Security and Privacy in a Networked World/Reading list

Note: these are recommended, not compulsory reading!

Books

edit
  • ALDER, Raven et al (2005). Stealing the Networkː How to Own an Identiry. Syngress.
  • ALLSOPP, Wil (2009). Unauthorised Accessː Physical Penetration Testing for IT Security Teams. John Wiley & Sons.
  • ANDREJEVIC, Mark (2007). iSpy: Surveillance and Power in the Interactive Era. University Press of Kansas
  • GOLDSTEIN, Emmanuel (2008). The Best of 2600: A Hacker Odyssey. Wiley
  • HAGER, Nicky (1996). Secret Power - New Zealand's Role in the International Spy Network. Craig Potton Publishing. http://www.nickyhager.info/ebook-of-secret-power
  • LONG, Johnny (2008). No Tech Hacking - A Guide to Social Engeering, Dumpster Diving, and Shoulder Surfing. Syngress Publishing (a chapter is available at http://www.hackersforcharity.org/files/NTH_SAMPLE.pdf)
  • MCCARTHY, Linda (2003). IT Security: Risking the Corporation. Prentice Hall.
  • MITNICK, Kevin D.,SIMON, William L. (2002). The Art of Deception. John Wiley & Sons
  • MITNICK, Kevin D.,SIMON, William L. (2005). The Art of Intrusion. John Wiley & Sons
  • O'CONNOR, TJ (2012). Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers. Syngress
  • STERLING, Bruce (1992). Hacker Crackdown: Law and Disorder on the Electronic Frontier. Bantam Books. http://www.mit.edu/hacker/hacker.html
  • STOLL, Cliff (2005). The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. Pocket Books
  • VITALIEV, Dmitri (2007). Digital Security and Privacy for Human Rights Defenders. Front Line. http://www.frontlinedefenders.org/esecman/
  • WINTERFELD, Steve, ANDRESS, Jason (2013). The Basics of Cyber Warfare. Syngress.

Other resources

edit

Back to the Main Page