- @War by Shane Harris
- 1984 by George Orwell
- 3D Printing Will Rock the World by John Hornick
- A Century of Spies: Intelligence in the Twentieth Century by Jeffrey T. Richelson
- A Fierce Domain: Conflict in Cyberspace 1986 to 2012 by Heasley
- A Man Called Intrepid: The Secret War by William Stevenson
- A Scanner Darkly by Phillip K. Dick
- Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization by Eric Cole
- America the Vulnerable by Joel Brenner
- An Abbreviated History of Automation & Industrial Controls Systems and Cybersecurity by Hayden, Assante and Conway (paper)
- Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard Criminals by Paul Mungo and Bryan Clough
- At Large: The Strange Case of the World's Biggest Internet Invasion by David Freedman and Charles Mann
- Bodyguard by William C. Dietz
- Brave New World by Aldous Huxley
- Brave New World Revisited by Aldous Huxley
- Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications by Ivan Ristic, ISBN-13: 978-1907117046
- Burning Chrome by William Gibson
- Che Guevara and the FBI: U.S. Political Police Dossier on the Latin American Revolutionary by Michael Ratner
- Colossus And Crab by D.F. Jones
- Colossus by D.F. Jones
- Colossus the Forbin Project by D.F. Jones
- Colossus Triology: Colossus, The Fall of Colossus and Colossus and the Crab by D.F. Jones
- Competitive Intelligence : How to Gather, Analyze, and Use Information to Move Your Business to the Top by Larry Kahaner
- Compilers: Principles, Techniques, and Tools by Alfred V. Aho, Monica S. Lam, Ravi Sethi, Jeffrey D. Ullman ISBN-13: 978-0201100884
- Computer Networks (5th Edition) by Andrew S. Tennebaum, ISBN-13: 978-0132126953
- Corporate Espionage: What It Is, Why It's Happening in Your Company, What You Must Do About It by Ira Winkler
- Count Zero by William Gibson
- Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon by Kim Zetter
- Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses by Ed Skoudis; Tom Liston
- Counterstrike: The Untold Story of America's Secret Campaign Against Al Qaeda by Eric Schmitt
- Cracking the Coding Interview: 150 Programming Questions and Solutions by Gayle Laakmann McDowell, ISBN-13: 978-0984782802
- Credit Power!: Rebuild Your Credit in 90 Days or Less by John Q. Newman
- Crypto by Steven Levy
- Cryptonomicon by Neal Stephenson
- Cyber Adversary Characterization: Auditing the Hacker Mind by Tom Parker; Marcus H. Sachs; Eric Shaw; Ed Stroz; Matthew G. Devost Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats by Will Gragido; John Pirc
- Cyber War: The Next Threat to National Security and What To Do About It by Richard A. Clarke; Robert Knake
- Cyberpower and National Security by Franklin D. Kramer (Editor); Stuart H. Starr (Editor); Larry Wentz (Editor)
- Cyberpunk: Outlaws and Hackers on the Computer Frontier by Katie Hafner and John Markhoff
- Cybersecurity and Cyberwar: What Everyone Needs to Know by P.W. Singer
- Cyber Security Assessments of ICS: A Good Practice Guide by DHS CPNI (Paper)
- Dark Territory: The Secret History of Cyber War by Fred Kaplan
- Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier
- Defeating Adversary Network Intelligence Efforts with Active Cyber Defense Techniques by Keith A. Repik
- Delivering on Digital: The Innovators and Technologies That are Transforming Government
- Design and Analysis of Knowledge-Base Centric Insider Threat Models by Qutaibah Althebyan
- Diamond Age by Neal Stephenson
- Diamond Model of intrusion analysis by Caltagirone, Pendergast, and Betz (paper)
- Do Androids Dream of Electric Sheep by Phillip K. Dick
- Double Loop Learning in Organizations by Argyris (paper)
- Electric Power System Basics: For the Nontechnical Professional
- Embedded Device Vulnerability Analysis by Oliver and O’Meara (Paper)
- Ender's Game by Orson Scott Card
- Exponential Organizations: Why new organizations are ten times better, faster, and cheaper than yours (and what to do about it) by Salim Ismail
- Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet by Joseph Menn
- Friendly Spies: How America's Allies Are Using Economic Espionage to Steal Our Secrets by Peter Schweizer
- Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It by Marc Goodman
- Future Noir: The Making of Blade Runner
- Generating Hypothesis for Successful Threat Hunting by Lee, Bianco (Paper)
- Ghost Fleet by P. W. Singer; August Cole
- Ghost in the Wires by Kevin Mitnick; William L. Simon (As told to); Steve Wozniak (Foreword by)
- Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World by Joel Brenner
- Guidelines for Planning an Integrated Security Operations Center, EPRI (paper)
- Hackers: Heroes of the Computer Revolution by Steven Levy
- Hacking Exposed: Industrial Control Systems by Bodungen, Singer, Shbeeb, Hilt and Wilbit
- Hacking Exposed 7: Network Security Secrets and Solutions by Stuart McClure; George Kurtz; Joel Scambray
- Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions by Slava Gomzin
- Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson, ISBN-13: 978-1593271442 , available in paperback
- Heavy Weather by Bruce Sterling
- How to Investigate Your Friends, Enemies, and Lovers by Trent Sands, John Q. Newman
- How to Measure Anything in Cybbersecurity Risk by Douglas Hubbard and Richard Seiersen
- Hunting with Rigor: Quantifying the Breadth, Depth and Threat Intelligence Coverage of a Threat Hunt in Industrial Control System Environments By Gunter (paper)
- I, Robot by Issac Asimov
- Idoru by William Gibson
- In the Beginning...was the Command Line by Neal Stephenson
- Industrial Automation and Process Control Security: SCADA, DCS, PLC, HMI, and SIS by Tyson Macaulay; Bryan L. Singer
- Industrial Control Threat Intelligence by Caltagirone (paper)
- Industrial Network Security by Knapp and Langill
- Information Warfare: Chaos on the Electronic Superhighway by Winn Schwartau
- Inside CIA's Private World: Declassified Articles from the Agency`s Internal Journal, 1955-1992 by H. Bradford Westerfield
- Inside Cyber Warfare: Mapping the Cyber Underworld by Jeffrey Carr
- Inside the CIA: Revealing the Secrets of the World's Most Powerful Spy Agency by Ronald Kessler
- Insights into Building an Industrial Control System Security Operations Center, Dragos (paper)
- Interface by Neal Stephenson
- Islands in the Net by Bruce Sterling
- Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen
- Leadership BS: Fixing Workplaces and Careers One Truth at a Time by Jeffery Pfeiffer
- Learn You a Haskell for Great Good!: A Beginner's Guide by Miran Lipovaca, ISBN-13: 978-1593272838
- Learning RSLogix 5000 programming by Scott
- Legion of the Damned by William C. Dietz
- Lethal Interface by Mel Odom
- Level 4: Virus Hunters of the CDC by Joseph B. McCormack, Susan Fischer-Hoch
- Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath by Ted Koppel
- Little Brother by Cory Doctorow
- Lobbying and Policy Change: Who Wins, Who Loses, and Why by Frank R. Baumgartner
- Man Plus by Frederick Pohl
- Managing the Insider Threat: No Dark Corners by Nick Catrantzos
- Mars Plus by Frederick Pohl
- Masters of Deception: The Gang That Ruled Cyberspace by Michele Slatalla and Joshua Quittner
- Measuring and Managing Information Risk: A FAIR Approach by Jack Freund and Jack Jones
- Metasploit: The Penetration Testers Guide by David Kennedy, Jim O'Gorman, Devon Kearns, and Mati Ahorni
- Mona Lisa Overdrive by William Gibson
- Neuromancer by William Gibson
- Newton's Telecom Dictionary: Telecommunications, Networking, Information Technologies, the Internet, Wired, Wireless, Satellites, and Fiber by Harry Newton
- No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State by Glenn Greenwald
- Our Robots, Ourselves: Robotics and the Myth of Autonomy by David Mindell
- Out of the Inner Circle: The True Story of a Computer Intruder Capable of Cracking the Nation's Most Secure Computer Systems (Tempus) by Bill Landreth
- Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software by Michael Sikorski and Andrew Honig, ISBN-13: 978-1593272906
- Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security by Daniel Jackson; Gary M. Jackson
- Privacy on the Line: The Politics of Wiretapping and Encryption by Whitfield Diffie, Susan Landau
- Privacy Power: Protecting Your Personal Privacy in the Digital Age by Trent Sands
- Python Essential Reference (4th Edition) by David M. Beazley, ISBN-13: 978-0672329784
- Radio Monitoring: The How-To Guide by T.J. Arey
- Retrofitting Blade Runner: Issues in Ridley Scott's Blade Runner and Phillip K. Dick's Do Androids Dream of Electric Sheep?
- Reverse Deception: Organized Cyber Threat Counter-Exploitation by Sean Bodmer; Max Kilger; Gregory Carpenter; Jade Jones; Jeff Jones
- RFID: MIFARE and Contactless Cards in Application by Gerhard Schalk
- Rtfm: Red Team Field Manual by Ben Clark, ISBN-13: 978-0321444424
- Sams Teach Yourself Networking in 24 Hours by Uyless Black; Uyless D. Black; Joseph W. Habraken
- Scanner Modifications And Antennas by Jerry Pickard
- Scanners And Secret Frequencies (Electronic Underground S) by Henry Eisenson
- Schismatrix Plus (Complete Shapers-Mechanists Universe) by Bruce Sterling
- Science, Strategu and War by Osinga
- Secrets and Lies: Digital Security in a Networked World by Bruce Schneier
- Secure Architecture for Industrial Control Systems by Obregon
- Secrets of a Buccaneer-Scholar: How Self-Education and the Pursuit of Passion Can Lead to a Lifetime of Success by James Marcus Bach, ISBN-13: 978-1439109090
- Selected Stories of Philip K. Dick by Phillip K. Dick
- Site Reliability Engineering by Betsy Beyer, Chris Jones, Jennifer Petoff and Niall Murphy
- Skunk Works: A Personal Memoir of My Years at Lockheed by Ben Rich
- Smart Card Developer's Kit by Scott Guthery, Timothy Jurgensen
- Snow Crash by Neal Stephenson
- Social Engineering: The Art of Human Hacking by Christopher Hadnagy
- Society and the Internet: How Networks of Information and Communication are Changing Our Lives by Mark Graham, William H. Dutton, and Manuel Castells
- Spam nation by Brian Krebs
- Spy Catcher: The Candid Autobiography of a Senior Intelligence Officer by Peter Wright
- Starship Troopers by Robert Heinlein
- Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD by Ryan Russel, Ido Dubrawsky, FX, Joe Grand, Tim Mullen, ASIN: B006NV2EGI
- Strategy: A History by Lawerence Freedman
- Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw - By the Man Who Did It by John Markhoff and Tsutomu Shimomura
- Tallinn Manual on the International Law Applicable to Cyber Warfare
- Tao of Network Security Monitoring by Bejtlich
- TCP/IP Illustrated, Volume 1: The Protocols (2nd Edition) (Addison-Wesley Professional Computing Series) by Kevin Fall and W. Richard Stevens, ISBN-13: 978-0321336316
- Technicians Guide to Programmable Controllers by Borden and Cox
- The Age of the Unthinkable: Why the New World Disorder Constantly Surprises Us And What We Can Do About It by Joshua Cooper Ramo
- The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers by Kevin Mitnick
- The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities by Mark Dowd, John McDonald, Justin Schuh ISBN-13: 978-0321444424
- The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy by Patrick Engebretson, ISBN-13: 978-0124116443
- The CERT Guide to Insider Threats: How to Prevent, Detect, & Respond to Information Technology Crimes by Dawn M. Cappelli; Andrew P. Moore; Randall F. Trzeciak
- The Checlist Manifesto by Gawande
- The Circle by Dave Eggers
- The Cuckoo's Egg:Tracking a Spy through the Maze of Computer Espionage by Cliff Stoll
- The Cyberthief and the Samurai by Jeff Goodell
- The Defense of Hill 781: An Allegory of Modern Mechanized Combat by James R. McDonough; John R. Galvin (Foreword by)
- The Dictator's Handbook: Why Bad Behavior is Almost Always Good Politics by Bruce Bueno de Mesquita
- The Difference Engine by William Gibson
- The Failure of Risk Management: Why It's Broken and How to Fix It by Douglas W. Hubbard
- The Fall of Colossus by D.F. Jones
- The FBI: Inside the World's Most Powerful Law Enforcement Agency by Ronald Kessler
- The Four Types of Threat Detection by Caltagirone and Lee (paper)
- The Forever War by Joe Haldeman
- The Fugitive Game: Online with Kevin Mitnick by Jonathan Littman
- The Future of Power by Joseph S. Nye
- The Grey Line: Modern Corporate Espionage and Counterintelligence by Andrew Brown
- The Hacker Crackdown: Law And Disorder On The Electronic Frontier by Bruce Sterling
- The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim, ASIN: B00N4FG6TW
- The Industrial Control System Cyber Kill Chain (paper)
- The Innovator's Dilemma: The Revolutionary Book that Will Change the Way You Do Business by Clayton M. Christensen
- The Instigators: How a Small Band of Digtal Activists Risked Their Lives and Helped Bring Down the Government of Egypt by David Wolman
- The Lean Startup by Eric Ries
- The Mossad: Israel's Secret Intelligence Service: Inside Stories by Dennis Eisenberg
- The Net Delusion: The Dark Side of Internet Freedom by Evgeny Morozov
- The Phoenix Project by Gene Kim, Kevin Behr, and George Spafford
- The Puzzle Palace: Inside the National Security Agency, America's Most Secret Intelligence Organization by James Bamford
- The Red Web: The Struggle Between Russia's Digital Dictators and the New Online Revolutionaries by Andrei Soldatov, Irina Borogan
- The Seventh Sense: Power, Fortune and Survival in the Age of Networks
- The Shadow Factory: The NSA from 9/11 to the Eavesdropping on America by James Bamford
- The Singularity Is Near: When Humans Transcend Biology by Ray Kurzweil
- The spy catcher trial: The scandal behind the #1 best seller by Malcolm Turnbull
- The Starfish and the Spider: The Unstoppable Power of Leaderless Organizations by Ori Brafman
- The Tangled Web: A Guide to Securing Modern Web Applications by Michael Zalewski, ISBN-13: 978-1593273880
- The Ultimate Scanner: Cheek 3 by Bill Cheek
- The Underground Database (The Electronic Underground, Vol 1)
- The VALIS Trilogy by Phillip K. Dick
- The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen by Jonathan Littman
- Thinking Fast and Slow by Kahneman
- True Names...and Other Dangers by Vernor Vinge
- True Names: And the Opening of the Cyberspace Frontier by Vernor Vinge
- Unmasking the Social Engineer by Christopher Hadnagy
- Unrestricted Warfare: China's Master Plan to Destroy America by Qiao Liang
- Virtual Light by William Gibson
- War by Other Means: Economic Espionage in America by John J. Fialka
- We are Anonymous by Parmly Olsen
- When Sysadmins Ruled the Earth by Cory Doctrow
- Where Wizards Stay Up Late: The Origins Of The Internet by Katie Hafner
- Windows Internals, Part 1 by Mark Russinovich, Alex Ionescu, and David Solomon
- Window Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry (2nd Edition) by Harlan Carvey
- Winning as a CISO by Rich Baich
- Wired for War by P. W. Singer
- Worm by Mark Bowden
- Zero Day by Mark Russinovich
- Zodiac( The Eco-Thriller) by Neal Stephenson
Tuesday, September 10, 2019
Cybersecurity Reading List
I have been building this list for quite awhile, and it's up to 200 books and papers now. The source material is a Dragos suggested reading list, professional reading lists from the various armed services, the University of North Georgia, Defcon Reading List, and the Cybersecurity Canon.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment