Learning about Techonoly & Design

Tuesday, September 18, 2018

Security Related Readings


Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy,  Second Edition

Hackers: Heroes of the Computer Revolution by Steven Levy(Historical view of hacking culture)

Hacking: The Art of Exploitation
by Jon Erickson


Rtfm: Red Team Field Manual

Blue Team Field Manual (BTFM)

Click Here to Kill Everybody: Security and Survival in a Hyper-Connected World, by Bruce Schneier

Cybersecurity Engineering, by Ross Anderson

Cuckoo's Egg 

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, by Bruce Schneier

NYT's book review: Cuckoo's Egg

Breaking and Entering: An Extraordinary Story of a Hacker Named Alien

NYT book review: Breaking and Entering

Three Things Every CISO Should Know 

Shadow IT: Mitigating Security Risks

Cybersecurity vs. Cyber Security: When Why and How to Use the Term






Posted by Ying at 12:58 AM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: cybersecurity, infosec, security

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Blog Archive

  • ►  2021 (8)
    • ►  May (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (5)
  • ►  2020 (18)
    • ►  December (6)
    • ►  November (1)
    • ►  September (1)
    • ►  August (2)
    • ►  May (2)
    • ►  March (4)
    • ►  January (2)
  • ►  2019 (36)
    • ►  November (1)
    • ►  October (5)
    • ►  September (3)
    • ►  August (4)
    • ►  July (4)
    • ►  June (1)
    • ►  May (8)
    • ►  April (3)
    • ►  March (4)
    • ►  February (3)
  • ▼  2018 (68)
    • ►  December (4)
    • ►  November (10)
    • ►  October (2)
    • ▼  September (44)
      • What is Google?
      • Cybersecurity & Internet of Things (IoT)
      • Security policy samples, policies and tools
      • CompTia Security + Certification - Architecture & ...
      • Security 1:1
      • NIST Cybersecurity Framework
      • Cyber Threats and Cybersecurity
      • Threat Models
      • Social Engineering and Cybercrime
      • Hacking for Defense (Watch from 1:32:47 to 1:45:06)
      • Fun activities - create a security avatar
      • The biggest hacks, leaks and data breaches of 2016
      • Cybersecurity professionals: Core Attributes and S...
      • Take Fortinet Network Security Technology Foundati...
      • Take a Phishing IQ Test
      • From Music and Biology Major to Security Hacker
      • Verizon 2018 Data Breach Investigations Report (DBIR)
      • Learning about 3D Printing
      • Glossary - 3D Printing
      • The Cukoo's Egg - Decompiled Course
      • Cybersecurity Job Interviews
      • CIS Controls
      • NICE Cybersecurity Workforce Framework
      • Microsoft Virtual Academy
      • Free Cybersecurity Related Resources
      • Cybercrime
      • Cybersecurity Crash Course
      • Security Related Readings
      • How to setup two factor authentication
      • Cool Projects
      • Text Editor
      • Git Commands
      • Start on GitHub
      • Learn to use fonts
      • 3D Printing
      • Search Engin Optimization
      • Web development
      • Learning CSS and CSS Grid
      • Hackathon
      • State of Security
      • Learning about security
      • CS for Kids 9-14
      • A developer’s guide to web design for non-designers
      • Password Manager
    • ►  August (2)
    • ►  July (1)
    • ►  May (2)
    • ►  March (3)
  • ►  2017 (24)
    • ►  December (3)
    • ►  October (1)
    • ►  September (4)
    • ►  August (1)
    • ►  July (1)
    • ►  April (1)
    • ►  February (5)
    • ►  January (8)

Translate

Simple theme. Powered by Blogger.