- Xโs InfoSec Newsletter
- Posts
- ๐ InfoSec Books for End-of-Year Gifts List ๐ฆ ๐ ๐ป
๐ InfoSec Books for End-of-Year Gifts List ๐ฆ ๐ ๐ป
Recap of the recommended readings I've shared throughout 2023 in my weekly #InfoSecMASHUP newsletter. Remember, sharing is caring; Enjoy the holidays!

(Disclaimer: Some of the links below may be affiliate links)
Week 07: Space Rogue: How the Hackers Known as L0pht Changed the World, by Cris Thomas
Week 09: A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back, by Bruce Schneier
Week 10: Crypto Wars: Faked Deaths, Missing Billions and Industry Disruption, by Erica Stanford
Week 11: Threat Modeling: Designing for Security, by Adam Shostack
Week 12: Security Chaos Engineering: Sustaining Resilience in Software and Systems, by Kelly Shortridge
Week 13: Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise, by Jennifer (JJ) Minella
Week 14: Thinking Security: Stopping Next Year's Hackers, by Steven M. Bellovin
Week 15: Threats: What Every Engineer Should Learn From Star Wars, by Adam Shostack
Week 16: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software, by Michael Sikorski, Andrew Honig
Week 17: This Is How They Tell Me the World Ends: The Cyberweapons Arms Race, by Nicole Perlroth
Week 19: The Pentester BluePrint: Starting a Career as an Ethical Hacker, by Phillip Wylie, Kim Crawley
Week 20: PowerShell Automation and Scripting for CyberSecurity: Hacking and Defense for Red and Blue Teamers, by Miriam C. Wiesner
Week 21: Cyber Defense Matrix: The Essential Guide to Navigating the Cybersecurity Landscape, by Sounil Yu
Week 22: Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks, by Scott J. Shapiro
Week 23: Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World, by Joseph Menn
Week 24: The Cyber Effect: An Expert in Cyberpsychology Explains How Technology Is Shaping Our Children, Our Behavior, and Our Values โ and What We Can Do About It, by Mary Aiken
Week 25: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter
Week 26: Alice and Bob Learn Application Security, by Tanya Janca
Week 27: Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data, by Micah Lee
Week 28: Battlefield Cyber: How China and Russia are Undermining Our Democracy and National Security, by Michael McLaughlin, Bill Holstein
Week 29: Leadership Is Changing the Game - The Transition from Technical Expert to Leader, by Brian Donovan
๐ Partners and Affiliates
โก๏ธ Unlock Your Peak Performance โ First Month FREE!
Optimize your sleep, recovery, and performance with WHOOP. Perfect for cybersecurity pros who need to stay focused and ahead of the threat. Try it out, get a free WHOOP 4.0 and one month free.
Week 30: Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection Systems, by Matt Hand
Week 31: Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection Systems, by Matt Hand
Week 31: Art of Software Security Assessment, The: Identifying and Preventing Software Vulnerabilities, by Mark Dowd, John McDonald, Justin Schuh
Week 32: Visual Threat Intelligence: An Illustrated Guide For Threat Researchers, by Thomas Roccia
Week 33: The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage, by Clifford Stoll
Week 34: Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, by Bruce Schneier
Week 35: Spam Nation: The Inside Story of Organized Cybercrimeโfrom Global Epidemic to Your Front Door, by Brian Krebs
Week 36: Blue Team Handbook: SOC, SIEM, and Threat Hunting (V1.02): A Condensed Guide for the Security Operations Team and Threat Hunter, by Don Murdoch
Week 37: Extreme Privacy: What It Takes to Disappear, by Michael Bazzell
Week 38: Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It, by Marc Goodman
Week 39: Philosophy of Cybersecurity, by Lukasz Olejnik, Artur Kurasiลski
Week 40: 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, by Kim Crawley
Week 41: The Hardware Hacker: Adventures in Making and Breaking Hardware, by Andrew "bunnie" Huang
Week 42: RTFM: Red Team Field Manual v2, by Ben Clark, Nick Downer
Week 43: Click Here to Kill Everybody: Security and Survival in a Hyper-connected World, by Bruce Schneier
Week 44: Permanent Record, by Edward Snowden
Week 45: How the F*ck Did This Happen?: A guide for executives who need to understand Cyber Security in plain, actionable language, by Darryl Carlton
Week 46: Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World, by Jennifer Jin and Marcus J. Carey
Week 47: How I Rob Banks: And Other Such Places, by FC a.k.a. Freakyclown
Week 48: Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem, by Chris Hughes and Nikki Robinson
Reply