Tuesday, September 10, 2019

Cybersecurity Reading List

I have been building this list for quite awhile, and it's up to 200 books and papers now.  The source material is a Dragos suggested reading list, professional reading lists from the various armed services, the University of North Georgia, Defcon Reading List, and the Cybersecurity Canon.


  1. @War by Shane Harris
  2. 1984 by George Orwell
  3. 3D Printing Will Rock the World by John Hornick
  4. A Century of Spies: Intelligence in the Twentieth Century by Jeffrey T. Richelson 
  5. A Fierce Domain: Conflict in Cyberspace 1986 to 2012 by Heasley
  6. A Man Called Intrepid: The Secret War by William Stevenson 
  7. A Scanner Darkly by Phillip K. Dick
  8. Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization by Eric Cole
  9. America the Vulnerable by Joel Brenner
  10. An Abbreviated History of Automation & Industrial Controls Systems and Cybersecurity by Hayden, Assante and Conway (paper)
  11. Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard Criminals by Paul Mungo and Bryan Clough 
  12. At Large: The Strange Case of the World's Biggest Internet Invasion by David Freedman and Charles Mann 
  13. Bodyguard by William C. Dietz
  14. Brave New World by Aldous Huxley
  15. Brave New World Revisited by Aldous Huxley
  16. Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications by Ivan Ristic, ISBN-13: 978-1907117046
  17. Burning Chrome by William Gibson
  18. Che Guevara and the FBI: U.S. Political Police Dossier on the Latin American Revolutionary by Michael Ratner 
  19. Colossus And Crab by D.F. Jones
  20. Colossus by D.F. Jones
  21. Colossus the Forbin Project by D.F. Jones
  22. Colossus Triology: Colossus, The Fall of Colossus and Colossus and the Crab by D.F. Jones
  23. Competitive Intelligence : How to Gather, Analyze, and Use Information to Move Your Business to the Top by Larry Kahaner 
  24. Compilers: Principles, Techniques, and Tools by Alfred V. Aho, Monica S. Lam, Ravi Sethi, Jeffrey D. Ullman ISBN-13: 978-0201100884
  25. Computer Networks (5th Edition) by Andrew S. Tennebaum, ISBN-13: 978-0132126953 
  26. Corporate Espionage: What It Is, Why It's Happening in Your Company, What You Must Do About It by Ira Winkler 
  27. Count Zero by William Gibson
  28. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon by Kim Zetter 
  29. Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses by Ed Skoudis; Tom Liston
  30. Counterstrike: The Untold Story of America's Secret Campaign Against Al Qaeda by Eric Schmitt
  31. Cracking the Coding Interview: 150 Programming Questions and Solutions by Gayle Laakmann McDowell, ISBN-13: 978-0984782802
  32. Credit Power!: Rebuild Your Credit in 90 Days or Less by John Q. Newman 
  33. Crypto by Steven Levy
  34. Cryptonomicon by Neal Stephenson
  35. Cyber Adversary Characterization: Auditing the Hacker Mind by Tom Parker; Marcus H. Sachs; Eric Shaw; Ed Stroz; Matthew G. Devost Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats by Will Gragido; John Pirc
  36. Cyber War: The Next Threat to National Security and What To Do About It by Richard A. Clarke; Robert Knake
  37. Cyberpower and National Security by Franklin D. Kramer (Editor); Stuart H. Starr (Editor); Larry Wentz (Editor)
  38. Cyberpunk: Outlaws and Hackers on the Computer Frontier by Katie Hafner and John Markhoff 
  39. Cybersecurity and Cyberwar: What Everyone Needs to Know by P.W. Singer
  40. Cyber Security Assessments of ICS: A Good Practice Guide by DHS CPNI (Paper)
  41. Dark Territory: The Secret History of Cyber War by Fred Kaplan
  42. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier
  43. Defeating Adversary Network Intelligence Efforts with Active Cyber Defense Techniques by Keith A. Repik
  44. Delivering on Digital: The Innovators and Technologies That are Transforming Government
  45. Design and Analysis of Knowledge-Base Centric Insider Threat Models by Qutaibah Althebyan
  46. Diamond Age by Neal Stephenson
  47. Diamond Model of intrusion analysis by Caltagirone, Pendergast, and Betz (paper)
  48. Do Androids Dream of Electric Sheep by Phillip K. Dick
  49. Double Loop Learning in Organizations by Argyris (paper)
  50. Electric Power System Basics:  For the Nontechnical Professional
  51. Embedded Device Vulnerability Analysis by Oliver and O’Meara (Paper)
  52. Ender's Game by Orson Scott Card
  53. Exponential Organizations: Why new organizations are ten times better, faster, and cheaper than yours (and what to do about it) by Salim Ismail
  54. Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet by Joseph Menn
  55. Friendly Spies: How America's Allies Are Using Economic Espionage to Steal Our Secrets by Peter Schweizer 
  56. Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It by Marc Goodman
  57. Future Noir: The Making of Blade Runner
  58. Generating Hypothesis for Successful Threat Hunting by Lee, Bianco (Paper)
  59. Ghost Fleet by P. W. Singer; August Cole
  60. Ghost in the Wires by Kevin Mitnick; William L. Simon (As told to); Steve Wozniak (Foreword by)
  61. Glass Houses:  Privacy, Secrecy, and Cyber Insecurity in a Transparent World by Joel Brenner
  62. Guidelines for Planning an Integrated Security Operations Center, EPRI (paper)
  63. Hackers: Heroes of the Computer Revolution by Steven Levy
  64. Hacking Exposed:  Industrial Control Systems by Bodungen, Singer, Shbeeb, Hilt and Wilbit
  65. Hacking Exposed 7: Network Security Secrets and Solutions by Stuart McClure; George Kurtz; Joel Scambray
  66. Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions by Slava Gomzin 
  67. Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson, ISBN-13: 978-1593271442 , available in paperback
  68. Heavy Weather by Bruce Sterling
  69. How to Investigate Your Friends, Enemies, and Lovers by Trent Sands, John Q. Newman 
  70. How to Measure Anything in Cybbersecurity Risk by Douglas Hubbard and Richard Seiersen
  71. Hunting with Rigor: Quantifying the Breadth, Depth and Threat Intelligence Coverage of a Threat Hunt in Industrial Control System Environments By Gunter (paper)
  72. I, Robot by Issac Asimov
  73. Idoru by William Gibson
  74. In the Beginning...was the Command Line by Neal Stephenson
  75. Industrial Automation and Process Control Security: SCADA, DCS, PLC, HMI, and SIS by Tyson Macaulay; Bryan L. Singer
  76. Industrial Control Threat Intelligence by Caltagirone (paper)
  77. Industrial Network Security by Knapp and Langill
  78. Information Warfare: Chaos on the Electronic Superhighway by Winn Schwartau 
  79. Inside CIA's Private World: Declassified Articles from the Agency`s Internal Journal, 1955-1992 by H. Bradford Westerfield 
  80. Inside Cyber Warfare: Mapping the Cyber Underworld by Jeffrey Carr
  81. Inside the CIA: Revealing the Secrets of the World's Most Powerful Spy Agency by Ronald Kessler 
  82. Insights into Building an Industrial Control System Security Operations Center, Dragos (paper)
  83. Interface by Neal Stephenson
  84. Islands in the Net by Bruce Sterling
  85. Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen 
  86. Leadership BS: Fixing Workplaces and Careers One Truth at a Time by Jeffery Pfeiffer
  87. Learn You a Haskell for Great Good!: A Beginner's Guide by Miran Lipovaca, ISBN-13: 978-1593272838
  88. Learning RSLogix 5000 programming by Scott
  89. Legion of the Damned by William C. Dietz
  90. Lethal Interface by Mel Odom
  91. Level 4: Virus Hunters of the CDC by Joseph B. McCormack, Susan Fischer-Hoch 
  92. Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath by Ted Koppel
  93. Little Brother by Cory Doctorow
  94. Lobbying and Policy Change: Who Wins, Who Loses, and Why by Frank R. Baumgartner
  95. Man Plus by Frederick Pohl
  96. Managing the Insider Threat: No Dark Corners by Nick Catrantzos
  97. Mars Plus by Frederick Pohl
  98. Masters of Deception: The Gang That Ruled Cyberspace by Michele Slatalla and Joshua Quittner 
  99. Measuring and Managing Information Risk: A FAIR Approach by Jack Freund and Jack Jones
  100. Metasploit: The Penetration Testers Guide by David Kennedy, Jim O'Gorman, Devon Kearns, and Mati Ahorni
  101. Mona Lisa Overdrive by William Gibson
  102. Neuromancer by William Gibson
  103. Newton's Telecom Dictionary: Telecommunications, Networking, Information Technologies, the Internet, Wired, Wireless, Satellites, and Fiber by Harry Newton
  104. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State by Glenn Greenwald 
  105. Our Robots, Ourselves: Robotics and the Myth of Autonomy by David Mindell
  106. Out of the Inner Circle: The True Story of a Computer Intruder Capable of Cracking the Nation's Most Secure Computer Systems (Tempus) by Bill Landreth 
  107. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software by Michael Sikorski and Andrew Honig, ISBN-13: 978-1593272906 
  108. Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security by Daniel Jackson; Gary M. Jackson
  109. Privacy on the Line: The Politics of Wiretapping and Encryption by Whitfield Diffie, Susan Landau 
  110. Privacy Power: Protecting Your Personal Privacy in the Digital Age by Trent Sands 
  111. Python Essential Reference (4th Edition) by David M. Beazley, ISBN-13: 978-0672329784
  112. Radio Monitoring: The How-To Guide by T.J. Arey 
  113. Retrofitting Blade Runner: Issues in Ridley Scott's Blade Runner and Phillip K. Dick's Do Androids Dream of Electric Sheep?
  114. Reverse Deception: Organized Cyber Threat Counter-Exploitation by Sean Bodmer; Max Kilger; Gregory Carpenter; Jade Jones; Jeff Jones
  115. RFID: MIFARE and Contactless Cards in Application by Gerhard Schalk 
  116. Rtfm: Red Team Field Manual by Ben Clark, ISBN-13: 978-0321444424 
  117. Sams Teach Yourself Networking in 24 Hours by Uyless Black; Uyless D. Black; Joseph W. Habraken
  118. Scanner Modifications And Antennas by Jerry Pickard 
  119. Scanners And Secret Frequencies (Electronic Underground S) by Henry Eisenson 
  120. Schismatrix Plus (Complete Shapers-Mechanists Universe) by Bruce Sterling
  121. Science, Strategu and War by Osinga
  122. Secrets and Lies: Digital Security in a Networked World by Bruce Schneier
  123. Secure Architecture for Industrial Control Systems by Obregon
  124. Secrets of a Buccaneer-Scholar: How Self-Education and the Pursuit of Passion Can Lead to a Lifetime of Success by James Marcus Bach, ISBN-13: 978-1439109090
  125. Selected Stories of Philip K. Dick by Phillip K. Dick
  126. Site Reliability Engineering by Betsy Beyer, Chris Jones, Jennifer Petoff and Niall Murphy
  127. Skunk Works: A Personal Memoir of My Years at Lockheed by Ben Rich 
  128. Smart Card Developer's Kit by Scott Guthery, Timothy Jurgensen 
  129. Snow Crash by Neal Stephenson
  130. Social Engineering: The Art of Human Hacking by Christopher Hadnagy 
  131. Society and the Internet: How Networks of Information and Communication are Changing Our Lives by Mark Graham, William H. Dutton, and Manuel Castells
  132. Spam nation by Brian Krebs
  133. Spy Catcher: The Candid Autobiography of a Senior Intelligence Officer by Peter Wright 
  134. Starship Troopers by Robert Heinlein
  135. Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD by Ryan Russel, Ido Dubrawsky, FX, Joe Grand, Tim Mullen, ASIN: B006NV2EGI
  136. Strategy: A History by Lawerence Freedman
  137. Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw - By the Man Who Did It by John Markhoff and Tsutomu Shimomura 
  138. Tallinn Manual on the International Law Applicable to Cyber Warfare
  139. Tao of Network Security Monitoring by Bejtlich
  140. TCP/IP Illustrated, Volume 1: The Protocols (2nd Edition) (Addison-Wesley Professional Computing Series) by Kevin Fall and W. Richard Stevens, ISBN-13: 978-0321336316
  141. Technicians Guide to Programmable Controllers by Borden and Cox
  142. The Age of the Unthinkable: Why the New World Disorder Constantly Surprises Us And What We Can Do About It by Joshua Cooper Ramo
  143. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers by Kevin Mitnick 
  144. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities by Mark Dowd, John McDonald, Justin Schuh ISBN-13: 978-0321444424 
  145. The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy by Patrick Engebretson, ISBN-13: 978-0124116443 
  146. The CERT Guide to Insider Threats: How to Prevent, Detect, & Respond to Information Technology Crimes by Dawn M. Cappelli; Andrew P. Moore; Randall F. Trzeciak
  147. The Checlist Manifesto by Gawande
  148. The Circle by Dave Eggers
  149. The Cuckoo's Egg:Tracking a Spy through the Maze of Computer Espionage by Cliff Stoll
  150. The Cyberthief and the Samurai by Jeff Goodell 
  151. The Defense of Hill 781: An Allegory of Modern Mechanized Combat by James R. McDonough; John R. Galvin (Foreword by)
  152. The Dictator's Handbook: Why Bad Behavior is Almost Always Good Politics by Bruce Bueno de Mesquita
  153. The Difference Engine by William Gibson
  154. The Failure of Risk Management: Why It's Broken and How to Fix It by Douglas W. Hubbard
  155. The Fall of Colossus by D.F. Jones
  156. The FBI: Inside the World's Most Powerful Law Enforcement Agency by Ronald Kessler 
  157. The Four Types of Threat Detection by Caltagirone and Lee (paper)
  158. The Forever War by Joe Haldeman
  159. The Fugitive Game: Online with Kevin Mitnick by Jonathan Littman 
  160. The Future of Power by Joseph S. Nye
  161. The Grey Line: Modern Corporate Espionage and Counterintelligence by Andrew Brown
  162. The Hacker Crackdown: Law And Disorder On The Electronic Frontier by Bruce Sterling 
  163. The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim, ASIN: B00N4FG6TW
  164. The Industrial Control System Cyber Kill Chain (paper)
  165. The Innovator's Dilemma: The Revolutionary Book that Will Change the Way You Do Business by Clayton M. Christensen
  166. The Instigators: How a Small Band of Digtal Activists Risked Their Lives and Helped Bring Down the Government of Egypt by David Wolman
  167. The Lean Startup by Eric Ries
  168. The Mossad: Israel's Secret Intelligence Service: Inside Stories by Dennis Eisenberg 
  169. The Net Delusion: The Dark Side of Internet Freedom by Evgeny Morozov
  170. The Phoenix Project by Gene Kim, Kevin Behr, and George Spafford
  171. The Puzzle Palace: Inside the National Security Agency, America's Most Secret Intelligence Organization by James Bamford 
  172. The Red Web: The Struggle Between Russia's Digital Dictators and the New Online Revolutionaries by Andrei Soldatov, Irina Borogan
  173. The Seventh Sense: Power, Fortune and Survival in the Age of Networks
  174. The Shadow Factory: The NSA from 9/11 to the Eavesdropping on America by James Bamford
  175. The Singularity Is Near: When Humans Transcend Biology by Ray Kurzweil
  176. The spy catcher trial: The scandal behind the #1 best seller by Malcolm Turnbull 
  177. The Starfish and the Spider: The Unstoppable Power of Leaderless Organizations by Ori Brafman
  178. The Tangled Web: A Guide to Securing Modern Web Applications by Michael Zalewski, ISBN-13: 978-1593273880
  179. The Ultimate Scanner: Cheek 3 by Bill Cheek 
  180. The Underground Database (The Electronic Underground, Vol 1) 
  181. The VALIS Trilogy by Phillip K. Dick
  182. The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen by Jonathan Littman 
  183. Thinking Fast and Slow by Kahneman
  184. True Names...and Other Dangers by Vernor Vinge
  185. True Names: And the Opening of the Cyberspace Frontier by Vernor Vinge
  186. Unmasking the Social Engineer by Christopher Hadnagy
  187. Unrestricted Warfare: China's Master Plan to Destroy America by Qiao Liang
  188. Virtual Light by William Gibson
  189. War by Other Means: Economic Espionage in America by John J. Fialka 
  190. We are Anonymous by Parmly Olsen
  191. When Sysadmins Ruled the Earth by Cory Doctrow
  192. Where Wizards Stay Up Late: The Origins Of The Internet by Katie Hafner 
  193. Windows Internals, Part 1 by Mark Russinovich, Alex Ionescu, and David Solomon
  194. Window Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry (2nd Edition) by Harlan Carvey 
  195. Winning as a CISO by Rich Baich
  196. Wired for War by P. W. Singer
  197. Worm by Mark Bowden
  198. Zero Day by Mark Russinovich
  199. Zodiac( The Eco-Thriller) by Neal Stephenson

No comments: