92 books
—
3 voters
Cybersecurity Books
Showing 1-50 of 2,171
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Kindle Edition)
by (shelved 126 times as cybersecurity)
avg rating 4.34 — 10,226 ratings — published 2019
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (Hardcover)
by (shelved 111 times as cybersecurity)
avg rating 4.17 — 8,387 ratings — published 2014
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (Paperback)
by (shelved 99 times as cybersecurity)
avg rating 4.28 — 16,152 ratings — published 1989
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race (Hardcover)
by (shelved 97 times as cybersecurity)
avg rating 4.31 — 11,387 ratings — published 2021
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (Hardcover)
by (shelved 90 times as cybersecurity)
avg rating 3.97 — 27,566 ratings — published 2011
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data (Hardcover)
by (shelved 80 times as cybersecurity)
avg rating 3.98 — 5,488 ratings — published 2017
The Art of Deception: Controlling the Human Element of Security (Paperback)
by (shelved 60 times as cybersecurity)
avg rating 3.76 — 7,265 ratings — published 2001
Social Engineering (Paperback)
by (shelved 55 times as cybersecurity)
avg rating 3.83 — 3,919 ratings — published 2010
Hacking: The Art of Exploitation w/CD (Paperback)
by (shelved 53 times as cybersecurity)
avg rating 4.17 — 2,517 ratings — published 2003
Dark Territory: The Secret History of Cyber War (Hardcover)
by (shelved 49 times as cybersecurity)
avg rating 3.90 — 3,199 ratings — published 2016
The Perfect Weapon: How the Cyber Arms Race Set the World Afire (Hardcover)
by (shelved 48 times as cybersecurity)
avg rating 4.25 — 3,476 ratings — published 2018
Permanent Record (Hardcover)
by (shelved 46 times as cybersecurity)
avg rating 4.30 — 58,426 ratings — published 2019
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws (Paperback)
by (shelved 45 times as cybersecurity)
avg rating 4.23 — 1,229 ratings — published 2007
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World (Hardcover)
by (shelved 43 times as cybersecurity)
avg rating 3.75 — 2,437 ratings — published 2019
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door (Hardcover)
by (shelved 43 times as cybersecurity)
avg rating 3.74 — 2,756 ratings — published 2014
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)
by (shelved 41 times as cybersecurity)
avg rating 4.47 — 611 ratings — published 2011
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency (Hardcover)
by (shelved 40 times as cybersecurity)
avg rating 4.49 — 5,722 ratings — published
The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats (Hardcover)
by (shelved 40 times as cybersecurity)
avg rating 4.02 — 825 ratings — published 2019
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Paperback)
by (shelved 40 times as cybersecurity)
avg rating 4.30 — 29,137 ratings — published 1999
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground (Hardcover)
by (shelved 38 times as cybersecurity)
avg rating 3.97 — 8,090 ratings — published 2011
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (Paperback)
by (shelved 37 times as cybersecurity)
avg rating 3.90 — 262 ratings — published 2019
Future Crimes (Hardcover)
by (shelved 37 times as cybersecurity)
avg rating 3.92 — 4,402 ratings — published 2015
Black Hat Python: Python Programming for Hackers and Pentesters (Paperback)
by (shelved 35 times as cybersecurity)
avg rating 4.11 — 618 ratings — published 2014
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali (Kindle Edition)
by (shelved 34 times as cybersecurity)
avg rating 4.12 — 595 ratings — published 2018
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World (Paperback)
by (shelved 33 times as cybersecurity)
avg rating 3.83 — 1,110 ratings — published 2019
How to Measure Anything in Cybersecurity Risk (Hardcover)
by (shelved 32 times as cybersecurity)
avg rating 4.06 — 381 ratings — published 2016
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback)
by (shelved 32 times as cybersecurity)
avg rating 3.91 — 3,609 ratings — published 2005
Secrets and Lies: Digital Security in a Networked World (Paperback)
by (shelved 30 times as cybersecurity)
avg rating 3.93 — 1,794 ratings — published 2000
Cyberwar: The Next Threat to National Security & What to Do About It (Hardcover)
by (shelved 30 times as cybersecurity)
avg rating 3.73 — 2,465 ratings — published 2010
Security Engineering: A Guide to Building Dependable Distributed Systems (Hardcover)
by (shelved 29 times as cybersecurity)
avg rating 4.21 — 705 ratings — published
Penetration Testing: A Hands-On Introduction to Hacking (Paperback)
by (shelved 29 times as cybersecurity)
avg rating 4.18 — 398 ratings — published 2014
The Hacker Playbook 3: Practical Guide To Penetration Testing (Kindle Edition)
by (shelved 28 times as cybersecurity)
avg rating 4.40 — 262 ratings — published
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World (Paperback)
by (shelved 27 times as cybersecurity)
avg rating 4.00 — 3,886 ratings — published 2015
Blue Team Field Manual (BTFM) (Field Manual Series)
by (shelved 26 times as cybersecurity)
avg rating 4.20 — 359 ratings — published
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency (Hardcover)
by (shelved 26 times as cybersecurity)
avg rating 3.97 — 3,387 ratings — published 2012
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics (Hardcover)
by (shelved 25 times as cybersecurity)
avg rating 4.19 — 871 ratings — published 2020
Cybersecurity and Cyberwar: What Everyone Needs to Know (Paperback)
by (shelved 25 times as cybersecurity)
avg rating 3.83 — 1,417 ratings — published 2013
Threat Modeling: Designing for Security (Kindle Edition)
by (shelved 25 times as cybersecurity)
avg rating 4.07 — 286 ratings — published 2014
Metasploit: The Penetration Tester's Guide (Paperback)
by (shelved 24 times as cybersecurity)
avg rating 4.07 — 870 ratings — published 2011
Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks (Hardcover)
by (shelved 21 times as cybersecurity)
avg rating 3.93 — 2,008 ratings — published 2023
The Hacker Playbook 2: Practical Guide To Penetration Testing (Kindle Edition)
by (shelved 21 times as cybersecurity)
avg rating 4.24 — 445 ratings — published 2015
Applied Cryptography: Protocols, Algorithms, and Source Code in C (Hardcover)
by (shelved 20 times as cybersecurity)
avg rating 4.21 — 2,135 ratings — published 1993
Real-World Bug Hunting: A Field Guide to Web Hacking (Paperback)
by (shelved 19 times as cybersecurity)
avg rating 4.20 — 143 ratings — published
Hackers: Heroes of the Computer Revolution (Paperback)
by (shelved 19 times as cybersecurity)
avg rating 4.16 — 8,593 ratings — published 1984
Red Team Field Manual (Paperback)
by (shelved 19 times as cybersecurity)
avg rating 4.23 — 1,002 ratings — published 2014
Worm: The First Digital World War (Hardcover)
by (shelved 19 times as cybersecurity)
avg rating 3.60 — 2,319 ratings — published 2011
Internet (Hardcover)
by (shelved 18 times as cybersecurity)
avg rating 4.10 — 2,061 ratings — published 2021
The Pentester BluePrint: Starting a Career as an Ethical Hacker (Paperback)
by (shelved 18 times as cybersecurity)
avg rating 4.15 — 226 ratings — published 2020
Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath (Hardcover)
by (shelved 18 times as cybersecurity)
avg rating 3.71 — 5,588 ratings — published 2015
The Hacker Playbook: Practical Guide to Penetration Testing (Kindle Edition)
by (shelved 18 times as cybersecurity)
avg rating 3.97 — 477 ratings — published 2014
“How can one identify the true owner of a cyber risk?
When everyone is responsible, no one is responsible. This is an undisputed fact.
To the best of my knowledge, organizations often rely on frameworks such as RACI matrices (Responsible, Accountable, Consulted, Informed) to formally assign ownership.
From another perspective, however, the “true owner” of a cyber threat is its creator. And here is where the truth may reside.
Whether it is hackers, insiders, corporate culture, a lack of CISO expertise, disinformation, or perhaps the very silos you have built. And wait. What about your CIO, your CEO, your Board? Think of them as the first line of cyber threats.
I can. I am a scientist, a researcher. I search for what I cannot even imagine at first. Then - it is up to you to decide where to look.”
―
When everyone is responsible, no one is responsible. This is an undisputed fact.
To the best of my knowledge, organizations often rely on frameworks such as RACI matrices (Responsible, Accountable, Consulted, Informed) to formally assign ownership.
From another perspective, however, the “true owner” of a cyber threat is its creator. And here is where the truth may reside.
Whether it is hackers, insiders, corporate culture, a lack of CISO expertise, disinformation, or perhaps the very silos you have built. And wait. What about your CIO, your CEO, your Board? Think of them as the first line of cyber threats.
I can. I am a scientist, a researcher. I search for what I cannot even imagine at first. Then - it is up to you to decide where to look.”
―
“Cyber domains are particularly complex. Here, threat actors are unidentifiable and technology and disinformation evolve at warp speed.”
― Disrupt With Impact: Achieve Business Success in an Unpredictable World
― Disrupt With Impact: Achieve Business Success in an Unpredictable World












