Recommended Books

The Code Book
The history and operation of history’s most famous ciphers
https://www.indiebound.org/book/9780385495325

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers
The spillover of the NotPetya cyberattack and the pursuit of the culprits. Exploring how a focused cyberattack can have far reaching consequences.

https://www.indiebound.org/book/9780385544405

Tubes: A Journey to the Center of the Internet
How the internet is physically constructed

https://www.indiebound.org/book/9780062850300

Dark Territory: The Secret History of Cyber War
The history of our government’s efforts to effectively manage our national security in the face of the largely open global communications network established by the World Wide Web
https://amzn.to/2FwCeqt

The Art of Intrusion
A study of real world exploits and attackers that use them
https://amzn.to/3023vLa

The Art of Deception
The many forms of social engineering by renowned hacker Kevin Mitnik
https://amzn.to/2T4Fn90

The Art of Invisibility
Understanding your digital footprint and how digital data can be used/misused in the digital age.
https://amzn.to/2Futu4j

Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon
How, why Stuxnet was created and its intended target along with a history of the US’s cyber arsenal buildup
https://amzn.to/2QRQn70

Spam Nation
A look inside world of online spammers, who is doing it and who fall victim to spam email advertisements
https://amzn.to/2T1MgIj

The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage
One of the earliest cases of computer espionage, Stoll tracks an early hacker
https://amzn.to/2T64tV1

Ghost in the Wires
The story of Kevin Mitnick’s escapade and the pursuit that plagued federal investigators until his ultimate capture.
https://amzn.to/39MzjYJ

Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
How the US leverages cyber as part of its defense strategy
https://amzn.to/39RaWsM

Power to the People
How lack of security in the Internet of Things can (and is) leveraged by cyberterrorists
https://amzn.to/2RyreyJ