The best books about cybersecurity for every type of reader

Why am I passionate about this?

I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.


I wrote...

Enterprise Security for the Executive: Setting the Tone from the Top

By Jennifer L. Bayuk,

Book cover of Enterprise Security for the Executive: Setting the Tone from the Top

What is my book about?

This is a cybersecurity book in the “Business” category. It was written for business executives with direct responsibility and/or interest in information security or cybersecurity. It describes cyber security management practices and recommends an approach for those motivated to create and/or support an information/cyber security function. In a nutshell, it can give executives confidence they are setting the right tone at the top to support their company’s cybersecurity initiatives. For a deeper dive into cybersecurity policy decisions, advance to my Cyber Security Policy Guidebook (2012) or Financial Cybersecurity Risk Management (2018).

Shepherd is reader supported. When you buy books, we may earn an affiliate commission.

The books I picked & why

Book cover of This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

Jennifer L. Bayuk Why did I love this book?

A reporter’s account of nation-states' relentless pursuit of superior offensive capability. Although former NSA officials may not agree with every word, it is generally acknowledged to be a true trail of facts available to reporters. Most cybersecurity staff are routinely muzzled by legal confidentiality agreements in the same manner as staff who have access to business trade secrets. There are few reporters who have had as much access as Perlroth to those individuals. 

By Nicole Perlroth,

Why should I read it?

1 author picked This Is How They Tell Me the World Ends as one of their favorite books, and they share why you should read it.

What is this book about?

THE NEW YORK TIMES BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations)

"Written in the hot, propulsive prose of a spy thriller" (The New York Times), the untold story of the cyberweapons market-the most secretive, government-backed market on earth-and a terrifying first look at a new kind of global warfare.

Zero-day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero-day has the power…


Book cover of The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

Jennifer L. Bayuk Why did I love this book?

A system administrator’s suspenseful account of the hunt for a hacker who broke into the Lawrence Berkeley National Laboratory (LBNL). The author trumpeted the experience and became a hero in cybersecurity circles. This was the first real proof available to laymen that cybersecurity adversaries were a force with which to be reckoned. Unfortunately, for most global corporations, it fell on deaf ears.

By Clifford Stoll,

Why should I read it?

4 authors picked The Cuckoo's Egg as one of their favorite books, and they share why you should read it.

What is this book about?

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name…


Book cover of Ghost Fleet: A Novel of the Next World War

Jennifer L. Bayuk Why did I love this book?

The book portrays a scenario in which nation-state adversaries launch a sophisticated cyberattack against the United States. Though it is science fiction, the political scenario it depicts is a realistic description of how today’s nation-states consider technology options when they are engaged in traditional war. For people interested in cybersecurity and attracted to that genre, it will be an eye-opening experience because the basic scenarios it describes are very easy to project into the near future. It is also a tale of adventure.

By P.W. Singer, August Cole,

Why should I read it?

1 author picked Ghost Fleet as one of their favorite books, and they share why you should read it.

What is this book about?

Ghost Fleet is a page-turning imagining of a war set in the not-too-distant future. Navy captains battle through a modern-day Pearl Harbour; fighter pilots duel with stealthy drones; teenage hackers fight in digital playgrounds; Silicon Valley billionaires mobilise for cyber-war; and a serial killer carries out her own vendetta. Ultimately, victory will depend on who can best blend the lessons of the past with the weapons of the future. But what makes the story even more notable is that every trend and technology in book - no matter how sci-fi it may seem - is real. The debut novel by…


Book cover of Cyber Attacks: Protecting National Infrastructure

Jennifer L. Bayuk Why did I love this book?

Amoroso’s experience started with academic research at Bell Labs and Stevens Institute of Technology but moved quickly to practically fill voids at AT&T and NSA. His book reduces technical concepts in cybersecurity to basic principles and explains generically how they are effectively implemented. For the true techy who wants to fully understand all the formal logic behind the theories in Cyber Attacks, reach back to Ed Amoroso’s Fundamentals of Computer Security Technology (1994). 

By Edward Amoroso,

Why should I read it?

1 author picked Cyber Attacks as one of their favorite books, and they share why you should read it.

What is this book about?

Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well.

This book covers cyber security policy development for…


Book cover of Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet

Jennifer L. Bayuk Why did I love this book?

It is a reporter’s account of a cybersecurity entrepreneur stumbling into criminal and nation-state level cyberattacks, assisting in the investigation, and ultimately becoming a target. The writing is clear and accessible to the non-technical reader but it still conveys a good sense of what it is like to witness and investigate cyber-crime. It is a suspenseful human drama.

By Joseph Menn,

Why should I read it?

1 author picked Fatal System Error as one of their favorite books, and they share why you should read it.

What is this book about?

In 2004, a California computer whiz named Barrett Lyon uncovered the identity of a hacker running major assaults on business websites. Without fully grasping the repercussions, he set on an investigation that led him into the heart of the Russian mob. Cybercrime was evolving. No longer the domain of small-time thieves, it had been discovered by sophisticated gangs. They began by attacking corporate websites but increasingly stole financial data from consumers and defence secrets from governments. While Barrett investigated the cutting edge of technology crime, the U.S. government struggled to catch up. Britain, however, was a different story. In the…


You might also like...

Love, Sex, and Other Calamities: 15 Stories and a Poem by Ralph Hickok

By Ralph Hickok,

Book cover of Love, Sex, and Other Calamities: 15 Stories and a Poem by Ralph Hickok

Ralph Hickok Author Of Vagabond Halfback: The Saga of Johnny Blood McNally

New book alert!

Why am I passionate about this?

I grew up in Green Bay and my dad was the official scorer for the Packers, so I was immersed in pro football history even as a child. During my careers as a newspaper feature writer and editor and as an advertising copywriter, I also became a sports historian. My magnum opus was “The Encyclopedia of North American Sports History,” 650,000 words. But my favorite by far is my biography of Johnny Blood. I was 12 or 13 when I decided I wanted to write it, 33 when I began working on it, 38 when I finished it, and 78 when it was finally published.

Ralph's book list on the history of pro football

What is my book about?

From Kirkus Reviews: "This debut short-story collection paints the wistful life of a newspaper journalist as seen through his sexual and romantic encounters...

Throughout, Hickok writes in an assured style, pulling readers along. The narrow sexual focus results in a distorted picture, yet other aspects of Art's life emerge at the edges—his intelligence, his career as a journalist, and even the sincerity with which he gives in to his male urges and construes sex as love... 

Subdued yet alluring; a pensive reflection on the male psyche."

Love, Sex, and Other Calamities: 15 Stories and a Poem by Ralph Hickok

By Ralph Hickok,

What is this book about?

A man arrives in a new city, hoping to start a new life, but he’s still haunted by memories of past loves…
A 12-year-old boy and an 11-year-old girl have a brief romantic encounter when their families are vacationing in neighboring lakeside cottages…
Two teenagers enjoy sexual experimentation when she babysits for her little brother while her parents are out drinking…
A high school boy has a crush on an older woman who identifies with Molly Bloom…
A college freshman falls in love with a high school freshman and is amazed at the depths of her passion…
A guy wins…


5 book lists we think you will like!

Interested in computer security, espionage, and spies?

11,000+ authors have recommended their favorite books and what they love about them. Browse their picks for the best books about computer security, espionage, and spies.

Computer Security Explore 27 books about computer security
Espionage Explore 562 books about espionage
Spies Explore 589 books about spies