Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Consumerization

10 books on cybersecurity that all IT leaders should read

By Hope Reese July 24, 2017, 8:14 AM PDT

Image
1
of 11

istock-510512093.jpg
istock-510512093.jpg
10 books on cybersecurity that all IT leaders should read

10 books on cybersecurity that all IT leaders should read

Image: iStockphoto

10 books on cybersecurity that all IT leaders should read

Want to start learning about cybersecurity? Check out TechRepublic’s top 10 titles to understand how hackers have stolen millions in private data, how governments wage cyberwar, and how to beef up security systems.

Image: iStockphoto
confront-and-conceal.jpg
confront-and-conceal.jpg
10 books on cybersecurity that all IT leaders should read

1. Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power by David E. Sanger

Image: Amazon

1. Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power by David E. Sanger

This 2012 title from the New York Times’s chief Washington correspondent David E. Sanger examines America’s role using a sophisticated arsenal of cyber weapons to attack Iran’s nuclear program, in what one advisor called “a state of low-grade, daily conflict.” Sanger’s book also looks at the origins of the malicious computer worm, Stuxnet, and Operation Olympic Games.

SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)

Image: Amazon
cuckoocover.jpg
cuckoocover.jpg
10 books on cybersecurity that all IT leaders should read

2. Cuckoo’s Egg by Clifford Stoll

Image: Amazon

2. Cuckoo’s Egg by Clifford Stoll

While those with a background in computer science may be most interested in Clifford Stoll’s memoir about tracking down a cyber spy, the story is so fascinating that it should to appeal to those outside the field as well. Stoll started his career as an astronomer, and became a systems manager at Lawrence Berkeley Lab, when he was faced with a mysterious invader–“Hunter”–who tried to steal important military and security information from the US computer system. What ensued was a one-person hunt that led him to catching an international spy ring.

SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)

Image: Amazon
the-art-of-computer-virus.jpg
the-art-of-computer-virus.jpg
10 books on cybersecurity that all IT leaders should read

3. The Art of Computer Virus Research and Defense by Peter Szor

Image: Amazon

3. The Art of Computer Virus Research and Defense by Peter Szor

This title from Peter Szor, security architect for Symantec Security Response and a lead researcher behind Norton AntiVirus, is a behind-the-scenes look at antivirus research. It’s also a practical and informative guide to contemporary virus threats. While not up-to-date (it was published in 2005) the title still tops the lists of many security analysts.

SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)

Image: Amazon
kingpin.jpg
kingpin.jpg
10 books on cybersecurity that all IT leaders should read

4. Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen

Image: Amazon

4. Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen

Here, ex-hacker and journalist Kevin Poulsen leads readers through a journey pursuing an infamous cybercriminal. This title gives a detailed picture of how an unlikely hacker kingpin was able to steal millions in credit card information and outsmart authorities. As a former hacker himself, Poulsen has insider knowledge on how it can be done.

SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)

Image: Amazon
countdown-to-zero-day-jacket.jpg
countdown-to-zero-day-jacket.jpg
10 books on cybersecurity that all IT leaders should read

5. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon by Kim Zetter

Image: Amazon

5. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon by Kim Zetter

In this 2014 title, cybersecurity journalist Kim Zetter, a senior writer at Wired magazine, delves into the story of Stuxnet–a malware virus that was set loose at an Iranian nuclear facility, sabotaging their nuclear plans. What made Stuxnet unique from other malware programs was its use of a zero-day exploit, which Zetter explores here.

SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)

Image: Amazon
we-are-anonymous.jpg
we-are-anonymous.jpg
10 books on cybersecurity that all IT leaders should read

6. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency by Parmy Olson

6. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency by Parmy Olson

Here, Parmy Olson, London Bureau Chief for Forbes, offers the first in-depth look at LulzSec and Anonymous. Olson was given incredible access to each group, and the book is based on hundreds of interviews with the hackers–including exclusive interviews with all six core members of LulzSec. The New York Times calls the title “a lively, startling book that reads as ‘The Social Network’ for group hackers.”

SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)

rise-of-the-machines.jpg
rise-of-the-machines.jpg
10 books on cybersecurity that all IT leaders should read

7. Rise of the Machines: The Lost History of Cybernetics by Thomas Rid

Image: Amazon

7. Rise of the Machines: The Lost History of Cybernetics by Thomas Rid

In this 2016 title, Thomas Rid, professor of security studies at King’s College London, tells the story of the birth of cybernetics, the study and creation of control systems in man, machine, and the two combined. It also delves into the first publicized international espionage hacking, and draws from interviews with hippies, anarchists, sleuths, and spies.

SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)

Image: Amazon
american-kingpin.jpg
american-kingpin.jpg
10 books on cybersecurity that all IT leaders should read

8. American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road by Nick Bilton

Image: Amazon

8. American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road by Nick Bilton

In Nick Bilton’s American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road, the incredible story of the (now shuttered) Silk Road comes to light. It tells the true story of Ross Ulbricht, a 26 year old self-made coder who built, out of a basement in Texas, the world’s largest online marketplace for illegal drugs and weapons.

SEE: How the founder of the Silk Road made millions on his illegal startup on the Dark Web

Image: Amazon
threat-modeling.jpg
threat-modeling.jpg
10 books on cybersecurity that all IT leaders should read

9. Threat Modeling: Designing for Security by Adam Shostack

Image: Amazon

9. Threat Modeling: Designing for Security by Adam Shostack

This book is by Adam Shostack, who manages security development lifecycle threat modeling at Microsoft and is one of the best threat modeling experts in the world. It delves into how to develop better security systems, software, and services, from the ground up, with practical advice.

SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)

Image: Amazon
mcmafia.jpg
mcmafia.jpg
10 books on cybersecurity that all IT leaders should read

10. McMafia: A Journey Through the Global Criminal Underworld by Misha Glenny

Image: Amazon

10. McMafia: A Journey Through the Global Criminal Underworld by Misha Glenny

Earning a starred review from Publisher’s Weekly, this 2009 title by Misha Glenny, veteran journalist for the BBC World, offers a “riveting and chilling journey through the myriad criminal syndicates flourishing in our increasingly globalized world, which make up as much as 20% of global GNP,” according to the publication.

SEE: Cybersecurity reads for every hacker’s bookshelf (ZDNet)

Image: Amazon
  • Consumerization
  • Security
  • Account Information

    Share with Your Friends

    10 books on cybersecurity that all IT leaders should read

    Your email has been sent

Share: 10 books on cybersecurity that all IT leaders should read
Image of Hope Reese
By Hope Reese
Hope Reese is a writer based in Louisville, Kentucky, currently living in Budapest. Her work has appeared in the Atlantic, the Boston Globe, Vox, Vice and other publications.
  • Account Information

    Contact Hope Reese

    Your message has been sent

  • |
  • See all of Hope's content

TechRepublic Premium

  • TechRepublic Premium

    Power Checklist: Building Your Disaster Recovery Plan

    Natural and man-made disasters can jeopardize the operations and future of any company today. Hurricanes, earthquakes and terrorist or cyberattacks are just a few examples of potentially crippling threats. As a result, the development of a disaster recovery plan is a must to ensure ongoing business processes in the wake of a crisis situation. This ...

    Provided By TechRepublic Premium Published:  Sep 2023 Modified:  Sep 2023 Read More
    Download Now
  • TechRepublic Premium

    Hiring Kit: Project Manager

    Keeping all the various moving parts of a business running smoothly and on time requires a well-organized individual who can see the final goal of a project, develop a path to reach that goal and communicate the path that must be followed to all the individuals and teams working to bring that final goal to ...

    Provided By TechRepublic Premium Published:  Sep 2023 Modified:  Sep 2023 Read More
    Download Now
  • TechRepublic Premium

    SSL Certificate Best Practices Policy

    SSL certificates are essential for encrypting traffic between systems such as clients, which access servers via web browsers or applications that communicate with remote systems. Certificates protect client and server data, commonly involving confidential information such as credit card details or social security numbers. The purpose of this SSL Certificate Best Practices Policy from TechRepublic ...

    Provided By TechRepublic Premium Published:  Sep 2023 Modified:  Sep 2023 Read More
    Download Now
  • TechRepublic Premium

    Mobile Device Computing Policy

    Mobile devices are a way of life in both the consumer and business realms — and business interests must be protected where the two converge. This policy from TechRepublic Premium provides guidelines for the safe and productive use of mobile devices (laptop computers, tablets, smartphones, etc.) by employees. It includes stipulations for company and employee-owned ...

    Provided By TechRepublic Premium Published:  Sep 2023 Modified:  Sep 2023 Read More
    Download Now

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information
  • Careers

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice