1 |
|
Disrupt or Die: What the World Needs to Learn from Silicon Valley to Survive the Digital Era
by
4.07 avg rating — 42 ratings
|
|
2 |
|
Zero Trust Networks: Building Secure Systems in Untrusted Networks
by
4.03 avg rating — 215 ratings
|
|
3 |
|
Small Business Cyber Security: Your Customers Can Trust You...Right?
by
liked it 3.00 avg rating — 3 ratings
|
|
4 |
|
Learn Social Engineering: Learn the Art of Human Hacking with an Internationally Renowned Expert
by
4.27 avg rating — 11 ratings
|
|
5 |
|
The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America
by
3.86 avg rating — 1,670 ratings
|
|
6 |
|
Chaos Engineering
by
4.22 avg rating — 128 ratings
|
|
7 |
|
No More Magic Wands: Transformative Cybersecurity Change for Everyone
by
3.46 avg rating — 46 ratings
|
|
8 |
|
Abundance: The Future Is Better Than You Think (Exponential Technology Series)
by
4.05 avg rating — 11,604 ratings
|
|
9 |
|
Cybersecurity: A Business Solution: An executive perspective on managing cyber risk
by
really liked it 4.00 avg rating — 11 ratings
|
|
10 |
|
Exponential Organizations: Why New Organizations Are Ten Times Better, Faster, Cheaper Than Yours
by
4.07 avg rating — 4,822 ratings
|
|
11 |
|
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age
by
4.04 avg rating — 1,593 ratings
|
|
12 |
|
CISO Desk Reference Guide Volume 2: A Practical Guide for CISOs
by
4.80 avg rating — 5 ratings
|
|
13 |
|
American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road
by
4.41 avg rating — 52,072 ratings
|
|
14 |
|
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
by
4.48 avg rating — 606 ratings
|
|
15 |
|
World-Class Risk Management
by
really liked it 4.00 avg rating — 20 ratings
|
|
16 |
|
Cyberlaw: The Law of the Internet and Information Technology
by
3.43 avg rating — 14 ratings
|
|
17 |
|
DarkMarket: Cyberthieves, Cybercops and You
by
3.78 avg rating — 1,259 ratings
|
|
18 |
|
CISO Desk Reference Guide: A Practical Guide for CISOs
by
4.29 avg rating — 28 ratings
|
|
19 |
|
Take Back Control of Your Cybersecurity Now: Game Changing Concepts on AI and Cyber Governance Solutions for Executives
by
3.33 avg rating — 3 ratings
|
|
20 |
|
Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World
by
3.38 avg rating — 4,701 ratings
|
|
21 |
|
The Dark Net: Inside the Digital Underworld
by
3.64 avg rating — 4,980 ratings
|
|
22 |
|
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
by
really liked it 4.00 avg rating — 3,860 ratings
|
|
23 |
|
The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary
by
3.83 avg rating — 4,288 ratings
|
|
24 |
|
The Hardware Hacker: Adventures in Making and Breaking Hardware
by
4.29 avg rating — 546 ratings
|
|
25 |
|
Advanced Persistent Security
by
3.17 avg rating — 12 ratings
|
|
26 |
|
Women in Cybersecurity
by
liked it 3.00 avg rating — 4 ratings
|
|
27 |
|
Site Reliability Engineering: How Google Runs Production Systems
by
4.21 avg rating — 2,875 ratings
|
|
28 |
|
Spies Among Us: How To Stop The Spies, Terrorists, Hackers, And Criminals You Don't Even Know You Encounter Every Day
by
3.66 avg rating — 105 ratings
|
|
29 |
|
Cyber-Security: Geo-Politics, Law and Policy
by
liked it 3.00 avg rating — 2 ratings
|
|
30 |
|
Cybersecurity Leadership: Powering the Modern Organization
by
3.64 avg rating — 61 ratings
|
|
31 |
|
The Seventh Sense: Power, Fortune, and Survival in the Age of Networks
by
3.69 avg rating — 1,500 ratings
|
|
32 |
|
Information Disposition: A Practical Guide to the Secure, Compliant Disposal of Records, Media and IT Assets
by
0.00 avg rating — 0 ratings
|
|
33 |
|
How to Measure Anything Workbook: Finding the Value of Intangibles in Business
by
4.08 avg rating — 216 ratings
|
|
34 |
|
Artificial Intelligence: A Modern Approach
by
4.20 avg rating — 4,416 ratings
|
|
35 |
|
Cybersecurity Dilemma
by
4.21 avg rating — 52 ratings
|
|
36 |
|
American Spies: Modern Surveillance, Why You Should Care, and What to Do About It
by
4.03 avg rating — 34 ratings
|
|
37 |
|
Cyberdeterrence and Cyberwar
by
3.20 avg rating — 84 ratings
|
|
38 |
|
Against the Gods: The Remarkable Story of Risk
by
3.96 avg rating — 14,321 ratings
|
|
39 |
|
How to Measure Anything in Cybersecurity Risk
by
4.05 avg rating — 375 ratings
Joshua
added it to currently-reading
See Review
|
|
40 |
|
Cyberspace and the State: Towards a Strategy for Cyberpower (Adelphi series)
by
3.95 avg rating — 22 ratings
|
|
41 |
|
Cybersecurity and Cyberwar: What Everyone Needs to Know
by
3.83 avg rating — 1,395 ratings
|
|
42 |
|
The Psychology of Information Security: Resolving conflicts between security compliance and human behaviour
by
3.62 avg rating — 40 ratings
|
|
43 |
|
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
by
3.97 avg rating — 3,364 ratings
|
|
44 |
|
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
by
4.17 avg rating — 8,172 ratings
Joshua
added it to to-read
See Review
|
|
45 |
|
Winning As a Ciso
by
2.60 avg rating — 5 ratings
|
|
46 |
|
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
by
4.28 avg rating — 15,542 ratings
Joshua
added it to to-read
See Review
|
|
47 |
|
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
by
3.75 avg rating — 2,739 ratings
Joshua
rated it 3 stars
See Review
|
|
48 |
|
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State
by
4.07 avg rating — 15,001 ratings
|
|
49 |
|
Worm: The First Digital World War
by
3.60 avg rating — 2,298 ratings
|
|
50 |
|
Where Wizards Stay Up Late: The Origins of the Internet
by
3.94 avg rating — 4,882 ratings
|
|
51 |
|
America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare
by
3.84 avg rating — 451 ratings
|
|
52 |
|
Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell
by
4.20 avg rating — 1,757 ratings
Joshua
added it to to-read
See Review
|
|
53 |
|
Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance
by
3.67 avg rating — 657 ratings
Joshua
added it to to-read
See Review
|
|
54 |
|
Rise of the Machines: A Cybernetic History
by
3.87 avg rating — 454 ratings
|
|
55 |
|
Dark Territory: The Secret History of Cyber War
by
3.90 avg rating — 3,152 ratings
Joshua
added it to to-read
See Review
|
|
56 |
|
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
by
3.69 avg rating — 1,111 ratings
|
|
57 |
|
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
by
3.97 avg rating — 8,042 ratings
|
|
58 |
|
Future Crimes
by
3.93 avg rating — 4,381 ratings
|
|
59 |
|
Cryptonomicon
by
4.23 avg rating — 116,291 ratings
Joshua
added it to to-read
See Review
|
|
60 |
|
Daemon (Daemon, #1)
by
4.16 avg rating — 48,195 ratings
Joshua
added it to to-read
See Review
|
|
61 |
|
Freedom™ (Daemon, #2)
by
4.26 avg rating — 30,116 ratings
|
|
62 |
|
Neuromancer (Sprawl #1)
by
3.89 avg rating — 358,718 ratings
Joshua
added it to to-read
See Review
|
|
63 |
|
Reamde
by
3.99 avg rating — 56,995 ratings
Joshua
added it to to-read
See Review
|
|
64 |
|
Snow Crash
by
4.01 avg rating — 295,498 ratings
Joshua
added it to to-read
See Review
|
|
65 |
|
The Blue Nowhere
by
3.99 avg rating — 11,826 ratings
|
|
66 |
|
The Girl With the Dragon Tattoo (Millennium, #1)
by
4.17 avg rating — 3,408,803 ratings
|
|
67 |
|
Trojan Horse (Jeff Aiken, #2)
by
3.79 avg rating — 2,270 ratings
|
|
68 |
|
Zero Day (Jeff Aiken, #1)
by
3.56 avg rating — 5,881 ratings
|
|
69 |
|
Breakpoint
by
3.37 avg rating — 565 ratings
Joshua
added it to to-read
See Review
|
|
70 |
|
The Florentine Deception
by
3.78 avg rating — 354 ratings
Joshua
added it to to-read
See Review
|
|
71 |
|
Code of the Cynja: Volume 2
by
really liked it 4.00 avg rating — 2 ratings
|
|
72 |
|
Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power
by
3.97 avg rating — 1,135 ratings
|
|
73 |
|
Cyber War: The Next Threat to National Security and What to Do About It
by
3.73 avg rating — 2,451 ratings
Joshua
added it to to-read
See Review
|
|
74 |
|
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
by
3.53 avg rating — 86 ratings
|
|
75 |
|
There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar
by
really liked it 4.00 avg rating — 44 ratings
|
|
76 |
|
Inside Cyber Warfare: Mapping the Cyber Underworld
by
3.37 avg rating — 212 ratings
|
|
77 |
|
Tallinn Manual on the International Law Applicable to Cyber Warfare
by
4.16 avg rating — 31 ratings
|
|
78 |
|
@War: The Rise of the Military-Internet Complex
by
3.77 avg rating — 1,257 ratings
|
|
79 |
|
Information Warfare: Chaos on the Electronic Superhighway
by
3.48 avg rating — 27 ratings
|
|
80 |
|
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) (SEI Series in Software Engineering)
by
3.90 avg rating — 42 ratings
|
|
81 |
|
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
by
4.06 avg rating — 262 ratings
Joshua
added it to to-read
See Review
|
|
82 |
|
Metasploit: The Penetration Tester's Guide
by
4.07 avg rating — 865 ratings
Joshua
added it to to-read
See Review
|
|
83 |
|
Security Metrics: Replacing Fear, Uncertainty, and Doubt
by
3.80 avg rating — 109 ratings
|
|
84 |
|
Measuring and Managing Information Risk: A FAIR Approach
by
4.29 avg rating — 110 ratings
|
|
85 |
|
Locked Down: Information Security for Lawyers
by
2.80 avg rating — 5 ratings
|
|
86 |
|
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
by
4.30 avg rating — 28,711 ratings
Joshua
added it to to-read
See Review
|
|
87 |
|
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization
by
3.97 avg rating — 31 ratings
|
|
88 |
|
Hacking Exposed 7: Network Security Secrets and Solutions
by
3.80 avg rating — 1,165 ratings
|
|
89 |
|
Cyber Operations and the Use of Force in International Law
by
it was amazing 5.00 avg rating — 4 ratings
|
|
90 |
|
Navigating the Digital Age
by
3.50 avg rating — 2 ratings
|
|
91 |
|
Secrets and Lies: Digital Security in a Networked World
by
3.93 avg rating — 1,791 ratings
Joshua
added it to to-read
See Review
|
|
92 |
|
Unmasking the Social Engineer: The Human Element of Security
by
3.71 avg rating — 278 ratings
|
|
93 |
|
The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win
by
4.26 avg rating — 49,369 ratings
Joshua
rated it 3 stars
See Review
|
|
94 |
|
Python Forensics: A Workbench for Inventing and Sharing Digital Forensic Technology
by
4.43 avg rating — 14 ratings
|
|
95 |
|
The Internet Police: How Crime Went Online, and the Cops Followed
by
3.66 avg rating — 201 ratings
|
|