Security and Privacy in a Networked World/Reading list
Note: these are recommended, not compulsory reading!
Books
edit- ALDER, Raven et al (2005). Stealing the Networkː How to Own an Identiry. Syngress.
- ALLSOPP, Wil (2009). Unauthorised Accessː Physical Penetration Testing for IT Security Teams. John Wiley & Sons.
- ANDREJEVIC, Mark (2007). iSpy: Surveillance and Power in the Interactive Era. University Press of Kansas
- GOLDSTEIN, Emmanuel (2008). The Best of 2600: A Hacker Odyssey. Wiley
- HAGER, Nicky (1996). Secret Power - New Zealand's Role in the International Spy Network. Craig Potton Publishing. http://www.nickyhager.info/ebook-of-secret-power
- LONG, Johnny (2008). No Tech Hacking - A Guide to Social Engeering, Dumpster Diving, and Shoulder Surfing. Syngress Publishing (a chapter is available at http://www.hackersforcharity.org/files/NTH_SAMPLE.pdf)
- MCCARTHY, Linda (2003). IT Security: Risking the Corporation. Prentice Hall.
- MITNICK, Kevin D.,SIMON, William L. (2002). The Art of Deception. John Wiley & Sons
- MITNICK, Kevin D.,SIMON, William L. (2005). The Art of Intrusion. John Wiley & Sons
- O'CONNOR, TJ (2012). Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers. Syngress
- STERLING, Bruce (1992). Hacker Crackdown: Law and Disorder on the Electronic Frontier. Bantam Books. http://www.mit.edu/hacker/hacker.html
- STOLL, Cliff (2005). The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. Pocket Books
- VITALIEV, Dmitri (2007). Digital Security and Privacy for Human Rights Defenders. Front Line. http://www.frontlinedefenders.org/esecman/
- WINTERFELD, Steve, ANDRESS, Jason (2013). The Basics of Cyber Warfare. Syngress.
Other resources
edit- Attrition.org: security. http://attrition.org/security/
- The Honeynet Project: Know Your Enemy. http://old.honeynet.org/papers/honeynet/
- SANS Information Security Resources. http://www.sans.org/security-resources/
- SANS Reading Room. http://www.sans.org/security-resources/