |
|
Hacking Exposed 7: Network Security Secrets and Solutions
by
3.80 avg rating — 1,165 ratings
|
|
| 89 |
|
Cyber Operations and the Use of Force in International Law
by
it was amazing 5.00 avg rating — 4 ratings
|
|
| 90 |
|
Navigating the Digital Age
by
3.50 avg rating — 2 ratings
|
|
| 91 |
|
Secrets and Lies: Digital Security in a Networked World
by
3.93 avg rating — 1,793 ratings
Joshua
added it to to-read
See Review
|
|
| 92 |
|
Unmasking the Social Engineer: The Human Element of Security
by
3.71 avg rating — 280 ratings
|
|
| 93 |
|
The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win
by
4.26 avg rating — 49,646 ratings
Joshua
rated it 3 stars
See Review
|
|
| 94 |
|
Python Forensics: A Workbench for Inventing and Sharing Digital Forensic Technology
by
4.43 avg rating — 14 ratings
|
|
| 95 |
|
The Internet Police: How Crime Went Online, and the Cops Followed
by
3.66 avg rating — 201 ratings
|
|