Books

A non-exhaustive list of personally recommended books in no particular order.

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman

  • The book is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age, including the history of “trolling,” the ethics and metaphysics of hacking, and the origins and manifold meanings of “the lulz.”
  • release November 4, 2014
X
The Coming Swarm: DDOS Actions, Hacktivism, and Civil Disobedience on the Internet
The Coming Swarm: DDOS Actions, Hacktivism, and Civil Disobedience on the Internet

The Coming Swarm: DDOS Actions, Hacktivism, and Civil Disobedience on the Internet Molly Sauter

  • The author examines the history, development, theory, and practice of distributed denial of service actions as a tactic of political activism.
  • release October 23, 2014
X
Realizing a New Global Cyberspace Framework: Normative Foundations and Guiding Principles
Realizing a New Global Cyberspace Framework: Normative Foundations and Guiding Principles

Realizing a New Global Cyberspace Framework: Normative Foundations and Guiding Principles Rolf H. Weber

  • The book attempts to outline a model for a general legal framework enshrining key principles of civil society (such as human rights, ethics) with cyberspace.
  • release September 24, 2014
X
More Essential than Ever: The Fourth Amendment in the Twenty First Century
More Essential than Ever: The Fourth Amendment in the Twenty First Century

More Essential than Ever: The Fourth Amendment in the Twenty First Century Stephen J. Schulhofer

  • Combining a detailed knowledge of specific cases with a deep grasp of Constitutional law, More Essential than Ever offers a sophisticated and thoughtful perspective on this important debate.
  • release August 6, 2012
X
Introduction to Information Security: A Strategic-Based Approach
Introduction to Information Security: A Strategic-Based Approach

Introduction to Information Security: A Strategic-Based Approach Multiple Authors

  • Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information.
  • release December 3, 2013
X
Information Governance and Security: Protecting and Managing Your Company’s Proprietary Information
Information Governance and Security: Protecting and Managing Your Company’s Proprietary Information

Information Governance and Security: Protecting and Managing Your Company’s Proprietary Information Multiple Authors, Robert Shimonski

  • Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization’s most important asset-its proprietary information-safe from cyber and physical compromise.
  • release October 6, 2014
X
Cyber Defense and Situational Awareness
Cyber Defense and Situational Awareness

Cyber Defense and Situational Awareness Edited Volume

  • This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense.
  • release January 6, 2015
X
Honeypots: A New Paradigm to Information Security
Honeypots: A New Paradigm to Information Security

Honeypots: A New Paradigm to Information Security Multiple Authors

  • The book covers the latest technology in information security and honeypots, including honeytokens, honeynets, and honeyfarms. Additional topics include denial of service, viruses, worms, phishing, and virtual honeypots and forensics.
  • release February 3, 2011
X
Unauthorized Access: The Crisis in Online Privacy and Security
Unauthorized Access: The Crisis in Online Privacy and Security

Unauthorized Access: The Crisis in Online Privacy and Security Multiple Authors

  • The authors—two renowned experts on computer security and law—explore the well-established connection between social norms, privacy, security, and technological structure.
  • release July 15, 2013
X
Protection of Information and the Right to Privacy – A New Equilibrium?
Protection of Information and the Right to Privacy – A New Equilibrium?

Protection of Information and the Right to Privacy – A New Equilibrium? Luciano Floridi

  • This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security and the right to informational privacy.
  • release May 19, 2014
X
Privacy-Invading Technologies and Privacy by Design: Safeguarding Privacy, Liberty and Security in the 21st Century
Privacy-Invading Technologies and Privacy by Design: Safeguarding Privacy, Liberty and Security in the 21st Century

Privacy-Invading Technologies and Privacy by Design: Safeguarding Privacy, Liberty and Security in the 21st Century Demetrius Klitou

  • Challenged by rapidly developing privacy-invading technologies (PITs), this book provides a convincing set of potential policy recommendations and practical solutions for safeguarding both privacy and security. It shows that benefits such as public security do not necessarily come at the expense of privacy and liberty overall.
  • release July 6, 2014
X
Privacy Impact Assessment
Privacy Impact Assessment

Privacy Impact Assessment Edited Volume

  • The first book on privacy impact mechanisms, the authors provide a thorough and cogent introduction and analysis of this tool.
  • release December 29, 2011
X
A World without Privacy: What Law Can and Should Do?
A World without Privacy: What Law Can and Should Do?

A World without Privacy: What Law Can and Should Do? Edited Volume

  • The book considers several different understandings of privacy and provides examples of legal responses to the threats to privacy associated with new modalities of surveillance, the rise of digital technology, the excesses of the Bush and Obama administrations, and the continuing war on terror.
  • release December 15, 2014
X
The Hacker Playbook 2: Practical Guide To Penetration Testing
The Hacker Playbook 2: Practical Guide To Penetration Testing

The Hacker Playbook 2: Practical Guide To Penetration Testing Peter Kim

  • This second version of The Hacker Playbook takes all the best “plays” from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.
  • June 20, 2015
X
The Browser Hacker’s Handbook
The Browser Hacker’s Handbook

The Browser Hacker’s Handbook Multiple Authors

  • Gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks.
  • release March 24, 2014
X
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (2nd Ed.)
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (2nd Ed.)

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (2nd Ed.) Patrick Engebretson

  • Serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed.
  • release August 15, 2013
X
Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense
Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense

Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense Multiple Authors

  • This book gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment.
  • release May 9, 2014
X
Mastering Metasploit
Mastering Metasploit

Mastering Metasploit Nipun Jaswal

  • With this book, you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert.
  • release May 11, 2014
X
Mastering Kali Linux for Advanced Penetration Testing
Mastering Kali Linux for Advanced Penetration Testing

Mastering Kali Linux for Advanced Penetration Testing Robert W. Beggs

  • This book will take you, as a tester, through the reconnaissance, exploitation, and post-exploitation activities used by penetration testers and hackers.
  • release May 21, 2014
X
Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Kali Linux CTF Blueprints Cameron Buchanan

  • Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux.
  • release August 13, 2014
X
Ethical Hacking and Penetration Testing Guide
Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing Guide Rafay Baloch

  • The author supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test.
  • release July 28, 2014
X
Dissecting the Hack: The F0rb1dd3n Network
Dissecting the Hack: The F0rb1dd3n Network

Dissecting the Hack: The F0rb1dd3n Network Multiple Authors

  • The book is divided into two parts. The first part, entitled “The F0rb1dd3n Network,” tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, “Security Threats Are Real” (STAR), focuses on these real-world lessons.
  • release July 15, 2010
X
Computers and the Law: An Introduction to Basic Legal Principles and Their Application in Cyberspace
Computers and the Law: An Introduction to Basic Legal Principles and Their Application in Cyberspace

Computers and the Law: An Introduction to Basic Legal Principles and Their Application in Cyberspace Robert Dunne

  • Computers and the Law provides readers with an introduction to the legal issues associated with computing. Assuming no knowledge of the law or computer science, this textbook offers undergraduates of all disciplines and professionals in the computing industry an understanding of basic legal principles and peculiarities associated with legal issues in cyberspace.
  • release May 29, 2009
X
Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices
Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices

Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices Multiple Authors

  • The book will highlight the ethical and legal practices used in computing technologies, increase the effectiveness of computing students and professionals in applying ethical values and legal statues, and provide insight on ethical and legal discussions of real-world applications.
  • release September 30, 2011
X
Disclosure of Security Vulnerabilities: Legal and Ethical Issues
Disclosure of Security Vulnerabilities: Legal and Ethical Issues

Disclosure of Security Vulnerabilities: Legal and Ethical Issues Alana Maurushat

  • Disclosure of Security Vulnerabilities: Legal and Ethical Issues considers both the ethical and legal issues involved with the disclosure of vulnerabilities and explores the ways in which law might respond to these challenges.
  • release April 25, 2013
X
The Ethics of Information Warfare
The Ethics of Information Warfare

The Ethics of Information Warfare Edited Volume

  • This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.
  • release March 26, 2014
X
Intelligent Methods for Cyber Warfare
Intelligent Methods for Cyber Warfare

Intelligent Methods for Cyber Warfare Edited Volume

  • The book includes a number of chapters that can be conceptually divided into three topics: chapters describing different data analysis methodologies with their applications to cyberwarfare, chapters presenting a number of intrusion detection approaches, and chapters dedicated to analysis of possible cyber attacks and their impact.
  • release September 4, 2014
X
Cyberwar and Information Warfare
Cyberwar and Information Warfare

Cyberwar and Information Warfare Edited Volume

  • Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare.
  • release August 15, 2011
X
Cyberspace and International Relations: Theory, Prospects and Challenges
Cyberspace and International Relations: Theory, Prospects and Challenges

Cyberspace and International Relations: Theory, Prospects and Challenges Edited Volume

  • This compilation addresses for the first time the “cyberization” of international relations – the growing dependence of actors in IR on the infrastructure and instruments of the internet, and the penetration of cyberspace into all fields of their activities.
  • release November 20, 2013
X
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners (2nd Ed.)
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners (2nd Ed.)

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners (2nd Ed.) Multiple Authors

  • The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists.
  • release October 30, 2013
X
Counterterrorism and Cybersecurity: Total Information Awareness
Counterterrorism and Cybersecurity: Total Information Awareness

Counterterrorism and Cybersecurity: Total Information Awareness Newton Lee

  • This book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood.
  • release April 8, 2015
X
Computer Crime Law (3rd Ed.)
Computer Crime Law (3rd Ed.)

Computer Crime Law (3rd Ed.) Orin Kerr

  • THE case book on computer crime law.  1000+ pages on legal cases, regulation and theory.  Very informative and quite entertaining.
  • release December 5, 2012
X
Legal Principles for Combatting Cyberlaundering
Legal Principles for Combatting Cyberlaundering

Legal Principles for Combatting Cyberlaundering Daniel Adeoyé Leslie

  • The book investigates the problem of cyber laundering legally and sets out why it is of a grave legal concern locally and internationally. The book looks at the current state of laws and how they do not fully come to grips with the problem.
  • release July 20, 2014
X
Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives
Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives

Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives Erik Laykin

  • This book zeroes in on a real need felt by lawyers, jurists, accountants, administrators, senior managers, and business executives around the globe: to understand the forensic investigation landscape before having an immediate and dire need for the services of a forensic investigator.
  • release April 15, 2013
X
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace

Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace Multiple Authors

  • This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations.
  • release December 3, 2013
X
Handbook of Digital Forensics and Investigation
Handbook of Digital Forensics and Investigation

Handbook of Digital Forensics and Investigation Eoghan Casey

  • This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems.
  • release November 9, 2009
X
Digital Forensics for Legal Professionals: Understanding Digital Evidence From The Warrant To The Courtroom
Digital Forensics for Legal Professionals: Understanding Digital Evidence From The Warrant To The Courtroom

Digital Forensics for Legal Professionals: Understanding Digital Evidence From The Warrant To The Courtroom Multiple Authors

  • With many illustrations and diagrams that will be usable in court, they explain technical concepts such as unallocated space, forensic copies, timeline artifacts and metadata in simple terms that make these concepts accessible to both attorneys and juries.
  • release September 16, 2011
X
Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet (3rd Ed.)
Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet (3rd Ed.)

Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet (3rd Ed.) Multiple Authors

  • This book provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation.  A well rounded and well written book.
  • release May 4, 2011
X
Cybercrime, Digital Forensics and Jurisdiction
Cybercrime, Digital Forensics and Jurisdiction

Cybercrime, Digital Forensics and Jurisdiction Multiple Authors

  • An examination into understanding and preventing cybercrime for interested parties such as business entities, private citizens, and government agencies. The book is firmly rooted in the law demonstrating that a viable strategy to confront cybercrime must be international in scope.
  • release February 26, 2015
X
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations

Cyber Crime and the Victimization of Women: Laws, Rights and Regulations Multiple Authors

  • It explores gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing. These and other tactics designed to inflict intimidation, control, and other harms are frequently committed by perpetrators who, for many reasons, are unlikely to be identified or punished.
  • release July 31, 2011
X
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain

China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain Multiple Authors

  • A comprehensive analysis of China’s cyberspace threats and policies. The contributors – Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West – address cyberspace threats and policies.
  • release April 7, 2015
X
This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World’s Information
This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World’s Information

This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World’s Information Andy Greenberg

  • “With unrivaled access to such major players as Julian Assange, Daniel Domscheit-Berg, and WikiLeaks’ shadowy engineer known as the Architect, never before interviewed, reporter Andy Greenberg unveils the world of politically-motivated hackers—who they are and how they operate.”
  • release September 13, 2012
X
The Privacy Advocates: Resisting the Spread of Surveillance
The Privacy Advocates: Resisting the Spread of Surveillance

The Privacy Advocates: Resisting the Spread of Surveillance Colin J. Bennett

  • The author analyzes the people and groups around the world who have risen to challenge the most intrusive surveillance practices by both government and corporations.
  • release August 13, 2010
X
The NSA Report: Liberty and Security in a Changing World
The NSA Report: Liberty and Security in a Changing World

The NSA Report: Liberty and Security in a Changing World Multiple Authors

  • This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency.
  • released April 20, 2014
X
The New Censorship: Inside the Global Battle for Media Freedom
The New Censorship: Inside the Global Battle for Media Freedom

The New Censorship: Inside the Global Battle for Media Freedom Joel Simon

  • A sobering investigation into government repression of free speech around the world.  The author provides ten policy recommendations to decrease speech restrictions and violence against journalists.
  • released November 11, 2014
X
The Dark Net: Inside the Digital Underworld
The Dark Net: Inside the Digital Underworld

The Dark Net: Inside the Digital Underworld Jamie Bartlett

  • Beginning with the rise of the internet and the conflicts and battles that defined its early years, Bartlett reports on trolls, pornographers, drug dealers, hackers, political extremists, Bitcoin programmers, and vigilantes—and puts a human face on those who have many reasons to stay anonymous.
  • released May 22, 2015
X
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice (2nd ed.)
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice (2nd ed.)

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice (2nd ed.) Jason Andress

  • As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects.
  • released June 23, 2014
X
The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the Global Economic Order
The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the Global Economic Order

The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the Global Economic Order Multiple Authors

  • Vigna and Casey demystify cryptocurrency-its origins, its function, and what you need to know to navigate a cyber-economy.
  • released January 27, 2015
X
Technocreep: The Surrender of Privacy and the Capitalization of Intimacy
Technocreep: The Surrender of Privacy and the Capitalization of Intimacy

Technocreep: The Surrender of Privacy and the Capitalization of Intimacy Thomas P. Keenan

  • Another entry into how government and corporate surveillance and products affects our privacy and whether we should be consumers and concerned citizens.
  • released September 13, 2014
X
Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door
Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door

Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door Brian Krebs

  • Written like a lengthy personal journal blog entry, Krebs provides an interesting look into computer crime syndicates and how they make and spend money.
  • released November 18, 2014
X
Sexting and Cyberbullying: Defining the Line for Digitally Empowered Kids
Sexting and Cyberbullying: Defining the Line for Digitally Empowered Kids

Sexting and Cyberbullying: Defining the Line for Digitally Empowered Kids Shaheen Shariff

  • Directed at policy makers, legislators, educators, parents, members of the legal community, and anyone concerned about current public policy responses to sexting and cyberbullying, this book examines the lines between online joking and legal consequences.
  • released December 29, 2014
X
Secrets: On the Ethics of Concealment and Revelation
Secrets: On the Ethics of Concealment and Revelation

Secrets: On the Ethics of Concealment and Revelation Sissela Bok

  • Shows how the ethical issues raised by secrets and secrecy in our careers or private lives take us to the heart of the critical questions of private and public morality.
  • released December 17, 1989
X
Professional Penetration Testing: Creating and Learning in a Hacking Lab (2nd Ed.)
Professional Penetration Testing: Creating and Learning in a Hacking Lab (2nd Ed.)

Professional Penetration Testing: Creating and Learning in a Hacking Lab (2nd Ed.) Thomas Wilhelm

  • The author walks you through the entire process of setting up and running a pen test lab. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices.
  • released July 31, 2013
X
Practical Anonymity: Hiding in Plain Sight Online
Practical Anonymity: Hiding in Plain Sight Online

Practical Anonymity: Hiding in Plain Sight Online Peter Loshin

  • A beginner’s guide on how to use Tor and Tails.  If you have no idea where to look or where to begin, then this is for you.  A short read with all the information you need to start anonymizing your internet activity.
  • released August 9, 2013
X
No Place to Hide: Edward Snowden, the NSA and the Surveillance State
No Place to Hide: Edward Snowden, the NSA and the Surveillance State

No Place to Hide: Edward Snowden, the NSA and the Surveillance State Glenn Greenwald

  • An account of Greenwald’s 11 day experience with Edward Snowden in Hong Kong.  Polemic in nature, the book provides the revelatory information leaked by Snowden in a easy to read writing style.
  • released April 28, 2015
X
Information Privacy Law (5th Ed.)
Information Privacy Law (5th Ed.)

Information Privacy Law (5th Ed.) Multiple Authors

  • THE casebook for Privacy Law.  If you were to get one book on privacy law, this should be your go to source.  A 1000+ pages on legal decisions, legal regulations, legal and political theory, along with other pertinent subjects.
  • released December 1, 2014
X
Gray Hat Hacking: The Ethical Hacker’s Handbook (4th Ed.)
Gray Hat Hacking: The Ethical Hacker’s Handbook (4th Ed.)

Gray Hat Hacking: The Ethical Hacker’s Handbook (4th Ed.) Multiple Authors

  • Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource.
  • released January 5, 2015
X
Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance
Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance

Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance Julia Angwin

  • Another entertaining read, by an award winning investigative journalist, that examines the various ways in which corporations and governments collect and retain personal information on individuals and groups.
  • released February 10, 2015
X
Does State Spying Make Us Safer?: The Munk Debate on Mass Surveillance
Does State Spying Make Us Safer?: The Munk Debate on Mass Surveillance

Does State Spying Make Us Safer?: The Munk Debate on Mass Surveillance Multiple Authors

  • The thirteenth Munk Debate, held in Toronto on Friday, May 2, 2014, pitted Michael Hayden and Alan Dershowitz against Glenn Greenwald and Alexis Ohanian to debate whether state surveillance is a legitimate defense of our freedom.
  • released December 16, 2014
X
Dataclysm: Who We Are (When We Think No One’s Looking)
Dataclysm: Who We Are (When We Think No One’s Looking)

Dataclysm: Who We Are (When We Think No One’s Looking) Christian Rudder

  • An examination of corporate profiling through social media and what the information collected says about you, your interests, networks and secrets.  The author also provides some analysis and advice on how to maintain your privacy online.
  • released September 9, 2014
X
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols Multiple Authors

  • Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics.
  • released November 23, 2012
X
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier

  • A thorough examination into surveillance and privacy issues occurring both with and without our consent and policy suggestions to reform corporate and government sectors.
  • released March 2, 2015
X
Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the World
Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the World

Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the World Paul Rosenzweig

  • The book provides a level-headed, concrete analytical foundation for thinking about cybersecurity law and policy questions, covering the entire range of cyber issues in the 21st century, including topics such as malicious software, encryption, hardware intrusions, privacy and civil liberties concerns, and other interesting aspects of the problem.
  • released January 9, 2013
X
Cyber Disobedience: Re://Presenting Online Anarchy
Cyber Disobedience: Re://Presenting Online Anarchy

Cyber Disobedience: Re://Presenting Online Anarchy Multiple Authors

  • Few activities have captured the contemporary popular imagination as hacking and online activism, from Anonymous and beyond. Few political ideas have gained more notoriety recently than anarchism. Yet both remain misunderstood and much maligned. /Cyber Disobedience/ provides the most engaging and detailed analysis of online civil disobedience and anarchism today
X
Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon
Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon

Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon Kim Zetter

  • Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.’
  • released September 1, 2015
X
Carry On: Sound Advice from Schneier on Security
Carry On: Sound Advice from Schneier on Security

Carry On: Sound Advice from Schneier on Security Bruce Schneier

  • Schneier presents this anthology of more than 155 of his most insightful essays. Here you will find thought-provoking assessments of security and technology; the psychological, human, business, and economic aspects of security; privacy and surveillance; crime, terrorism, spying, and war; liberty and law; and much, much more.
  • released December 16, 2013
X
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Blackhatonomics: An Inside Look at the Economics of Cybercrime

Blackhatonomics: An Inside Look at the Economics of Cybercrime Multiple Authors

  • The book provides an economic view of the evolving business of cybercrime, showing the methods and motivations behind organized cybercrime attacks, and the changing tendencies towards cyber-warfare.
  • released December 19, 2012
X
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide Lee Allen

  • A step-by-step guide on how to do a penetration test.  While “advanced” is in the title, the book is suitable for beginners.  Great guide on how to setup your own lab and begin utilizing tools and techniques explained.
  • released May 16, 2012
X
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace

Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace Edited Volume

  • A geopolitical policy overview of nation state controlled and enforced oppressive internet technologies.
  • released 4.2.2010
X
Future Crimes
Future Crimes

Future Crimes Marc Goodman

  • “Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us.”  An entertaining read, but lacks analysis.  It reads as an conglomeration of cutting edge blog, twitter, and news updates.
  • released 2.24.15
X