Recommended Books

The Code Book
The history and operation of history’s most famous ciphers

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers
The spillover of the NotPetya cyberattack and the pursuit of the culprits. Exploring how a focused cyberattack can have far reaching consequences.

Tubes: A Journey to the Center of the Internet
How the internet is physically constructed

Dark Territory: The Secret History of Cyber War
The history of our government’s efforts to effectively manage our national security in the face of the largely open global communications network established by the World Wide Web

The Art of Intrusion
A study of real world exploits and attackers that use them

The Art of Deception
The many forms of social engineering by renowned hacker Kevin Mitnik

The Art of Invisibility
Understanding your digital footprint and how digital data can be used/misused in the digital age.

Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon
How, why Stuxnet was created and its intended target along with a history of the US’s cyber arsenal buildup

Spam Nation
A look inside world of online spammers, who is doing it and who fall victim to spam email advertisements

The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage
One of the earliest cases of computer espionage, Stoll tracks an early hacker

Ghost in the Wires
The story of Kevin Mitnick’s escapade and the pursuit that plagued federal investigators until his ultimate capture.

Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
How the US leverages cyber as part of its defense strategy

Power to the People
How lack of security in the Internet of Things can (and is) leveraged by cyberterrorists