top of page

Books

Image-empty-state_edited_edited_edited_e

Understand, Manage, and Measure Cyber Risk®: Practical Solutions for Creating a Sustainable Cyber Program

Written by Cyber Starters podcast cohost, Ryan Leirvik, this practitioner’s guide lays down basic foundational components, with real client examples and pitfalls to avoid when managing cybersecurity in an organization. A plethora of cybersecurity management resources are available, but few pulls together management and technology, with a focus on executive oversight. Leirvik provides a clear, easy-to-understand, and easy-to-deploy "playbook" for a cyber risk management approach applicable to your entire organization.

Image-empty-state_edited_edited_edited_e

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Recommended by the famous Jack Rhysider on the episode, Exploring the Dark Side of the Internet with Jack Rhysider, Ghost in the Wires chronicles the hacks of Kevin Mitnick, the most elusive phreaker and computer hacker in history. He accessed computers and networks at the world's biggest companies, consistently remaining one step ahead of the authorities. As the FBI closed in, Mitnick went on the run, engaging in an increasingly sophisticated game of hide-and-seek, false identities, hosts of cities, and plenty of close shaves, to an ultimate showdown with the Feds.

Image-empty-state_edited_edited_edited_e

The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats

Richard A. Clarke and Robert K. Knake

In "The Fifth Domain," cybersecurity experts Richard A. Clarke and Robert K. Knake guide us through a treacherous cyber landscape, drawing from their extensive experience in U.S. national security and corporate boardrooms. They explore the frontlines of cyber defense, from quantum computing labs to intelligence agencies, advocating for "cyber resilience" as a strategy to thwart attackers and protect democratic institutions. Clarke and Knake's expert insights argue for the potential of cyberspace to remain a thriving space of progress, countering the narrative of inevitable cyberwar with actionable, optimistic solutions.

Image-empty-state_edited_edited_edited_e

Cult of the Dead Cow

Joseph Menn

The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom, and even democracy itself.
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development of Tor, the most important privacy tool on the net, and helped build cyberweapons that advanced US security without injuring anyone.

Image-empty-state_edited_edited_edited_e

Operator Handbook: Red Team + OSINT + Blue Team Reference

Joshua Picolet

The Operator Handbook takes three disciplines (Red Team, OSINT, Blue Team) and combines them into one complete reference guide. The book contains 100+ individual cheat sheet references for many of the most frequently used tools and techniques by practitioners. Includes content to assist the most seasoned cybersecurity veteran or someone just getting started in the career field. The goal of combining all disciplines into one book was to remove the artificial barriers that only certain knowledge exists within a "Team".

Image-empty-state_edited_edited_edited_e

Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency

Tracers in the Dark is a story of crime and pursuit unlike any other. With unprecedented access to the major players in federal law enforcement and private industry, veteran cybersecurity reporter Andy Greenberg tells an astonishing saga of criminal empires built and destroyed. He introduces an IRS agent with a defiant streak, a Bitcoin-tracing Danish entrepreneur, and a colorful ensemble of hardboiled agents and prosecutors as they delve deep into the crypto-underworld. The result is a thrilling, globe-spanning story of dirty cops, drug bazaars, trafficking rings, and the biggest takedown of an online narcotics market in the history of the Internet.

Image-empty-state_edited_edited_edited_e

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

Cliff Stoll

In this white-knuckled true story that is “as exciting as any action novel” (The New York Times Book Review), an astronomer-turned-cyber-detective begins a personal quest to expose a hidden network of spies that threatens national security and leads all the way to the KGB.

Image-empty-state_edited_edited_edited_e

Cybersecurity Career Master Plan: Proven Techniques and Effective Tips to Help You Advance in Your Cybersecurity Career

The book starts by helping you gain a foundational understanding of cybersecurity, covering cyber law, cyber policy, and frameworks. Next, you'll focus on how to choose the career field best suited to you from options such as security operations, penetration testing, and risk analysis. The book also guides you through the different certification options as well as the pros and cons of a formal college education versus formal certificate courses. Later, you'll discover the importance of defining and understanding your brand. Finally, you'll get up to speed with different career paths and learning opportunities.

Image-empty-state_edited_edited_edited_e

Cybersecurity for Space: Protecting the Final Frontier

Jacob G. Oakley

This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats.

Image-empty-state_edited_edited_edited_e

Battlefield Cyber: How China and Russia Are Undermining Our Democracy and National Security

Michael G. McLaughlin, William Holstein

The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain and corporate email servers, malicious cyber activities have reached an all-time high. Russia attracts the most attention, but China is vastly more sophisticated. They have a common interest in exploiting the openness of the Internet and social media—and our democracy—to erode confidence in our institutions and to exacerbate our societal rifts to prevent us from mounting an effective response. Halting this digital aggression will require Americans to undertake sweeping changes in how we educate, organize and protect ourselves and to ask difficult questions about how vulnerable our largest technology giants are.

Image-empty-state_edited_edited_edited_e

The Phantom CISO

Mishaal Khan, Hisham Zahid


This book offers a practical and comprehensive approach to becoming successful cybersecurity leaders, whether starting in the industry or aspiring to become a great Chief Information Security Officer (CISO).

Image-empty-state_edited_edited_edited_e

Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks

Scott Shapiro

It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian “Dark Avenger,” who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton’s cell phone, the Russian intelligence officers who sought to take control of a US election, and others.

bottom of page
Mastodon