10 books on cybersecurity that all IT leaders should read
Image 1 of 11


10 books on cybersecurity that all IT leaders should read
10 books on cybersecurity that all IT leaders should read
Want to start learning about cybersecurity? Check out TechRepublic’s top 10 titles to understand how hackers have stolen millions in private data, how governments wage cyberwar, and how to beef up security systems.


1. Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power by David E. Sanger
1. Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power by David E. Sanger
This 2012 title from the New York Times’s chief Washington correspondent David E. Sanger examines America’s role using a sophisticated arsenal of cyber weapons to attack Iran’s nuclear program, in what one advisor called “a state of low-grade, daily conflict.” Sanger’s book also looks at the origins of the malicious computer worm, Stuxnet, and Operation Olympic Games.
SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)


2. Cuckoo’s Egg by Clifford Stoll
2. Cuckoo’s Egg by Clifford Stoll
While those with a background in computer science may be most interested in Clifford Stoll’s memoir about tracking down a cyber spy, the story is so fascinating that it should to appeal to those outside the field as well. Stoll started his career as an astronomer, and became a systems manager at Lawrence Berkeley Lab, when he was faced with a mysterious invader–“Hunter”–who tried to steal important military and security information from the US computer system. What ensued was a one-person hunt that led him to catching an international spy ring.
SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)


3. The Art of Computer Virus Research and Defense by Peter Szor
3. The Art of Computer Virus Research and Defense by Peter Szor
This title from Peter Szor, security architect for Symantec Security Response and a lead researcher behind Norton AntiVirus, is a behind-the-scenes look at antivirus research. It’s also a practical and informative guide to contemporary virus threats. While not up-to-date (it was published in 2005) the title still tops the lists of many security analysts.
SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)


4. Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen
4. Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen
Here, ex-hacker and journalist Kevin Poulsen leads readers through a journey pursuing an infamous cybercriminal. This title gives a detailed picture of how an unlikely hacker kingpin was able to steal millions in credit card information and outsmart authorities. As a former hacker himself, Poulsen has insider knowledge on how it can be done.
SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)


5. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon by Kim Zetter
5. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon by Kim Zetter
In this 2014 title, cybersecurity journalist Kim Zetter, a senior writer at Wired magazine, delves into the story of Stuxnet–a malware virus that was set loose at an Iranian nuclear facility, sabotaging their nuclear plans. What made Stuxnet unique from other malware programs was its use of a zero-day exploit, which Zetter explores here.
SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)


6. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency by Parmy Olson
6. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency by Parmy Olson
Here, Parmy Olson, London Bureau Chief for Forbes, offers the first in-depth look at LulzSec and Anonymous. Olson was given incredible access to each group, and the book is based on hundreds of interviews with the hackers–including exclusive interviews with all six core members of LulzSec. The New York Times calls the title “a lively, startling book that reads as ‘The Social Network’ for group hackers.”
SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)


7. Rise of the Machines: The Lost History of Cybernetics by Thomas Rid
7. Rise of the Machines: The Lost History of Cybernetics by Thomas Rid
In this 2016 title, Thomas Rid, professor of security studies at King’s College London, tells the story of the birth of cybernetics, the study and creation of control systems in man, machine, and the two combined. It also delves into the first publicized international espionage hacking, and draws from interviews with hippies, anarchists, sleuths, and spies.
SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)


8. American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road by Nick Bilton
8. American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road by Nick Bilton
In Nick Bilton’s American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road, the incredible story of the (now shuttered) Silk Road comes to light. It tells the true story of Ross Ulbricht, a 26 year old self-made coder who built, out of a basement in Texas, the world’s largest online marketplace for illegal drugs and weapons.
SEE: How the founder of the Silk Road made millions on his illegal startup on the Dark Web


9. Threat Modeling: Designing for Security by Adam Shostack
9. Threat Modeling: Designing for Security by Adam Shostack
This book is by Adam Shostack, who manages security development lifecycle threat modeling at Microsoft and is one of the best threat modeling experts in the world. It delves into how to develop better security systems, software, and services, from the ground up, with practical advice.
SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)


10. McMafia: A Journey Through the Global Criminal Underworld by Misha Glenny
10. McMafia: A Journey Through the Global Criminal Underworld by Misha Glenny
Earning a starred review from Publisher’s Weekly, this 2009 title by Misha Glenny, veteran journalist for the BBC World, offers a “riveting and chilling journey through the myriad criminal syndicates flourishing in our increasingly globalized world, which make up as much as 20% of global GNP,” according to the publication.
SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)
-
Account Information
Contact Hope Reese
- |
- See all of Hope's content