Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Consumerization

10 books on cybersecurity that all IT leaders should read

By Hope Reese July 24, 2017, 8:14 AM PDT

Image
1
of 11

istock-510512093.jpg
istock-510512093.jpg
10 books on cybersecurity that all IT leaders should read

10 books on cybersecurity that all IT leaders should read

Image: iStockphoto

10 books on cybersecurity that all IT leaders should read

Want to start learning about cybersecurity? Check out TechRepublic’s top 10 titles to understand how hackers have stolen millions in private data, how governments wage cyberwar, and how to beef up security systems.

Image: iStockphoto
confront-and-conceal.jpg
confront-and-conceal.jpg
10 books on cybersecurity that all IT leaders should read

1. Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power by David E. Sanger

Image: Amazon

1. Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power by David E. Sanger

This 2012 title from the New York Times’s chief Washington correspondent David E. Sanger examines America’s role using a sophisticated arsenal of cyber weapons to attack Iran’s nuclear program, in what one advisor called “a state of low-grade, daily conflict.” Sanger’s book also looks at the origins of the malicious computer worm, Stuxnet, and Operation Olympic Games.

SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)

Image: Amazon
cuckoocover.jpg
cuckoocover.jpg
10 books on cybersecurity that all IT leaders should read

2. Cuckoo’s Egg by Clifford Stoll

Image: Amazon

2. Cuckoo’s Egg by Clifford Stoll

While those with a background in computer science may be most interested in Clifford Stoll’s memoir about tracking down a cyber spy, the story is so fascinating that it should to appeal to those outside the field as well. Stoll started his career as an astronomer, and became a systems manager at Lawrence Berkeley Lab, when he was faced with a mysterious invader–“Hunter”–who tried to steal important military and security information from the US computer system. What ensued was a one-person hunt that led him to catching an international spy ring.

SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)

Image: Amazon
the-art-of-computer-virus.jpg
the-art-of-computer-virus.jpg
10 books on cybersecurity that all IT leaders should read

3. The Art of Computer Virus Research and Defense by Peter Szor

Image: Amazon

3. The Art of Computer Virus Research and Defense by Peter Szor

This title from Peter Szor, security architect for Symantec Security Response and a lead researcher behind Norton AntiVirus, is a behind-the-scenes look at antivirus research. It’s also a practical and informative guide to contemporary virus threats. While not up-to-date (it was published in 2005) the title still tops the lists of many security analysts.

SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)

Image: Amazon
kingpin.jpg
kingpin.jpg
10 books on cybersecurity that all IT leaders should read

4. Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen

Image: Amazon

4. Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen

Here, ex-hacker and journalist Kevin Poulsen leads readers through a journey pursuing an infamous cybercriminal. This title gives a detailed picture of how an unlikely hacker kingpin was able to steal millions in credit card information and outsmart authorities. As a former hacker himself, Poulsen has insider knowledge on how it can be done.

SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)

Image: Amazon
countdown-to-zero-day-jacket.jpg
countdown-to-zero-day-jacket.jpg
10 books on cybersecurity that all IT leaders should read

5. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon by Kim Zetter

Image: Amazon

5. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon by Kim Zetter

In this 2014 title, cybersecurity journalist Kim Zetter, a senior writer at Wired magazine, delves into the story of Stuxnet–a malware virus that was set loose at an Iranian nuclear facility, sabotaging their nuclear plans. What made Stuxnet unique from other malware programs was its use of a zero-day exploit, which Zetter explores here.

SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)

Image: Amazon
we-are-anonymous.jpg
we-are-anonymous.jpg
10 books on cybersecurity that all IT leaders should read

6. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency by Parmy Olson

6. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency by Parmy Olson

Here, Parmy Olson, London Bureau Chief for Forbes, offers the first in-depth look at LulzSec and Anonymous. Olson was given incredible access to each group, and the book is based on hundreds of interviews with the hackers–including exclusive interviews with all six core members of LulzSec. The New York Times calls the title “a lively, startling book that reads as ‘The Social Network’ for group hackers.”

SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)

rise-of-the-machines.jpg
rise-of-the-machines.jpg
10 books on cybersecurity that all IT leaders should read

7. Rise of the Machines: The Lost History of Cybernetics by Thomas Rid

Image: Amazon

7. Rise of the Machines: The Lost History of Cybernetics by Thomas Rid

In this 2016 title, Thomas Rid, professor of security studies at King’s College London, tells the story of the birth of cybernetics, the study and creation of control systems in man, machine, and the two combined. It also delves into the first publicized international espionage hacking, and draws from interviews with hippies, anarchists, sleuths, and spies.

SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)

Image: Amazon
american-kingpin.jpg
american-kingpin.jpg
10 books on cybersecurity that all IT leaders should read

8. American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road by Nick Bilton

Image: Amazon

8. American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road by Nick Bilton

In Nick Bilton’s American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road, the incredible story of the (now shuttered) Silk Road comes to light. It tells the true story of Ross Ulbricht, a 26 year old self-made coder who built, out of a basement in Texas, the world’s largest online marketplace for illegal drugs and weapons.

SEE: How the founder of the Silk Road made millions on his illegal startup on the Dark Web

Image: Amazon
threat-modeling.jpg
threat-modeling.jpg
10 books on cybersecurity that all IT leaders should read

9. Threat Modeling: Designing for Security by Adam Shostack

Image: Amazon

9. Threat Modeling: Designing for Security by Adam Shostack

This book is by Adam Shostack, who manages security development lifecycle threat modeling at Microsoft and is one of the best threat modeling experts in the world. It delves into how to develop better security systems, software, and services, from the ground up, with practical advice.

SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)

Image: Amazon
mcmafia.jpg
mcmafia.jpg
10 books on cybersecurity that all IT leaders should read

10. McMafia: A Journey Through the Global Criminal Underworld by Misha Glenny

Image: Amazon

10. McMafia: A Journey Through the Global Criminal Underworld by Misha Glenny

Earning a starred review from Publisher’s Weekly, this 2009 title by Misha Glenny, veteran journalist for the BBC World, offers a “riveting and chilling journey through the myriad criminal syndicates flourishing in our increasingly globalized world, which make up as much as 20% of global GNP,” according to the publication.

SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)

Image: Amazon
  • Consumerization
  • Security
  • Account Information

    Share with Your Friends

    10 books on cybersecurity that all IT leaders should read

    Your email has been sent

Share: 10 books on cybersecurity that all IT leaders should read
Image of Hope Reese
By Hope Reese
Hope Reese is a writer based in Louisville, Kentucky, currently living in Budapest. Her work has appeared in the Atlantic, the Boston Globe, Vox, Vice and other publications.
  • Account Information

    Contact Hope Reese

    Your message has been sent

  • |
  • See all of Hope's content

TechRepublic Premium

  • TechRepublic Premium

    Hiring kit: Automation specialist

    PURPOSE Recruiting an automation specialist with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit from TechRepublic Premium provides a flexible framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY TRAITS ...

    Published:  March 27, 2023, 12:00 PM EDT Modified:  March 28, 2023, 12:48 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Cybersecurity engineer

    PURPOSE Recruiting a cybersecurity engineer with the right combination of technical and industry experience will require a comprehensive screening process. This hiring kit from TechRepublic Premium provides a flexible framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY TRAITS ...

    Published:  March 27, 2023, 12:00 PM EDT Modified:  March 28, 2023, 12:18 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Business information analyst

    PURPOSE A large segment of internal and external modern business now takes place on computers, tablets and other mobile devices. The information technology infrastructure that has sprung up around that business can be daunting in its scope. This Hiring Kit from TechRepublic Premium provides an adjustable framework your business can use to find, recruit and ...

    Published:  March 26, 2023, 12:00 PM EDT Modified:  March 28, 2023, 12:51 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Grant writing guide

    PURPOSE This grant writing guide from TechRepublic Premium will help you identify a grant that fits your idea, build a team to help you compile a proposal, and set a timeline to meet the application deadline. From the guide: BEFORE YOU START This list of steps will help the grant writing process go more smoothly. ...

    Published:  March 26, 2023, 12:00 PM EDT Modified:  March 27, 2023, 6:00 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice