Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Second Edition
Hackers: Heroes of the Computer Revolution by Steven Levy(Historical view of hacking culture)
Hacking: The Art of Exploitation by Jon Erickson
Rtfm: Red Team Field Manual
Blue Team Field Manual (BTFM)
Click Here to Kill Everybody: Security and Survival in a Hyper-Connected World, by Bruce Schneier
Cybersecurity Engineering, by Ross Anderson
Cuckoo's Egg
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, by Bruce Schneier
NYT's book review: Cuckoo's Egg
Breaking and Entering: An Extraordinary Story of a Hacker Named Alien
NYT book review: Breaking and Entering
Three Things Every CISO Should Know
Shadow IT: Mitigating Security Risks
Cybersecurity vs. Cyber Security: When Why and How to Use the Term
No comments:
Post a Comment