Books
A non-exhaustive list of personally recommended books in no particular order.


Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
- The book is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age, including the history of “trolling,” the ethics and metaphysics of hacking, and the origins and manifold meanings of “the lulz.”
- release November 4, 2014


The Coming Swarm: DDOS Actions, Hacktivism, and Civil Disobedience on the Internet Molly Sauter
- The author examines the history, development, theory, and practice of distributed denial of service actions as a tactic of political activism.
- release October 23, 2014


Realizing a New Global Cyberspace Framework: Normative Foundations and Guiding Principles Rolf H. Weber
- The book attempts to outline a model for a general legal framework enshrining key principles of civil society (such as human rights, ethics) with cyberspace.
- release September 24, 2014


More Essential than Ever: The Fourth Amendment in the Twenty First Century Stephen J. Schulhofer
- Combining a detailed knowledge of specific cases with a deep grasp of Constitutional law, More Essential than Ever offers a sophisticated and thoughtful perspective on this important debate.
- release August 6, 2012


Introduction to Information Security: A Strategic-Based Approach Multiple Authors
- Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information.
- release December 3, 2013


Information Governance and Security: Protecting and Managing Your Company’s Proprietary Information Multiple Authors, Robert Shimonski
- Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization’s most important asset-its proprietary information-safe from cyber and physical compromise.
- release October 6, 2014


Cyber Defense and Situational Awareness Edited Volume
- This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense.
- release January 6, 2015


Honeypots: A New Paradigm to Information Security Multiple Authors
- The book covers the latest technology in information security and honeypots, including honeytokens, honeynets, and honeyfarms. Additional topics include denial of service, viruses, worms, phishing, and virtual honeypots and forensics.
- release February 3, 2011


Unauthorized Access: The Crisis in Online Privacy and Security Multiple Authors
- The authors—two renowned experts on computer security and law—explore the well-established connection between social norms, privacy, security, and technological structure.
- release July 15, 2013


Protection of Information and the Right to Privacy – A New Equilibrium? Luciano Floridi
- This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security and the right to informational privacy.
- release May 19, 2014


Privacy-Invading Technologies and Privacy by Design: Safeguarding Privacy, Liberty and Security in the 21st Century Demetrius Klitou
- Challenged by rapidly developing privacy-invading technologies (PITs), this book provides a convincing set of potential policy recommendations and practical solutions for safeguarding both privacy and security. It shows that benefits such as public security do not necessarily come at the expense of privacy and liberty overall.
- release July 6, 2014


Privacy Impact Assessment Edited Volume
- The first book on privacy impact mechanisms, the authors provide a thorough and cogent introduction and analysis of this tool.
- release December 29, 2011


A World without Privacy: What Law Can and Should Do? Edited Volume
- The book considers several different understandings of privacy and provides examples of legal responses to the threats to privacy associated with new modalities of surveillance, the rise of digital technology, the excesses of the Bush and Obama administrations, and the continuing war on terror.
- release December 15, 2014


The Hacker Playbook 2: Practical Guide To Penetration Testing Peter Kim
- This second version of The Hacker Playbook takes all the best “plays” from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.
- June 20, 2015


The Browser Hacker’s Handbook Multiple Authors
- Gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks.
- release March 24, 2014


The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (2nd Ed.) Patrick Engebretson
- Serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed.
- release August 15, 2013


Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense Multiple Authors
- This book gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment.
- release May 9, 2014


Mastering Metasploit Nipun Jaswal
- With this book, you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert.
- release May 11, 2014


Mastering Kali Linux for Advanced Penetration Testing Robert W. Beggs
- This book will take you, as a tester, through the reconnaissance, exploitation, and post-exploitation activities used by penetration testers and hackers.
- release May 21, 2014


Kali Linux CTF Blueprints Cameron Buchanan
- Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux.
- release August 13, 2014


Ethical Hacking and Penetration Testing Guide Rafay Baloch
- The author supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test.
- release July 28, 2014


Dissecting the Hack: The F0rb1dd3n Network Multiple Authors
- The book is divided into two parts. The first part, entitled “The F0rb1dd3n Network,” tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, “Security Threats Are Real” (STAR), focuses on these real-world lessons.
- release July 15, 2010


Computers and the Law: An Introduction to Basic Legal Principles and Their Application in Cyberspace Robert Dunne
- Computers and the Law provides readers with an introduction to the legal issues associated with computing. Assuming no knowledge of the law or computer science, this textbook offers undergraduates of all disciplines and professionals in the computing industry an understanding of basic legal principles and peculiarities associated with legal issues in cyberspace.
- release May 29, 2009


Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices Multiple Authors
- The book will highlight the ethical and legal practices used in computing technologies, increase the effectiveness of computing students and professionals in applying ethical values and legal statues, and provide insight on ethical and legal discussions of real-world applications.
- release September 30, 2011


Disclosure of Security Vulnerabilities: Legal and Ethical Issues Alana Maurushat
- Disclosure of Security Vulnerabilities: Legal and Ethical Issues considers both the ethical and legal issues involved with the disclosure of vulnerabilities and explores the ways in which law might respond to these challenges.
- release April 25, 2013


The Ethics of Information Warfare Edited Volume
- This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.
- release March 26, 2014


Intelligent Methods for Cyber Warfare Edited Volume
- The book includes a number of chapters that can be conceptually divided into three topics: chapters describing different data analysis methodologies with their applications to cyberwarfare, chapters presenting a number of intrusion detection approaches, and chapters dedicated to analysis of possible cyber attacks and their impact.
- release September 4, 2014


Cyberwar and Information Warfare Edited Volume
- Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare.
- release August 15, 2011


Cyberspace and International Relations: Theory, Prospects and Challenges Edited Volume
- This compilation addresses for the first time the “cyberization” of international relations – the growing dependence of actors in IR on the infrastructure and instruments of the internet, and the penetration of cyberspace into all fields of their activities.
- release November 20, 2013


Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners (2nd Ed.) Multiple Authors
- The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists.
- release October 30, 2013


Counterterrorism and Cybersecurity: Total Information Awareness Newton Lee
- This book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood.
- release April 8, 2015


Computer Crime Law (3rd Ed.) Orin Kerr
- THE case book on computer crime law. 1000+ pages on legal cases, regulation and theory. Very informative and quite entertaining.
- release December 5, 2012


Legal Principles for Combatting Cyberlaundering Daniel Adeoyé Leslie
- The book investigates the problem of cyber laundering legally and sets out why it is of a grave legal concern locally and internationally. The book looks at the current state of laws and how they do not fully come to grips with the problem.
- release July 20, 2014


Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives Erik Laykin
- This book zeroes in on a real need felt by lawyers, jurists, accountants, administrators, senior managers, and business executives around the globe: to understand the forensic investigation landscape before having an immediate and dire need for the services of a forensic investigator.
- release April 15, 2013


Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace Multiple Authors
- This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations.
- release December 3, 2013


Handbook of Digital Forensics and Investigation Eoghan Casey
- This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems.
- release November 9, 2009


Digital Forensics for Legal Professionals: Understanding Digital Evidence From The Warrant To The Courtroom Multiple Authors
- With many illustrations and diagrams that will be usable in court, they explain technical concepts such as unallocated space, forensic copies, timeline artifacts and metadata in simple terms that make these concepts accessible to both attorneys and juries.
- release September 16, 2011


Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet (3rd Ed.) Multiple Authors
- This book provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. A well rounded and well written book.
- release May 4, 2011


Cybercrime, Digital Forensics and Jurisdiction Multiple Authors
- An examination into understanding and preventing cybercrime for interested parties such as business entities, private citizens, and government agencies. The book is firmly rooted in the law demonstrating that a viable strategy to confront cybercrime must be international in scope.
- release February 26, 2015


Cyber Crime and the Victimization of Women: Laws, Rights and Regulations Multiple Authors
- It explores gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing. These and other tactics designed to inflict intimidation, control, and other harms are frequently committed by perpetrators who, for many reasons, are unlikely to be identified or punished.
- release July 31, 2011


China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain Multiple Authors
- A comprehensive analysis of China’s cyberspace threats and policies. The contributors – Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West – address cyberspace threats and policies.
- release April 7, 2015


This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World’s Information Andy Greenberg
- “With unrivaled access to such major players as Julian Assange, Daniel Domscheit-Berg, and WikiLeaks’ shadowy engineer known as the Architect, never before interviewed, reporter Andy Greenberg unveils the world of politically-motivated hackers—who they are and how they operate.”
- release September 13, 2012


The Privacy Advocates: Resisting the Spread of Surveillance Colin J. Bennett
- The author analyzes the people and groups around the world who have risen to challenge the most intrusive surveillance practices by both government and corporations.
- release August 13, 2010


The NSA Report: Liberty and Security in a Changing World Multiple Authors
- This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency.
- released April 20, 2014


The New Censorship: Inside the Global Battle for Media Freedom Joel Simon
- A sobering investigation into government repression of free speech around the world. The author provides ten policy recommendations to decrease speech restrictions and violence against journalists.
- released November 11, 2014


The Dark Net: Inside the Digital Underworld Jamie Bartlett
- Beginning with the rise of the internet and the conflicts and battles that defined its early years, Bartlett reports on trolls, pornographers, drug dealers, hackers, political extremists, Bitcoin programmers, and vigilantes—and puts a human face on those who have many reasons to stay anonymous.
- released May 22, 2015


The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice (2nd ed.) Jason Andress
- As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects.
- released June 23, 2014


The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the Global Economic Order Multiple Authors
- Vigna and Casey demystify cryptocurrency-its origins, its function, and what you need to know to navigate a cyber-economy.
- released January 27, 2015


Technocreep: The Surrender of Privacy and the Capitalization of Intimacy Thomas P. Keenan
- Another entry into how government and corporate surveillance and products affects our privacy and whether we should be consumers and concerned citizens.
- released September 13, 2014


Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door Brian Krebs
- Written like a lengthy personal journal blog entry, Krebs provides an interesting look into computer crime syndicates and how they make and spend money.
- released November 18, 2014


Sexting and Cyberbullying: Defining the Line for Digitally Empowered Kids Shaheen Shariff
- Directed at policy makers, legislators, educators, parents, members of the legal community, and anyone concerned about current public policy responses to sexting and cyberbullying, this book examines the lines between online joking and legal consequences.
- released December 29, 2014


Secrets: On the Ethics of Concealment and Revelation Sissela Bok
- Shows how the ethical issues raised by secrets and secrecy in our careers or private lives take us to the heart of the critical questions of private and public morality.
- released December 17, 1989


Professional Penetration Testing: Creating and Learning in a Hacking Lab (2nd Ed.) Thomas Wilhelm
- The author walks you through the entire process of setting up and running a pen test lab. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices.
- released July 31, 2013


Practical Anonymity: Hiding in Plain Sight Online Peter Loshin
- A beginner’s guide on how to use Tor and Tails. If you have no idea where to look or where to begin, then this is for you. A short read with all the information you need to start anonymizing your internet activity.
- released August 9, 2013


No Place to Hide: Edward Snowden, the NSA and the Surveillance State Glenn Greenwald
- An account of Greenwald’s 11 day experience with Edward Snowden in Hong Kong. Polemic in nature, the book provides the revelatory information leaked by Snowden in a easy to read writing style.
- released April 28, 2015


Information Privacy Law (5th Ed.) Multiple Authors
- THE casebook for Privacy Law. If you were to get one book on privacy law, this should be your go to source. A 1000+ pages on legal decisions, legal regulations, legal and political theory, along with other pertinent subjects.
- released December 1, 2014


Gray Hat Hacking: The Ethical Hacker’s Handbook (4th Ed.) Multiple Authors
- Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource.
- released January 5, 2015


Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance Julia Angwin
- Another entertaining read, by an award winning investigative journalist, that examines the various ways in which corporations and governments collect and retain personal information on individuals and groups.
- released February 10, 2015


Does State Spying Make Us Safer?: The Munk Debate on Mass Surveillance Multiple Authors
- The thirteenth Munk Debate, held in Toronto on Friday, May 2, 2014, pitted Michael Hayden and Alan Dershowitz against Glenn Greenwald and Alexis Ohanian to debate whether state surveillance is a legitimate defense of our freedom.
- released December 16, 2014


Dataclysm: Who We Are (When We Think No One’s Looking) Christian Rudder
- An examination of corporate profiling through social media and what the information collected says about you, your interests, networks and secrets. The author also provides some analysis and advice on how to maintain your privacy online.
- released September 9, 2014


Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols Multiple Authors
- Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics.
- released November 23, 2012


Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
- A thorough examination into surveillance and privacy issues occurring both with and without our consent and policy suggestions to reform corporate and government sectors.
- released March 2, 2015


Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the World Paul Rosenzweig
- The book provides a level-headed, concrete analytical foundation for thinking about cybersecurity law and policy questions, covering the entire range of cyber issues in the 21st century, including topics such as malicious software, encryption, hardware intrusions, privacy and civil liberties concerns, and other interesting aspects of the problem.
- released January 9, 2013


Cyber Disobedience: Re://Presenting Online Anarchy Multiple Authors
- Few activities have captured the contemporary popular imagination as hacking and online activism, from Anonymous and beyond. Few political ideas have gained more notoriety recently than anarchism. Yet both remain misunderstood and much maligned. /Cyber Disobedience/ provides the most engaging and detailed analysis of online civil disobedience and anarchism today


Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon Kim Zetter
- Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.’
- released September 1, 2015


Carry On: Sound Advice from Schneier on Security Bruce Schneier
- Schneier presents this anthology of more than 155 of his most insightful essays. Here you will find thought-provoking assessments of security and technology; the psychological, human, business, and economic aspects of security; privacy and surveillance; crime, terrorism, spying, and war; liberty and law; and much, much more.
- released December 16, 2013


Blackhatonomics: An Inside Look at the Economics of Cybercrime Multiple Authors
- The book provides an economic view of the evolving business of cybercrime, showing the methods and motivations behind organized cybercrime attacks, and the changing tendencies towards cyber-warfare.
- released December 19, 2012


Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide Lee Allen
- A step-by-step guide on how to do a penetration test. While “advanced” is in the title, the book is suitable for beginners. Great guide on how to setup your own lab and begin utilizing tools and techniques explained.
- released May 16, 2012


Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace Edited Volume
- A geopolitical policy overview of nation state controlled and enforced oppressive internet technologies.
- released 4.2.2010


Future Crimes Marc Goodman
- “Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us.” An entertaining read, but lacks analysis. It reads as an conglomeration of cutting edge blog, twitter, and news updates.
- released 2.24.15