Security


The Art of Deception: Controlling the Human Element of Security
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Hacking: The Art of Exploitation w/CD
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Security Engineering: A Guide to Building Dependable Distributed Systems
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Secrets and Lies: Digital Security in a Networked World
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Threat Modeling: Designing for Security
Metasploit: The Penetration Tester's Guide
Countdown to Zero Day by Kim ZetterWorm by Mark BowdenLights Out by Ted KoppelThe Absent Superpower by Peter ZeihanThe Quest by Daniel Yergin
Energy Security Reading List
11 books — 3 voters
Rules of Protection by Alison BlissWilling Captive by Belle AuroraSurrender by Angela FordMr. Perfect by Linda HowardDearest Rogue by Elizabeth Hoyt
Bodyguards/Protectors/Travel Escorts
498 books — 323 voters

Never Go With Your Gut by Gleb TsipurskyThe Blindspots Between Us by Gleb TsipurskyAdapt and Plan for the New Abnormal of the COVID-19 Coronavir... by Gleb TsipurskyPro Truth by Gleb TsipurskyExplosive Growth by Cliff Lerner
Best Business and Technology Books
118 books — 141 voters
Web Hacking Arsenal by Rafay  BalochNeuromancer by William GibsonThe Girl With the Dragon Tattoo by Stieg LarssonKingpin by Kevin PoulsenDaemon by Leinad Zeraus
Cybersecurity Canon (proposed)
40 books — 42 voters

#SayHerName by Kimberlé CrenshawFracking by Kathryn   Hulick#SayHerName by Kimberlé CrenshawThe War on Poverty by Carolee LaineThe Syrian Conflict by Michael Capek
Special Reports series
44 books — 8 voters
Industrial Automation and Control System Security Principles by Ronald L. KrutzIndustrial Cybersecurity by Pascal AckermanIndustrial Cybersecurity by Steve MustardIndustrial Network Security, 2nd Edition by David J. TeumimIndustrial Network Security by Eric D. Knapp
Industrial Cybersecurity
10 books — 1 voter

Richelle E. Goodrich
Nothing in this world compares to the comfort and security of having someone just hold your hand.
Richelle E. Goodrich, Smile Anyway: Quotes, Verse, & Grumblings for Every Day of the Year

bell hooks
The practice of love offers no place of safety. We risk loss, hurt, pain. We risk being acted upon by forces outside our control.
Bell Hooks, All About Love: New Visions

More quotes...
International Affairs A place for anyone interested in/reading about international politics, economics, and law. Curre…more
402 members, last active 7 years ago
Henley-Putnam University Reading Group Built for students from Henley-Putnam University or other DoD Schools. Any student or profession…more
15 members, last active 12 years ago
Sarah-san's Tour Bus Affordable friendly tour service for Authors, also running hosting and web set ups for Authors a…more
4 members, last active 11 years ago
The Cybersecurity Book Club It's Goodreads' book club to discuss – online and in person – the best books on digital security…more
184 members, last active 3 years ago