Books
The Coming Wave: Technology, Power, and the Twenty-first Century's Greatest Dilemma
As a co-founder of DeepMind, Suleyman explores the profound impact of artificial intelligence, quantum computing, and other groundbreaking innovations on society. He argues that these technologies will lead to significant prosperity but also pose severe risks, including the destabilization of nation-states and potential for invasive surveillance. The book presents the "containment problem" as the critical challenge of our era, questioning whether we can control these powerful technologies without spiraling into catastrophe or dystopia.
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency
Tracers in the Dark is a story of crime and pursuit unlike any other. With unprecedented access to the major players in federal law enforcement and private industry, veteran cybersecurity reporter Andy Greenberg tells an astonishing saga of criminal empires built and destroyed. He introduces an IRS agent with a defiant streak, a Bitcoin-tracing Danish entrepreneur, and a colorful ensemble of hardboiled agents and prosecutors as they delve deep into the crypto-underworld. The result is a thrilling, globe-spanning story of dirty cops, drug bazaars, trafficking rings, and the biggest takedown of an online narcotics market in the history of the Internet.
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
Battlefield Cyber: How China and Russia Are Undermining Our Democracy and National Security
Michael G. McLaughlin, William Holstein
The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain and corporate email servers, malicious cyber activities have reached an all-time high. Russia attracts the most attention, but China is vastly more sophisticated. They have a common interest in exploiting the openness of the Internet and social media—and our democracy—to erode confidence in our institutions and to exacerbate our societal rifts to prevent us from mounting an effective response. Halting this digital aggression will require Americans to undertake sweeping changes in how we educate, organize and protect ourselves and to ask difficult questions about how vulnerable our largest technology giants are.
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Cliff Stoll
In this white-knuckled true story that is “as exciting as any action novel” (The New York Times Book Review), an astronomer-turned-cyber-detective begins a personal quest to expose a hidden network of spies that threatens national security and leads all the way to the KGB.
Cybersecurity Career Master Plan: Proven Techniques and Effective Tips to Help You Advance in Your Cybersecurity Career
The book starts by helping you gain a foundational understanding of cybersecurity, covering cyber law, cyber policy, and frameworks. Next, you'll focus on how to choose the career field best suited to you from options such as security operations, penetration testing, and risk analysis. The book also guides you through the different certification options as well as the pros and cons of a formal college education versus formal certificate courses. Later, you'll discover the importance of defining and understanding your brand. Finally, you'll get up to speed with different career paths and learning opportunities.
Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks
Scott Shapiro
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian “Dark Avenger,” who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton’s cell phone, the Russian intelligence officers who sought to take control of a US election, and others.
Understand, Manage, and Measure Cyber Risk®: Practical Solutions for Creating a Sustainable Cyber Program
Written by Cyber Starters podcast cohost, Ryan Leirvik, this practitioner’s guide lays down basic foundational components, with real client examples and pitfalls to avoid when managing cybersecurity in an organization. A plethora of cybersecurity management resources are available, but few pulls together management and technology, with a focus on executive oversight. Leirvik provides a clear, easy-to-understand, and easy-to-deploy "playbook" for a cyber risk management approach applicable to your entire organization.
The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
Richard A. Clarke and Robert K. Knake
In "The Fifth Domain," cybersecurity experts Richard A. Clarke and Robert K. Knake guide us through a treacherous cyber landscape, drawing from their extensive experience in U.S. national security and corporate boardrooms. They explore the frontlines of cyber defense, from quantum computing labs to intelligence agencies, advocating for "cyber resilience" as a strategy to thwart attackers and protect democratic institutions. Clarke and Knake's expert insights argue for the potential of cyberspace to remain a thriving space of progress, countering the narrative of inevitable cyberwar with actionable, optimistic solutions.
Cybersecurity for Space: Protecting the Final Frontier
Jacob G. Oakley
This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats.
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Recommended by the famous Jack Rhysider on the episode, Exploring the Dark Side of the Internet with Jack Rhysider, Ghost in the Wires chronicles the hacks of Kevin Mitnick, the most elusive phreaker and computer hacker in history. He accessed computers and networks at the world's biggest companies, consistently remaining one step ahead of the authorities. As the FBI closed in, Mitnick went on the run, engaging in an increasingly sophisticated game of hide-and-seek, false identities, hosts of cities, and plenty of close shaves, to an ultimate showdown with the Feds.
Cult of the Dead Cow
Joseph Menn
The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom, and even democracy itself.
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development of Tor, the most important privacy tool on the net, and helped build cyberweapons that advanced US security without injuring anyone.
Operator Handbook: Red Team + OSINT + Blue Team Reference
Joshua Picolet
The Operator Handbook takes three disciplines (Red Team, OSINT, Blue Team) and combines them into one complete reference guide. The book contains 100+ individual cheat sheet references for many of the most frequently used tools and techniques by practitioners. Includes content to assist the most seasoned cybersecurity veteran or someone just getting started in the career field. The goal of combining all disciplines into one book was to remove the artificial barriers that only certain knowledge exists within a "Team".