100 Best Security Books of All Time
We've researched and ranked the best security books in the world, based on recommendations from world experts, sales data, and millions of reader ratings. Learn more
Throughout the text are clear... more
Stephen Kinsella@gavreilly @SLSingh Love that book (Source)
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. more
Josephine WolffAs a book, Countdown to Day Zero is a stunning example of a case study, of really diving into a cyber security incident. She takes on the very technical material—getting into the malware and the question of how do these SCADA machines work and how does this piece of software compromise them—but then also brings in this really rich and complicated geopolitical conflict that this is happening as a... (Source)
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error... more
James Stanley"The Cuckoo's Egg" by Clifford Stoll is another great book. I believe it's the first documented account of a computer being misused by a remote attacker. It talks about how Clifford attached physical teleprinters to the incoming phone lines so that he could see what the attacker was actually doing on the computer, and how he traced the attacker across several countries. (Source)
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C... more
If they were a hall of fame or shame for computer hackers, a Kevin Mitnick plaque would be mounted the near the entrance. While other nerds were fumbling with password possibilities, this adept break-artist was penetrating the digital secrets of Sun Microsystems, Digital Equipment Corporation, Nokia, Motorola, Pacific Bell, and other mammoth enterprises. His Ghost in the Wires memoir paints an action portrait of a plucky loner motivated by a passion for trickery, not material game. (P.S. Mitnick's capers have already been the subject of two books and a movie. This first-person account is...
moreRichard BejtlichIn 2002 I reviewed Kevin Mitnick's first book, The Art of Deception. In 2005 I reviewed his second book, The Art of Intrusion. I gave both books four stars. Mitnick's newest book, however, with long-time co-author Bill Simon, is a cut above their previous collaborations and earns five stars. As far as I can tell (and I am no Mitnick expert, despite reading almost all previous texts mentioning... (Source)
Antonio EramThis book was recommended by Antonio when asked for titles he would recommend to young people interested in his career path. (Source)
Nick JanetakisI'm going to start reading Ghost in the Wires by Kevin Mitnick this week. I used to go to 2600 meetings back when he was arrested for wire fraud and other hacking related shenanigans in the mid 1990s. I'm fascinated by things like social engineering and language in general. In the end, I just want to be entertained by his stories. For someone who is into computer programming, a book like this... (Source)
Ben Goldacre@szbalint it's such a great book, i've always said @rossjanderson should release it in chunks as pop science books. the massive textbook shape doesn't do its accessibility, readability and content justice! (Source)
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a... more
Minford opens with a lively,... more
Reid HoffmanReid read Carl von Clausewitz and Sun Tzu as a boy, which informed his strategic thinking. (Source)
Neil deGrasse TysonWhich books should be read by every single intelligent person on planet? [...] The Art of War (Sun Tsu) [to learn that the act of killing fellow humans can be raised to an art]. If you read all of the above works you will glean profound insight into most of what has driven the history of the western world. (Source)
Evan SpiegelAfter meeting Mark Zuckerberg, [Evan Spiegel] immediately bought every [Snapchat] employee a copy of 'The Art Of War'. (Source)
The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the... more
Don't have time to read the top Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
"…monumental… fascinating… comprehensive… the definitive work on cryptography for computer programmers…" –Dr. Dobb's Journal
"…easily ranks as one of the most authoritative in its field." —PC Magazine
"…the bible of code hackers." –The Millennium Whole Earth Catalog
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers... more
Dominic Steil[One of the five books recommends to young people interested in his career path.] (Source)
The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.
This edition updated with new information about post-9/11 security. less
In the... more
Casey NeistatAside from The Autobiography of Malcolm X, Casey's favorite book is The Second World War by John Keegan. (Source)
Ryan HolidayI forget who said it but I heard someone say that Catcher in the Rye was to young white boys what the Autobiography of Malcolm X was to young black boys. Personally, I prefer that latter over the former. I would much rather read about and emulate a man who is born into adversity and pain, struggles with criminality, does prison time, teaches himself to read through the dictionary, finds religion... (Source)
Keith EllisonMalcolm X is somebody that everybody in America’s prisons today could look at and say, ‘You know what, I can emerge, I can evolve' (Source)
For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.
You'll learn how to:
Set up a safe virtual environment to analyze... more
Once you've built your foundation for penetration testing, you'll learn the... more
Twenty-two-year-old Skeeter has just returned home after graduating from Ole Miss. She may have a degree, but it is 1962, Mississippi, and her mother will not be happy till Skeeter has a ring on her finger. Skeeter would normally find solace with her beloved maid Constantine, the woman who raised her, but Constantine has disappeared and no one will tell Skeeter where she has gone.
Aibileen is a black maid, a wise, regal woman raising her seventeenth white child. Something has shifted inside her after the loss... more
Twin Mummy And DaddyI love a good book and The Help is exactly that! In fact it’s an amazing book! Read my review over on the blog today! https://t.co/efaf9aRGOK #TheHelp #KathrynStockett #bookreview #bookblogger #mummybloggers #daddybloggers #pbloggers #mbloggers @UKpbloggers @UKBloggers1 #books (Source)
Isabelle has learned the hard way how hard life can be when fate isn’t by your side. It can hand you dreams on silver platters, but it can snatch them right back and hand you nightmares. One thing Isabelle knew for sure fate was consistent with was taking away everything she ever loved.
For the last two years Isabelle has been slowly clearing the clouds of her past. Happiness is finally on the horizon. She has a thriving business, great friends, and her life back. All she has... more
The word spread through the hacking underground like some unstoppable new virus: an audacious crook had staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy.
The culprit was a brilliant programmer with a hippie ethic and a supervillain's double identity. Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As... more
In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with... more
John SargentEdward Snowden decided at the age of 29 to give up his entire future for the good of his country. He displayed enormous courage in doing so, and like him or not, his is an incredible American story. There is no doubt that the world is a better and more private place for his actions. Macmillan is enormously proud to publish Permanent Record. (Source)
Kara SwisherBtw @Snowden new book “Permanent Record” is quite good and surprisingly a love letter to the Internet as it was. (Source)
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches,... more
Don't have time to read the top Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we... more
Warren BuffettTo invest successfully over a lifetime does not require a stratospheric IQ, unusual business insights, or inside information. What's needed is a sound intellectual framework for making decisions and the ability to keep emotions from corroding that framework. This book precisely and clearly prescribes the proper framework. You must provide the emotional discipline. (Source)
Kevin RoseThe foundation for investing. A lot of people have used this as their guide to getting into investment, basic strategies. Actually Warren Buffett cites this as the book that got him into investing and he says that principles he learned here helped him to become a great investor. Highly recommend this book. It’s a great way understand what’s going on and how to evaluate different companies out... (Source)
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering... more
In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies-and countless viruses, phishing, and spyware attacks-he delivers the first definitive narrative of the global spam problem and its threat to... more
Josephine WolffBrian Krebs is really more deeply reported on financial cyber criminals than almost anybody in the world.He’s really smart about the ways in which money drives a lot of these cyber crimes. (Source)
I’ve always been good at wearing masks. Not letting anyone see the real me. I’m content being the happy-go-lucky best friend. The strong willed boss. The independent woman who doesn’t need a man.
But the truth is I’m just as broken as the rest of you. I’m terrified that all it will take is one person to make all my carefully constructed walls crumble into fine dust. So I guard my heart with everything I have. Determined to never let anyone get close enough to hurt me again.
All is perfect until HE walks into my life. No… he doesn’t just walk. He struts... more
Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he... more
Melissa Larson will never let anyone hold... more
Don't have time to read the top Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse... more
Caught in an accelerating tempest of secrecy and lies, Susan Fletcher battles to save the agency she believes in. Betrayed on all sides, she finds herself... more
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers. The attacks culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's... more
Ben LoricaI am in the middle of Sandworm by @a_greenberg and it is great read. I have a feeling that recent events in the Middle East will result in cyberattacks similar to those in this book https://t.co/qLM5Z7YAdl (Source)
Laurence TribeVote augmentation looks like the newest form of election manipulation. It was a favorite Putin/GRU technique in Estonia, Georgia, and Ukraine. See Andy Greenberg’s book “Sandworm.” https://t.co/0i9NSdUvzs (Source)
Jack Rhysider@selenalarson @a_greenberg wrote a great book (Source)
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the twenty-nine-year-old NSA contractor Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a... more
Gilbert RwabigwiYour book, “No Place To Hide”, was a thrilling/insightful read. Can’t wait to flip through @Snowden’s memoir. 🙏🏾 https://t.co/pZPLxDpNcM (Source)
Alex Caceres/hacker Frmrly Known As Dotslashpunk@gvgm3 @SecurityTube For networks i'd have to say hands down the OSCP is likely one of the best you're going to find. Fuck the cert, take the course, get down and dirty in the labs and break everything. I hear @georgiaweidman's book is good (Pen testing with Metasploit) but have not read it myself (Source)
Until she barges into my life. Promising me happiness and a peace I’ve been craving for years. She is the sun to my darkness, the happy to my despair.
But she holds secrets. Just like I do. She holds hers close, where I just pray mine don’t rock the walls we’re trying to build.
Now I’m stuck at a... more
Don't have time to read the top Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home... more
Trust and cooperation are the first problems we had to solve before we could become a social species. In the 21st century, they have become the most important problems we need to solve — again. Our global society has become so large and complex that our traditional trust mechanisms no longer work.
Bruce Schneier, world-renowned for his level-headed thinking on security and technology, tackles this complex subject head-on. Society can't... more
Joseph NyeThis is intriguing, because when you look at the enormous opportunities that the Internet has presented – economic efficiency, great communication – we generally think of the positive side. But what Clarke and Knake point out is that as we open these opportunities we also make ourselves vulnerable to their disruption. For example, you have the capacity to do damage in the physical world just by... (Source)
The past year has been a tough one for the Cage family, but they are now on the road to healing by learning to let go of the past and looking forward to their future.
When situations beyond his control threaten to take away so much of what Greg holds close to his heart, he has to learn that he doesn't always have the control he tries to maintain in their... more
Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action. The author uses many of the same analogies and explanations he’s honed in the classroom that have helped hundreds of... more
In June 1983, President Reagan watched the movie War Games, in which a teenager unwittingly hacks the Pentagon, and asked his top general if the scenario was plausible. The general said it was. This set in motion the first presidential directive on computer... more
Josephine WolffThis book is by Fred Kaplan and it’s a historical study of the ways that governments—and in particular the US government—have tried to think about and use cyberpower for state-to-state conflict. He looks at what the origins of that were in the 1980s and how it has evolved over the past 30 or so years. (Source)
This fully updated, industry-standard security resource shows how to fortify computer networks by learning and effectively applying ethical hacking techniques. Based on critical topics that the authors teach at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks.
Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition,... more
In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:
Create a trojan command-and-control using GitHub
Detect sandboxing and automate common malware tasks,... more
Don't have time to read the top Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an... more
All he knows is a miserable life with the Dursleys, his horrible aunt and uncle, and their abominable son, Dudley - a great big swollen spoiled bully. Harry’s room is a tiny closet at the foot of the stairs, and he hasn’t had a birthday party in eleven years.
But all that is about to change when a mysterious letter arrives by owl messenger: a letter with an... more
Joe Lycettguys i just read this book called harry potter well worth checking out it’s about a really interesting magic lad (Source)
In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to... more
Gwendolyn Kidd has met the man of her dreams. He's hot, he's sexy, and what started as a no-names-exchanged night of passion has blossomed into a year and a half-long pleasure fest. Sure, it's a little strange that he only appears in her bed at night, but Gwen is so sure he's the one, she just can't turn him away...
Hawk Delgado knows more about Gwen than she could ever imagine. She's gorgeous, headstrong, and skittish about relationships. But Hawk is facing his own demons, demons that keep him from connecting with anyone. Yet when... more
Through a series of football-style "plays," this straightforward guide gets to the root of many of the roadblocks people may face while penetration... more
–Dino Dai Zovi, Information Security Professional
"Give a man an exploit and you make him a hacker for a day; teach a man to exploit bugs and you make him a hacker for a lifetime."
–Felix 'FX' Lindner
Seemingly simple bugs can have drastic consequences, allowing attackers to compromise systems, escalate local privileges, and otherwise wreak havoc on a system.
A Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and... more
Chris FussellThe history of how great ideas evolve. (Source)
Brian BurkhartThis book is essentially a biography of all the people who’ve led to the technology of today—it’s fascinating. The most important point of the book is everything is one long, connected chain. There isn’t just one person or one industry that makes anything happen—it all goes way back. For example, the communication theory I have espoused and taught throughout my career is from Aristotle, Socrates,... (Source)
Sean Gardner@semayuce @MicrosoftUK @HelenSharmanUK @astro_timpeake @WalterIsaacson Yes, I agree: "The Innovators" is a great book. I loved it too. (Source)
Don't have time to read the top Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
The Rock Chicks of Fortnum’s Bookstore get involved to provide romantic advice and guidance, none of which Jules accepts at first. The Hot Bunch of Nightingale Investigations adopt Jules as one of their own. Even though Jules tries to hang on to her inner... more
Your code will be attacked. You need to assume it will run in the most hostile environments imaginable -- and design, code, and test accordingly. Writing Secure Code, Second Edition shows you how.
This edition draws on the lessons learned and taught throughout Microsoft during the firm s massive 2002 Windows Security Push. It s a huge upgrade to the respected First Edition, with new coverage across the board.
Michael Howard and David LeBlanc first help you define what security means to your customers --...
This effective self-study guide fully prepares you for the challenging CISSP exam and offers 100% coverage of all exam domains. This edition has been thoroughly revised to cover the new CISSP 2018 Common Body of Knowledge, hot spot and drag and drop question formats, and more.
CISSP All-in-One Exam Guide, Eighth Edition features hands-on exercises as well as "Notes," "Tips," and "Cautions" that provide real-world insight and call out potentially... more
Chapters cover the notion of secure encryption, randomness, block ciphers and ciphers, hash functions and message authentication codes, public-key crypto including RSA, Diffie-Hellman, and elliptic curves, as well as TLS and... more
Louis NyffeneggerFew technical books and a bit of everything. The following books are currently sitting on my bedside table: "The Hitchhiker's Guide To The Galaxy", "Predictable Revenue", "Manufacturing Consent", "Agile Application Security". "Oauth In Action", "Serious Cryptography". (Source)
Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows,... more
At the core of Obama’s Wars is the unsettled division between the civilian leadership in the White House and the United... more
Man has created codes to keep secrets and has broken codes to learn those secrets since the time of the Pharaohs. For 4,000 years, fierce battles have been waged between codemakers and codebreakers, and the story of these battles is civilization's secret history, the hidden account of how wars... more
Tyler CowenI read this one quite young, and learned that problems are to be solved! I also developed some sense of what a history could look like and what a history should report. I recall my uncle thinking it deeply strange that a boy my age should be reading a book of such length. (Source)
Too late, Luke knows she’s up to something and he’s already seen many a Rock Chick try to fight her own battles without the Hot Bunch stepping in. He’s having none of it. She’s having none of him. The clash of the Rock Chick and Hot Guy begins but Luke’s got the advantage. He has... more
Don't have time to read the top Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
Behind the Russian cyberattacks that may have thrown the 2016 election; behind the Sony hack; behind mysterious power outages around the world and the disappearance of thousands of personnel records from poorly guarded government servers are the traces of a new and powerful weapon, one that has the potential to remake global conflict like nothing... more
Bill Gates[On Bill Gates's reading list in 2018.] (Source)
Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other... more
Hector makes one (huge) mistake; he waits for Sadie to come to him. Tragedy strikes and Sadie’s got a choice, she can retreat... more
- Computer Security
- Security and Privacy
- Economics of Security
- National Security and Terrorism
Sample articles:
- Why Vista's DRM Is Bad For You
- When the Internet Is My Hard Drive, Should I Trust Third Parties?
- Steal This Wi-Fi
- Lessons From the Facebook Riots
- The ID Chip You Don't Want in Your Passport
- Camera Phones vs. Crime: Now We're Talking
- MySpace Passwords Aren't So Dumb
- An American Idol for Crypto Geeks
- Why Smart Cops Do Dumb Things more
The last person Sam Kelly expected to pull wounded from the lake was Sophie Lundgren. Once they shared a brief, intense affair while Sam was undercover and then she vanished. She’s spent the last months on the run, knowing that any mistake would cost her life and that of her unborn child—Sam’s child. Now she’s resurfaced with a warning for Sam: this time, he’s the one in danger.
Now he’s her last chance.
Sam has too many questions to let her slip away again—like why she disappeared in the first... more
Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network... more
Mace finds he doesn’t like it much that his ex-girlfriend got shot, right in front of him but it’s worse. A very bad man has thrown down the gauntlet and ALL the Rock Chicks are in the firing line. Stella doesn’t want... more
Don't have time to read the top Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
Cracking the Coding Interview, 6th Edition is here to help you through this process, teaching you what you need to know and enabling you to perform at your very best. I've coached and interviewed hundreds of software engineers. The result is this book.
Learn how to uncover the hints and hidden details in a question,... more
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers—from home thermostats to chemical plants—are all online. The Internet, once a virtual abstraction, can now sense and touch the physical world.
As we open our lives to this future, often called the Internet of Things, we are beginning to see its enormous potential in ideas like driverless cars, smart cities, and personal agents equipped... more
Alexander StubbI will get this book. Looks interesting beyond the title...Click Here to Kill Everybody by Bruce Schneier via @FT https://t.co/GGCRlsTflT (Source)
When the Campus Killer strikes again, Jack’s team is tasked by the Governor to find the killer, using whatever means they can.
While following the trail of the serial killer, he becomes entangled in the life of the beautiful woman living next to his property.
Bethany Bridwell moved in with her grandmother to take over running... more
Throw in a Dolly Parton look-alike, a gruff but lovable strip club owner, Jet’s ne’er do well father, his ne’er do well friend, Bear, Bear’s long-suffering, chain-smoking wife Lavonne and the crew... more
Years after the Marines brought them together, the men of Corps Security are together again.
These six novels follow their lives as they take a chance at love. Can love truly conquer all?
From broken souls to broken hearts, they all will find out if they'll get their second chance at happily ever afters and that love really is worth fighting for.
more
WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of... more
Don't have time to read the top Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
Minecraft is the one game that children, parents, and teaches all agree on. It’s great fun and a wonderful teaching tool. The Ultimate Unofficial Encyclopedia for Minecrafters reveals expert tricks of the trade for gamers. This exciting book will cover everything players need to know about mining, farming, building, villagers, the Nether, and more! Young gamers will be surprised... more
Most people would take an all-expenses-paid trip to the beach in a heartbeat. Garrett Kelly only accepts to keep tabs on Sarah Daniels, who’s in hiding after witnessing a murder by Marcus Lattimer, her half-brother—and a personal enemy of KGI. This gig may be beneath a disciplined soldier like Garrett, but if he gets a shot at Lattimer, it will all be worth it…
…and the ultimate moving target.
But Garrett hadn’t counted on falling for Sarah. He’d considered seduction as a tactical maneuver, but... more
After tall, muscular Ozzie comes to her rescue, May has no choice but to follow him to safety. At the headquarters of his private security firm, the Bourbon Street Boys, she finds a refuge for the night—and the offer of a job. But it’s not... more
Not just... more
--Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies "McGraw's book shows you how to make the 'culture of security' part of your development lifecycle."
--Howard A. Schmidt, Former White House Cyber Security Advisor "McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn't), buy this book and post it up on the... more
Wireshark (derived from the Ethereal project), has become the world's most popular network sniffing application.... more
Don't have time to read the top Security books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.