Infosec


Hacking: The Art of Exploitation w/CD
The Art of Deception: Controlling the Human Element of Security
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Social Engineering
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Red Team Field Manual
Penetration Testing: A Hands-On Introduction to Hacking
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Metasploit: The Penetration Tester's Guide
William Gibson
When Lowbeer wished a conversation in public to be private, which she invariably did, London emptied itself around her.
William Gibson, Agency

The IoT market grows rapidly and it’s acceleration will continue in all major areas like Industrial Internet of Things; Digital Enterprise; Internet of Healthcare; Internet of Energy; Internet of Education; Digitalisation of global Supply Chains. Security concerns add to the IoT complexity. Strategically, to assure the system’s reliability & data / knowledge engineering, it is important to insure data integrity, availability, traceability, and privacy. A complex problem of digital transformatio ...more
Ludmila Morozova-Buss

More quotes...
Welcome to the Cyber Security Book Club — a community for infosec professionals, ethical hackers…more
2 members, last active 14 days ago
The Cybersecurity Book Club It's Goodreads' book club to discuss – online and in person – the best books on digital security…more
183 members, last active 2 years ago
OWASP OpenSAMM Book Club This group is not affiliated with OWASP. List of books to facilitate the implementation of Open…more
1 member, last active 8 years ago