๐ InfoSec Books for End-of-Year Gifts List ๐ฆ ๐ ๐ป
Recap of the recommended readings I've shared throughout 2023 in my weekly #InfoSecMASHUP newsletter. Remember, sharing is caring; Enjoy the holidays!
(Disclaimer: Some of the links below may be affiliate links)
Week 07: Space Rogue: How the Hackers Known as L0pht Changed the World, by Cris Thomas
Week 09: A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back, by Bruce Schneier
Week 10: Crypto Wars: Faked Deaths, Missing Billions and Industry Disruption, by Erica Stanford
Week 11: Threat Modeling: Designing for Security, by Adam Shostack
Week 12: Security Chaos Engineering: Sustaining Resilience in Software and Systems, by Kelly Shortridge
Week 13: Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise, by Jennifer (JJ) Minella
Week 14: Thinking Security: Stopping Next Year's Hackers, by Steven M. Bellovin
Week 15: Threats: What Every Engineer Should Learn From Star Wars, by Adam Shostack
Week 16: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software, by Michael Sikorski, Andrew Honig
Week 17: This Is How They Tell Me the World Ends: The Cyberweapons Arms Race, by Nicole Perlroth
Week 19: The Pentester BluePrint: Starting a Career as an Ethical Hacker, by Phillip Wylie, Kim Crawley
Week 20: PowerShell Automation and Scripting for CyberSecurity: Hacking and Defense for Red and Blue Teamers, by Miriam C. Wiesner
Week 21: Cyber Defense Matrix: The Essential Guide to Navigating the Cybersecurity Landscape, by Sounil Yu
Week 22: Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks, by Scott J. Shapiro
Week 23: Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World, by Joseph Menn
Week 24: The Cyber Effect: An Expert in Cyberpsychology Explains How Technology Is Shaping Our Children, Our Behavior, and Our Values โ and What We Can Do About It, by Mary Aiken
Week 25: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter
Week 26: Alice and Bob Learn Application Security, by Tanya Janca
Week 27: Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data, by Micah Lee
Week 28: Battlefield Cyber: How China and Russia are Undermining Our Democracy and National Security, by Michael McLaughlin, Bill Holstein
Week 29: Leadership Is Changing the Game - The Transition from Technical Expert to Leader, by Brian Donovan
๐ Geeky Humor Mug: Firewall Down, Coffee Up!
Embrace your inner techie and indulge in some geeky humor with our "Firewall Down? Time for a Coffee Break!" mug. This mug is the perfect blend of tech savvy and caffeine appreciation, designed to add a dash of wit to your daily routine.
Week 30: Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection Systems, by Matt Hand
Week 31: Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection Systems, by Matt Hand
Week 31: Art of Software Security Assessment, The: Identifying and Preventing Software Vulnerabilities, by Mark Dowd, John McDonald, Justin Schuh
Week 32: Visual Threat Intelligence: An Illustrated Guide For Threat Researchers, by Thomas Roccia
Week 33: The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage, by Clifford Stoll
Week 34: Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, by Bruce Schneier
Week 35: Spam Nation: The Inside Story of Organized Cybercrimeโfrom Global Epidemic to Your Front Door, by Brian Krebs
Week 36: Blue Team Handbook: SOC, SIEM, and Threat Hunting (V1.02): A Condensed Guide for the Security Operations Team and Threat Hunter, by Don Murdoch
Week 37: Extreme Privacy: What It Takes to Disappear, by Michael Bazzell
Week 38: Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It, by Marc Goodman
Week 39: Philosophy of Cybersecurity, by Lukasz Olejnik, Artur Kurasiลski
Week 40: 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, by Kim Crawley
Week 41: The Hardware Hacker: Adventures in Making and Breaking Hardware, by Andrew "bunnie" Huang
Week 42: RTFM: Red Team Field Manual v2, by Ben Clark, Nick Downer
Week 43: Click Here to Kill Everybody: Security and Survival in a Hyper-connected World, by Bruce Schneier
Week 44: Permanent Record, by Edward Snowden
Week 45: How the F*ck Did This Happen?: A guide for executives who need to understand Cyber Security in plain, actionable language, by Darryl Carlton
Week 46: Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World, by Jennifer Jin and Marcus J. Carey
Week 47: How I Rob Banks: And Other Such Places, by FC a.k.a. Freakyclown
Week 48: Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem, by Chris Hughes and Nikki Robinson
Note that this list will get updates throughout the end of year. Come back on the web version for more reading recommendations.