120 books
—
88 voters
Infosec Books
Showing 1-50 of 1,143

by (shelved 37 times as infosec)
avg rating 4.17 — 2,498 ratings — published 2003

by (shelved 34 times as infosec)
avg rating 3.77 — 7,204 ratings — published 2001

by (shelved 34 times as infosec)
avg rating 4.23 — 1,222 ratings — published 2007

by (shelved 33 times as infosec)
avg rating 4.28 — 15,511 ratings — published 1989

by (shelved 30 times as infosec)
avg rating 3.83 — 3,850 ratings — published 2010

by (shelved 29 times as infosec)
avg rating 4.17 — 8,168 ratings — published 2014

by (shelved 28 times as infosec)
avg rating 4.35 — 9,728 ratings — published 2019

by (shelved 27 times as infosec)
avg rating 4.48 — 606 ratings — published 2011

by (shelved 26 times as infosec)
avg rating 3.96 — 27,131 ratings — published 2011

by (shelved 25 times as infosec)
avg rating 4.23 — 993 ratings — published 2014

by (shelved 23 times as infosec)
avg rating 4.17 — 388 ratings — published 2014

by (shelved 22 times as infosec)
avg rating 3.97 — 8,038 ratings — published 2011

by (shelved 21 times as infosec)
avg rating 3.75 — 2,739 ratings — published 2014

by (shelved 21 times as infosec)
avg rating 3.91 — 3,587 ratings — published 2005

by (shelved 19 times as infosec)
avg rating 4.07 — 866 ratings — published 2011

by (shelved 18 times as infosec)
avg rating 4.32 — 10,888 ratings — published 2021

by (shelved 18 times as infosec)
avg rating 3.98 — 5,385 ratings — published 2017

by (shelved 18 times as infosec)
avg rating 4.30 — 28,701 ratings — published 1999

by (shelved 18 times as infosec)
avg rating 3.93 — 1,791 ratings — published 2000

by (shelved 17 times as infosec)
avg rating 4.16 — 8,515 ratings — published 1984

by (shelved 16 times as infosec)
avg rating 3.74 — 2,342 ratings — published 2019

by (shelved 16 times as infosec)
avg rating 4.11 — 605 ratings — published 2014

by (shelved 15 times as infosec)
avg rating 4.21 — 700 ratings — published

by (shelved 14 times as infosec)
avg rating 4.04 — 553 ratings — published 2011

by (shelved 13 times as infosec)
avg rating 4.10 — 536 ratings — published 2004

by (shelved 13 times as infosec)
avg rating 4.19 — 350 ratings — published

by (shelved 13 times as infosec)
avg rating 4.24 — 438 ratings — published 2015

by (shelved 13 times as infosec)
avg rating 3.90 — 3,149 ratings — published 2016

by (shelved 13 times as infosec)
avg rating 3.96 — 469 ratings — published 2014

by (shelved 13 times as infosec)
avg rating 4.15 — 330 ratings — published 2004

by (shelved 12 times as infosec)
avg rating 4.27 — 374 ratings — published

by (shelved 12 times as infosec)
avg rating 4.00 — 3,858 ratings — published 2015

by (shelved 11 times as infosec)
avg rating 4.12 — 286 ratings — published 2014

by (shelved 11 times as infosec)
avg rating 3.73 — 2,450 ratings — published 2010

by (shelved 10 times as infosec)
avg rating 4.30 — 57,149 ratings — published 2019

by (shelved 10 times as infosec)
avg rating 3.89 — 259 ratings — published 2019

by (shelved 10 times as infosec)
avg rating 3.80 — 1,165 ratings — published 2000

by (shelved 10 times as infosec)
avg rating 3.93 — 4,380 ratings — published 2015

by (shelved 10 times as infosec)
avg rating 4.07 — 14,998 ratings — published 2014

by (shelved 10 times as infosec)
avg rating 4.03 — 549 ratings — published 2012

by (shelved 10 times as infosec)
avg rating 3.97 — 3,364 ratings — published 2012

by (shelved 10 times as infosec)
avg rating 3.93 — 1,024 ratings — published 1995

by (shelved 9 times as infosec)
avg rating 4.40 — 253 ratings — published

by (shelved 9 times as infosec)
avg rating 4.58 — 132 ratings — published 2017

by (shelved 9 times as infosec)
avg rating 3.93 — 136 ratings — published

by (shelved 9 times as infosec)
avg rating 4.06 — 262 ratings — published 2013

by (shelved 9 times as infosec)
avg rating 4.36 — 426 ratings — published 2009

by (shelved 9 times as infosec)
avg rating 4.21 — 404 ratings — published 2010

by (shelved 9 times as infosec)
avg rating 4.21 — 2,133 ratings — published 1993

by (shelved 9 times as infosec)
avg rating 3.56 — 5,878 ratings — published 2011
Information Security, Penetration Testing, Social Engineering, Counter-Intelligence, Hacker/Hacking Culture and History.
More lists...
“The IoT market grows rapidly and it’s acceleration will continue in all major areas like Industrial Internet of Things; Digital Enterprise; Internet of Healthcare; Internet of Energy; Internet of Education; Digitalisation of global Supply Chains.
Security concerns add to the IoT complexity. Strategically, to assure the system’s reliability & data / knowledge engineering, it is important to insure data integrity, availability, traceability, and privacy. A complex problem of digital transformation globally.
The Internet of Things cybersecurity, therefore, is not a matter of device self-defence. What is needed is a systemic approach. Identify underlying patterns. Secure elements of a chain: from security of a device that creates, captures your data.. to the data storage.. to the back-end storage.. Create/ join IoT ecosystems, driven by protection with external monitoring, detection and reaction systems. It is a challenge - to secure systems.”
―
Security concerns add to the IoT complexity. Strategically, to assure the system’s reliability & data / knowledge engineering, it is important to insure data integrity, availability, traceability, and privacy. A complex problem of digital transformation globally.
The Internet of Things cybersecurity, therefore, is not a matter of device self-defence. What is needed is a systemic approach. Identify underlying patterns. Secure elements of a chain: from security of a device that creates, captures your data.. to the data storage.. to the back-end storage.. Create/ join IoT ecosystems, driven by protection with external monitoring, detection and reaction systems. It is a challenge - to secure systems.”
―
“Cities require connectivity rather than territory in order to drive their economic stability and growth.”
―
―