I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.
I wrote...
Project Zero Trust: A Story about a Strategy for Aligning Security and the Business
This book is the most successful strategy for protecting yourself or your company from a cybersecurity incident. Everyone needs to understand zero trust, not just the security nerds, so this book uses a case study of a fictional company that experiences a breach and must implement zero trust to protect itself.
Everyone in IT must play a role in your zero trust journey, and this book provides a repeatable methodology for securing your data, no matter what type of technology you use. This book shows how everyone, from network engineers to system administrators, cloud architects, identity analysts, technical trainers, or help desk staff, can contribute to protecting an organization.
The first person to ever catch a hacker wasn’t an FBI or CIA agent. It was an astronomer, and his name was Clifford Stoll. This book is a biographical account of how he took on a German hacker who was selling secrets to the KGB in the 1980s. I love this book because it shows how anyone can play a role in cybersecurity.
As a kid, I watched the TV adaptation of the book for PBS’s NOVA program and went into cybersecurity in large part because of Stoll. Because cybersecurity wasn’t a profession at the time, Stoll created his own innovative techniques, like building the first computer honeypot to help catch the hacker in action. When his book was made into a PBS documentary, as a thank you for putting up with him and all the crazy things he had to do to track the hacker, he had all of his friends and coworkers play themselves in the documentary.
Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name…
This isn’t just the story of the first cyberweapon ever launched by one country against another; it’s actually two detective stories woven together.
I loved how Zetter blends the stories of the cybersecurity companies trying to figure out how it was discovered and what the cyberweapon did, together with the efforts of the International Atomic Energy Agency to track down the weird anomalies popping up in Iran’s nuclear program.
This book is a lot like The Godfather in terms of storytelling. You don’t need to know what a “Zero Day” is to get something out of it.
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.
“Immensely enjoyable . . . Zetter turns a complicated and technical cyber story into an engrossing whodunit.”—The Washington Post
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm…
This book was one of the biggest inspirations for me when I wrote my book.
Running a team of technology experts is really hard, so instead of writing a reference manual or an inspirational leadership memoir, Kim tells the story of a group of people who work together to learn the same best practices that have been in use for decades in the manufacturing and project management industries.
This hits close to home since I can recognize myself and many of my colleagues in each of the vivid characters.
***Over a half-million sold! And available now, the Wall Street Journal Bestselling sequel The Unicorn Project***
"Every person involved in a failed IT project should be forced to read this book."-TIM O'REILLY, Founder & CEO of O'Reilly Media
"The Phoenix Project is a must read for business and IT executives who are struggling with the growing complexity of IT."-JIM WHITEHURST, President and CEO, Red Hat, Inc.
Five years after this sleeper hit took on the world of IT and flipped it on it's head, the 5th Anniversary Edition of The Phoenix Project continues to guide IT in the DevOps revolution.…
Ever wondered what Russian hackers have been up to over the last few years? I found this a really sobering read, but at the same time, I loved hearing the stories of the people who work so hard to keep us safe.
Hackers are usually pretty big nerds, so it’s not really surprising that the title of this book comes from how cybercriminals embedded references to Frank Herbert’s book Dune into the code they used to carry out cyberattacks against Ukraine and other countries.
"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy
The true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times).
I loved this one because there are so many really influential people in the world today who started out as hackers. Former Texas Legislator and presidential candidate Beto O’Rourke was a member of one of the first hacker groups, The Cult of the Dead Cow.
What really makes this one stand out for me was how Menn was able to illustrate how our culture of cybersecurity today, things like responsible disclosure of security vulnerabilities, was shaped by the hacker ethos as a response to mega corporations actively trying to ignore the problem or even suing researchers to prevent them from talking rather than to fix the issues.
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development of Tor, the most important privacy tool on the net, and helped build cyberweapons that advanced US security without injuring anyone. With its origins in the earliest…
Few of us take the time to analyze our financial needs and goals to answer that pressing question. In Wealth Odyssey, author Larry R. Frank Sr. uses his extensive financial background to provide a universal road map that will help you determine the wealth you need to support your chosen lifestyle.
Frank discusses such topics as the wealth rule, the earning-spending-saving formula, using debt wisely, and risk management.
Wealth Odyssey is authored to be timeless; it does not matter what the market has done, or will do. This…
Wealth Odyssey: The Essential Road Map for Your Financial Journey Where Is It You Are Really Trying to Go with Money?
"Frank, a Certified Financial Planner in California, offers a concise, precise guide to "prudent thinking" about personal finances, along with simple tools to estimate how much is required for a comfortable retirement." "A sound guide designed to help people make sensible plans for a successful retirement" - Kirkus book review "First let me tell you Larry Frank knows his stuff. He has a procedure that many will find worth taking the time to implement.” " The book is full of good advice." - Armchair interviews "Larry Frank Sr, gives you a guidebook or "road map" for your financial goals or…
Interested in
computer security,
hackers,
and
espionage?
11,000+ authors have recommended their favorite books and what they love about them.
Browse their picks for the best books about
computer security,
hackers,
and
espionage.