Cybersecurity


Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
The Art of Deception: Controlling the Human Element of Security
Social Engineering
Hacking: The Art of Exploitation w/CD
Dark Territory: The Secret History of Cyber War
The Perfect Weapon: How the Cyber Arms Race Set the World Afire
Permanent Record
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
The Smartest Person in the Room by Christian EspinosaCybersecurity Leadership by Mansur HasibThe Art of Deception by Kevin D. MitnickConceal Reveal by Julie WillisImpact of Security Culture on Security Compliance in Healthca... by Mansur Hasib
Cybersecurity Strategy
5 books — 4 voters
Web Hacking Arsenal by Rafay  BalochSandworm by Andy GreenbergCountdown to Zero Day by Kim ZetterThe Perfect Weapon by David E. SangerClick Here to Kill Everybody by Bruce Schneier
Modern Cybersecurity 2019
97 books — 34 voters

The Code Book by Simon SinghThe Cyber Effect by Mary AikenTribe of Hackers by Marcus J. CareyWriting IT - Novel, Plot, Characters by Ed AdamsHow to Measure Anything in Cybersecurity Risk by Douglas W. Hubbard
Cybersecurity
50 books — 4 voters
Hackers by Steven LevyJulian Assange - The Unauthorised Autobiography by Julian AssangeВторжение. Краткая история русских хакеров by Даниил ТуровскийWe Are All Targets by Matt PotterThe Cathedral & the Bazaar by Eric S. Raymond
History of Hackers
19 books — 4 voters

Jason Hishmeh
As recent surges in funding for AI cybersecurity automation underscore, technology leaders must integrate adaptive algorithms that evolve with emerging threats to fortify digital ecosystems. It's like crafting a shield that not only blocks attacks but learns their patterns, turning potential vulnerabilities into impenetrable strengths. ...more
Jason Hishmeh, The 6 Startup Stages: How Non-technical Founders Create Scalable, Profitable Companies

How can one identify the true owner of a cyber risk? When everyone is responsible, no one is responsible. This is an undisputed fact. To the best of my knowledge, organizations often rely on frameworks such as RACI matrices (Responsible, Accountable, Consulted, Informed) to formally assign ownership. From another perspective, however, the “true owner” of a cyber threat is its creator. And here is where the truth may reside. Whether it is hackers, insiders, corporate culture, a lack of CISO e ...more
Ludmila Morozova-Buss

More quotes...
Digital Forensics & Incident Response (DFIR) Discussions of DFIR/cybercrime books and writing of these books and topics in both fiction and n…more
16 members, last active 8 years ago
Let's share cybersecurity best reads…more
3 members, last active 7 years ago
Digital IT, IoT and ICS/SCADA book, author, fan, curious, anyone hacking who has ever bend the r…more
2 members, last active 8 years ago
Kick off this new year with a thrilling reading challenge
2 members, last active one year ago