Cybersecurity


Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
The Art of Deception: Controlling the Human Element of Security
Social Engineering
Hacking: The Art of Exploitation w/CD
The Perfect Weapon: How the Cyber Arms Race Set the World Afire
Dark Territory: The Secret History of Cyber War
Permanent Record
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
Countdown to Zero Day by Kim ZetterWorm by Mark BowdenLights Out by Ted KoppelThe Absent Superpower by Peter ZeihanThe Quest by Daniel Yergin
Energy Security Reading List
11 books — 3 voters
You'll See This Message When It Is Too Late by Josephine WolffThinking about Cybersecurity by Paul RosenzweigDawn of the Code War by John P. CarlinCult of the Dead Cow by Joseph MennThe Cuckoo's Egg by Clifford Stoll
Key Cybersecurity Reads
12 books — 1 voter

The Code Book by Simon SinghThe Cyber Effect by Mary AikenTribe of Hackers by Marcus J. CareyHow to Measure Anything in Cybersecurity Risk by Douglas W. HubbardHack-Proof Your Life Now! The New Cybersecurity Rules by Sean M. Bailey
Cybersecurity
49 books — 3 voters
Industrial Automation and Control System Security Principles by Ronald L. KrutzIndustrial Cybersecurity by Pascal AckermanIndustrial Cybersecurity by Steve MustardIndustrial Network Security by David J. TeumimIndustrial Network Security by Eric D. Knapp
Industrial Cybersecurity
10 books — 1 voter

The Smartest Person in the Room by Christian EspinosaCybersecurity Leadership by Mansur HasibThe Art of Deception by Kevin D. MitnickConceal Reveal by Julie WillisImpact of Security Culture on Security Compliance in Healthca... by Mansur Hasib
Cybersecurity Strategy
5 books — 4 voters
This Is How They Tell Me the World Ends by Nicole PerlrothDark Mirror by Barton GellmanPermanent Record by Edward SnowdenCountdown to Zero Day by Kim ZetterIk weet je wachtwoord by Daniël Verlaan
Gehackt! A Storytel Original series
96 books — 3 voters

Naiyem Chowdhury Rony
What began as a tool for privacy became a playground for crime.
Naiyem Chowdhury Rony, The Dark Web Diaries

Jason Hishmeh
As recent analyses uncover over 2,000 vulnerabilities in apps built through vibe coding, technology leaders must weave security reviews into AI-assisted development to curb emerging threats. It's like drafting a novel with an eager ghostwriter who captures the essence of the book but overlooks plot holes that could unravel the entire story. ...more
Jason Hishmeh, The 6 Startup Stages: How Non-technical Founders Create Scalable, Profitable Companies

More quotes...
The Kernel Collective Welcome to the Kernel Collective' reading list! We're an IT & Cyber Security Network in Madison …more
1 member, last active 2 years ago
Let's share cybersecurity best reads…more
3 members, last active 7 years ago
Kick off this new year with a thrilling reading challenge
2 members, last active one year ago
This is the place to find, discuss, and review cybersecurity and privacy related books. These ar…more
3 members, last active one year ago