100 Best Cyber Security Books of All Time
We've researched and ranked the best cyber security books in the world, based on recommendations from world experts, sales data, and millions of reader ratings. Learn more
In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with... more
John SargentEdward Snowden decided at the age of 29 to give up his entire future for the good of his country. He displayed enormous courage in doing so, and like him or not, his is an incredible American story. There is no doubt that the world is a better and more private place for his actions. Macmillan is enormously proud to publish Permanent Record. (Source)
Kara SwisherBtw @Snowden new book “Permanent Record” is quite good and surprisingly a love letter to the Internet as it was. (Source)
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. more
Josephine WolffAs a book, Countdown to Day Zero is a stunning example of a case study, of really diving into a cyber security incident. She takes on the very technical material—getting into the malware and the question of how do these SCADA machines work and how does this piece of software compromise them—but then also brings in this really rich and complicated geopolitical conflict that this is happening as a... (Source)
In June 1983, President Reagan watched the movie War Games, in which a teenager unwittingly hacks the Pentagon, and asked his top general if the scenario was plausible. The general said it was. This set in motion the first presidential directive on computer... more
Josephine WolffThis book is by Fred Kaplan and it’s a historical study of the ways that governments—and in particular the US government—have tried to think about and use cyberpower for state-to-state conflict. He looks at what the origins of that were in the 1980s and how it has evolved over the past 30 or so years. (Source)
Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action. The author uses many of the same analogies and explanations he’s honed in the classroom that have helped hundreds of... more
Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he... more
If they were a hall of fame or shame for computer hackers, a Kevin Mitnick plaque would be mounted the near the entrance. While other nerds were fumbling with password possibilities, this adept break-artist was penetrating the digital secrets of Sun Microsystems, Digital Equipment Corporation, Nokia, Motorola, Pacific Bell, and other mammoth enterprises. His Ghost in the Wires memoir paints an action portrait of a plucky loner motivated by a passion for trickery, not material game. (P.S. Mitnick's capers have already been the subject of two books and a movie. This first-person account is...
moreRichard BejtlichIn 2002 I reviewed Kevin Mitnick's first book, The Art of Deception. In 2005 I reviewed his second book, The Art of Intrusion. I gave both books four stars. Mitnick's newest book, however, with long-time co-author Bill Simon, is a cut above their previous collaborations and earns five stars. As far as I can tell (and I am no Mitnick expert, despite reading almost all previous texts mentioning... (Source)
Antonio EramThis book was recommended by Antonio when asked for titles he would recommend to young people interested in his career path. (Source)
Nick JanetakisI'm going to start reading Ghost in the Wires by Kevin Mitnick this week. I used to go to 2600 meetings back when he was arrested for wire fraud and other hacking related shenanigans in the mid 1990s. I'm fascinated by things like social engineering and language in general. In the end, I just want to be entertained by his stories. For someone who is into computer programming, a book like this... (Source)
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error... more
James Stanley"The Cuckoo's Egg" by Clifford Stoll is another great book. I believe it's the first documented account of a computer being misused by a remote attacker. It talks about how Clifford attached physical teleprinters to the incoming phone lines so that he could see what the attacker was actually doing on the computer, and how he traced the attacker across several countries. (Source)
Franchises line the Los Angeles freeway as far as the eye can see: Reverend Wayne's Pearly Gates, Mr. Lee's Greater Hong Kong, Uncle Enzo's CosaNostra Pizza, Incorporated. The only relief from the sea of logos is within the well-guarded borders of the autonomous city-states that law-abiding citizens are afraid to leave. Is it any wonder that most sane folks have chosen to live in a computer-generated universe? Here in virtual reality is a domain of pleasures... more
Sergey BrinBrin said he is a big sci-fi fan, and Stephenson's acclaimed 1992 novel "Snow Crash" is one of his favorites. The book "was really 10 years ahead of its time," Brin said. "It kind of anticipated what's going to happen, and I find that really interesting." (Source)
Adam SavageIt's a tough call because I prefer other books of [this author]. But [this book] is so important within the history of science fiction. (Source)
Marvin LiaoMy list would be (besides the ones I mentioned in answer to the previous question) both business & Fiction/Sci-Fi and ones I personally found helpful to myself. The business books explain just exactly how business, work & investing are in reality & how to think properly & differentiate yourself. On the non-business side, a mix of History & classic fiction to understand people, philosophy to make... (Source)
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers. The attacks culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's... more
Ben LoricaI am in the middle of Sandworm by @a_greenberg and it is great read. I have a feeling that recent events in the Middle East will result in cyberattacks similar to those in this book https://t.co/qLM5Z7YAdl (Source)
Laurence TribeVote augmentation looks like the newest form of election manipulation. It was a favorite Putin/GRU technique in Estonia, Georgia, and Ukraine. See Andy Greenberg’s book “Sandworm.” https://t.co/0i9NSdUvzs (Source)
Jack Rhysider@selenalarson @a_greenberg wrote a great book (Source)
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C... more
Don't have time to read the top Cyber Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
The word spread through the hacking underground like some unstoppable new virus: an audacious crook had staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy.
The culprit was a brilliant programmer with a hippie ethic and a supervillain's double identity. Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As... more
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home... more
Throughout the text are clear... more
Stephen Kinsella@gavreilly @SLSingh Love that book (Source)
In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies-and countless viruses, phishing, and spyware attacks-he delivers the first definitive narrative of the global spam problem and its threat to... more
Josephine WolffBrian Krebs is really more deeply reported on financial cyber criminals than almost anybody in the world.He’s really smart about the ways in which money drives a lot of these cyber crimes. (Source)
Joseph NyeThis is intriguing, because when you look at the enormous opportunities that the Internet has presented – economic efficiency, great communication – we generally think of the positive side. But what Clarke and Knake point out is that as we open these opportunities we also make ourselves vulnerable to their disruption. For example, you have the capacity to do damage in the physical world just by... (Source)
For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.
You'll learn how to:
Set up a safe virtual environment to analyze... more
Behind the Russian cyberattacks that may have thrown the 2016 election; behind the Sony hack; behind mysterious power outages around the world and the disappearance of thousands of personnel records from poorly guarded government servers are the traces of a new and powerful weapon, one that has the potential to remake global conflict like nothing... more
Bill Gates[On Bill Gates's reading list in 2018.] (Source)
The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the... more
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a... more
Don't have time to read the top Cyber Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
In 2011, a twenty-six-year-old libertarian programmer named Ross Ulbricht launched the ultimate free market: the Silk Road, a clandestine Web site hosted on the Dark Web where anyone could trade anything—drugs, hacking software, forged passports, counterfeit cash, poisons—free of the government’s watchful eye.
It wasn’t long before the media got wind of the new Web site where anyone—not just teenagers and weed dealers but terrorists... more
Casey NeistatIt is unbelievably riveting. It does that thing where at the end of every chapter it leaves you just enough we're like "aah!" and you have to read the first paragraph of the next chapter and then before you know it is a downward spiral and you end up finishing this book. Took me four days to get through this. (Source)
In 1942, Lawrence Pritchard Waterhouse—mathematical genius and young Captain in the U.S. Navy—is assigned to detachment 2702. It is an outfit so secret that only a handful of people know it exists, and some of those people have names like Churchill and Roosevelt. The mission of Waterhouse and Detachment 2702—commanded by Marine... more
Marc AndreessenThe Sovereign Individual—written 20 years ago, this is the most thought provoking book on the unfolding nature of the 21st Century that I’ve yet read. It’s packed with ideas on every page, many that are now fast becoming conventional wisdom, and many that are still heretical. Two related books to read are The Twilight of Sovereignty and Cryptonomicon. (Source)
Risto SiilasmaaThe one book on Siilasmaa's list is this fantasy offering from Neal Stephenson. The novel relates two parallel stories, one about an elite group of code-breakers in World War II, and another set in the present day, about two grandchildren of members of the group trying to track down a previously unknown – and rumored to be unbreakable – Nazi code. The book's subject matter resonates with current... (Source)
Nick HarkawayCryptonomicon is a real humdinger of a novel. Stephenson is a hugely enjoyable writer of action and comedy, I find him a joy to read. (Source)
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we... more
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering... more
This book can be a catalyst for change for anyone, from beginners trying to enter the industry, to practitioners looking to start their own firms.
What tips do the founders of Dragos, Inc. and Duo Security have on starting... more
Through a series of football-style "plays," this straightforward guide gets to the root of many of the roadblocks people may face while penetration... more
The company's new IT initiative, code named Phoenix Project, is critical to the future of Parts Unlimited, but the project is massively over budget and very late. The CEO wants Bill to report directly to him and fix the mess in ninety days or else Bill's entire department will be outsourced.
With the help of a prospective board member and his mysterious philosophy of The Three Ways, Bill starts to see that IT work has more in common with... more
Jeffrey SnoverGreat thread. I know of a number of devops people that haven't read this book. Ya'll should fix that. https://t.co/Yri4JJ0jBZ (Source)
Louis NyffeneggerI don't think I have a specific book that I can call my favourite. Some books have had a big impact on my view of how to build a product/company ("Rework"), some were very enjoyable to read ("The Phoenix Project"), some helped me improve the way I think ("The Pleasure Of Finding Things Out") and some the way I live ("Essentialism") or work ("Deep Work"). (Source)
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the twenty-nine-year-old NSA contractor Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a... more
Gilbert RwabigwiYour book, “No Place To Hide”, was a thrilling/insightful read. Can’t wait to flip through @Snowden’s memoir. 🙏🏾 https://t.co/pZPLxDpNcM (Source)
Don't have time to read the top Cyber Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
Chris FussellThe history of how great ideas evolve. (Source)
Brian BurkhartThis book is essentially a biography of all the people who’ve led to the technology of today—it’s fascinating. The most important point of the book is everything is one long, connected chain. There isn’t just one person or one industry that makes anything happen—it all goes way back. For example, the communication theory I have espoused and taught throughout my career is from Aristotle, Socrates,... (Source)
Sean Gardner@semayuce @MicrosoftUK @HelenSharmanUK @astro_timpeake @WalterIsaacson Yes, I agree: "The Innovators" is a great book. I loved it too. (Source)
WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of... more
Ben Goldacre@szbalint it's such a great book, i've always said @rossjanderson should release it in chunks as pop science books. the massive textbook shape doesn't do its accessibility, readability and content justice! (Source)
The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.
This edition updated with new information about post-9/11 security. less
In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:
Create a trojan command-and-control using GitHub
Detect sandboxing and automate common malware tasks,... more
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers—from home thermostats to chemical plants—are all online. The Internet, once a virtual abstraction, can now sense and touch the physical world.
As we open our lives to this future, often called the Internet of Things, we are beginning to see its enormous potential in ideas like driverless cars, smart cities, and personal agents equipped... more
Alexander StubbI will get this book. Looks interesting beyond the title...Click Here to Kill Everybody by Bruce Schneier via @FT https://t.co/GGCRlsTflT (Source)
"…monumental… fascinating… comprehensive… the definitive work on cryptography for computer programmers…" –Dr. Dobb's Journal
"…easily ranks as one of the most authoritative in its field." —PC Magazine
"…the bible of code hackers." –The Millennium Whole Earth Catalog
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers... more
Dominic Steil[One of the five books recommends to young people interested in his career path.] (Source)
Mindf*ck goes deep inside Cambridge Analytica's "American operations," which were driven by Steve Bannon's vision to remake America and fueled by mysterious billionaire Robert Mercer's money, as it weaponized and wielded the massive store of data it had harvested on individuals in--excess of 87 million--to... more
In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the... more
Nicholas CarrWhatever its imperfections, The Age of Surveillance Capitalism is an original and often brilliant work, and it arrives at a crucial moment, when the public and its elected representatives are at last grappling with the extraordinary power of digital media and the companies that control it. Like another recent masterwork of economic analysis, Thomas Piketty’s 2013 Capital in the Twenty-First... (Source)
Naomi KleinFrom the very first page I was consumed with an overwhelming imperative: everyone needs to read this book as an act of digital self-defense. With tremendous lucidity and moral courage, Zuboff demonstrates not only how our minds are being mined for data but also how they are being rapidly and radically changed in the process. The hour is late and much has been lost already—but as we learn in these... (Source)
Clive Lewis MpCant make the brilliant event below? Havent had a chance to read @shoshanazuboff groundbreaking book, ‘Surveillance Capitalism’? Then listen to this brilliant interview with the author as she explains the terrifying scale&ambition of Facebook/Google et al https://t.co/DCtNlFbmE0 https://t.co/ZX0YpW5pOo (Source)
Don't have time to read the top Cyber Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
Josephine WolffWorm is about the Conficker worm, which was one of the earlier very, very effective pieces of malware used to build an enormous bot. Mark Bowden goes in and looks at who the people are trying to stop it. It’s one of the first books that gave me a feel for, ‘Oh, this is what it means when they say attacking is easier than defending.’ The defensive efforts were well-coordinated and reasonably well... (Source)
Alex Caceres/hacker Frmrly Known As Dotslashpunk@gvgm3 @SecurityTube For networks i'd have to say hands down the OSCP is likely one of the best you're going to find. Fuck the cert, take the course, get down and dirty in the labs and break everything. I hear @georgiaweidman's book is good (Pen testing with Metasploit) but have not read it myself (Source)
Cracking the Coding Interview, 6th Edition is here to help you through this process, teaching you what you need to know and enabling you to perform at your very best. I've coached and interviewed hundreds of software engineers. The result is this book.
Learn how to uncover the hints and hidden details in a question,... more
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function,... more
Don't have time to read the top Cyber Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
Once you've built your foundation for penetration testing, you'll learn the... more
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches,... more
In "Automate the Boring Stuff with Python," you'll learn how to use Python to write programs that do in minutes what would take you hours to do by hand no prior programming experience required. Once you've mastered the basics of programming, you'll create Python programs that effortlessly perform useful and impressive feats of automation to: Search for text in a file or across multiple... more
This fully updated, industry-standard security resource shows how to fortify computer networks by learning and effectively applying ethical hacking techniques. Based on critical topics that the authors teach at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks.
Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition,... more
This is the second edition of the best selling Python book in the world. Python Crash Course, 2nd Edition is a straightforward introduction to the core of Python programming. Author Eric Matthes dispenses with the sort of tedious, unnecessary information that can get in the way of learning how to program, choosing instead to provide a foundation in general... more
Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely... more
Minecraft is the one game that children, parents, and teaches all agree on. It’s great fun and a wonderful teaching tool. The Ultimate Unofficial Encyclopedia for Minecrafters reveals expert tricks of the trade for gamers. This exciting book will cover everything players need to know about mining, farming, building, villagers, the Nether, and more! Young gamers will be surprised... more
As Hillary Clinton's Senior Advisor for Innovation, Alec Ross travelled nearly a million miles to forty-one countries, the equivalent of two round-trips to the moon. From refugee camps in the Congo and Syrian war zones, to visiting the world's most powerful people in business and government, Ross's travels amounted to a four-year masterclass in the changing... more
Marvin LiaoMy list would be (besides the ones I mentioned in answer to the previous question) both business & Fiction/Sci-Fi and ones I personally found helpful to myself. The business books explain just exactly how business, work & investing are in reality & how to think properly & differentiate yourself. On the non-business side, a mix of History & classic fiction to understand people, philosophy to make... (Source)
Don't have time to read the top Cyber Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
In Book 1, you'll plumb Windows fundamentals, independent of platform - server, desktop, tablet, phone, Xbox. Coverage focuses on high-level functional descriptions of the various Windows components and features that interact with, or are manipulated by, user mode programs, or... more
Rob Fuller@maddiestone Awesome book, I've read a couple editions and always learn new things. Have fun ;-) I would also recommend reading the older editions they have tricks and info that seem to disappear in newer ones. (Source)
Thoroughly revised for the new CompTIA Network+ exam, the Seventh Edition of this bestselling All-in-One Exam Guide delivers 100% coverage of the exam objectives and serves as a valuable on-the-job reference
Take the latest version of the CompTIA Network+ exam with complete confidence using the fully updated information contained in... more
In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to... more
The Pages are arranged in alphabetical order, so you can easily and quickly find what you are looking!!
Features:
plenty of space: 105 pages
Alphabetized pages
Premium matte cover design
Perfectly Sized at 6" x 9"
Flexible Paperback
Printed on high quality less
The official Minecraft: Guide to Creative will teach you all you need to know to create builds more impressive than you could've dreamed of.
With insider info and tips from the experts at Mojang, this is the definitive guide to creation in Minecraft. less
But 2012 marked a transformation in geopolitics and the tactics of both the established powers and smaller entities looking to challenge the international community. That year, the US government revealed its involvement in Operation “Olympic Games,” a mission aimed at... more
Don't have time to read the top Cyber Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers’ identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical... more
Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows,... more
Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other... more
America's next major war is likely to be provoked by a cyber attack. From well-covered stories like the Stuxnet virus, which helped slow Iran's nuclear program, to lesser-known tales like EternalBlue, the 2017 cyber battle that closed hospitals in Britain and froze shipping crates in Germany in midair, we have entered... more
Bill ClintonIn the battle raging between offense and defense in cyberspace, Clarke and Knake have some important ideas about how we can avoid cyberwar for our country, prevent cybercrime against our companies, and in doing so, reduce resentment, division, and instability at home and abroad. (Source)
Leon PanettaCyberspace is the battlefield of the future. Our national security is dependent on whether we wake up and recognize the nature of this threat. In The Fifth Domain, Richard Clarke and Robert Knake are issuing a strong wake-up call. As they conclude, ‘what is missing is national consensus, will, and priority setting.’ If we fail to take the necessary steps to defend ourselves, we may lose not just... (Source)
Huang's journey starts with his first visit to the staggering electronics markets in Shenzhen, with booths overflowing with capacitors, memory chips,... more
Beyond the familiar online world that most of us inhabit – a world of Google, Hotmail, Facebook and Amazon – lies a vast and often hidden network of sites, communities and cultures where freedom is pushed to its limits, and where people can be anyone, or do anything, they want. A world that is as creative and complex as it is dangerous and disturbing. A world that is much closer than you think.
The dark net is an underworld that stretches from popular social media sites to the most secretive... more
Don't have time to read the top Cyber Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
Edward Snowden chose three journalists to tell the stories in his Top Secret trove of NSA documents: Barton Gellman of The Washington Post, Glenn Greenwald of The... more
This effective self-study guide fully prepares you for the challenging CISSP exam and offers 100% coverage of all exam domains. This edition has been thoroughly revised to cover the new CISSP 2018 Common Body of Knowledge, hot spot and drag and drop question formats, and more.
CISSP All-in-One Exam Guide, Eighth Edition features hands-on exercises as well as "Notes," "Tips," and "Cautions" that provide real-world insight and call out potentially... more
- The world of Minecraft is waiting to be explored, but danger lurks around every corner. The official Minecraft: Guide to Exploration will help you survive. Learn how to find resources, craft equipment, and protect yourself from hostile mobs.
- Minecraft is so varied and limitless that incredible creations can often be daunting to think about,... more
'The world has changed more in the past 10 years than in any 10 year period in human history... Technology is no longer a peripheral servant, it shapes our daily lives. Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart... more
Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized 'crackers' to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today's computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire... more
Don't have time to read the top Cyber Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
"Both a real-life, tension-packed thriller and a persuasive argument for traditional intelligence work in the information age."--Bruce Schneier, New York Times bestselling author of Data and Goliath and Click Here to Kill Everybody
Eric O'Neill was only twenty-six when he was tapped for the case of a lifetime: a one-on-one undercover investigation of the FBI's top target, a... more
Survival is difficult in the perilous Nether and End dimensions, and you'll need to up your game if you want to make it back to the Overworld.
With insider info and tips from the experts at Mojang, this is the definitive guide to the Nether and the End in Minecraft.
Collect all of the official Minecraft books:
Minecraft: The Island
Minecraft: The Crash more
Pick up the basics of the redstone components and their uses, discover how to make working circuits, and create incredibly complex builds using your new skills.
With insider info and tips from the experts at Mojang, this is the definitive guide to redstone in Minecraft.
Collect all of the official Minecraft books:
Minecraft: The Island
Minecraft: The... more
In this fearless and wholly authoritative investigation of the seemingly insatiable demand for illegal wares, veteran reporter Misha Glenny... more
Vinod KhoslaFun though older book. (Source)
Simon ConwayYes, with my next two choices I am trying to bring together some of the issues that have been rattling around in my head. This book really leads you into the world of international crime, gang operations, sex slavery and money laundering, etc. (Source)
CCNA 200-301 Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. Brief quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam... more
(ISC)� CISSP Study Guide, 8th Edition has been completely updated for the latest 2018 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster... more
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse... more
If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the... more
Three and a half years ago, David Sanger’s book The Inheritance: The World Obama Confronts and the Challenges to American Power described how a new American president came to office with the world on fire. Now, just as the 2012 presidential election battle begins, Sanger... more
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 8th Edition has been completely updated for the latest 2018 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned... more
Don't have time to read the top Cyber Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.