Security
73 books
Antifragile
Nassim Nicholas Taleb
Applied Cryptography
Bruce Schneier
Body of Secrets
James Bamford
Countdown to Zero Day
Kim Zetter
Cyber War
Richard A. Clarke and Robert K. Knake
Cyber War Will Not Take Place
Thomas Rid
Dark Territory
Fred Kaplan
Data and Goliath
Bruce Schneier
Diplomacy
Henry Kissinger
Ghost in the Wires
Kevin Mitnick
Governing the Commons
Elinor Ostrom
Handbook of Applied Cryptography
Menezes, van Oorschot, Vanstone
Intelligence in War
John Keegan
Legacy of Ashes
Tim Weiner
Liars and Outliers
Bruce Schneier
Privacy on the Line
Whitfield Diffie and Susan Landau
Rise of the Machines
Thomas Rid
Sandworm
Andy Greenberg
Secrets and Lies
Bruce Schneier
Security Engineering
Ross Anderson
Silicon Snake Oil
Cliff Stoll
Software Security
McGraw
Spycraft
Robert Wallace & Keith Melton
Strategy of Conflict
Thomas Schelling
The Age of Surveillance Capitalism
Shoshana Zuboff
The Art of Deception
Kevin D. Mitnick and William L. Simon
The Art of Intelligence
Henry Crumpton
The Art of Intrusion
Kevin D. Mitnick and William L. Simon
The Art of Invisibility
Kevin Mitnick
The Codebreakers
David Kahn
The Craft of Intelligence
Allen Dulles
The Cuckoo's Egg
Cliff Stoll
The Fifth Domain
Richard A. Clarke and Robert K. Knake
The Hacker and the State
Ben Buchanan
The Hacker Crackdown
Bruce Sterling
The New Fire
Ben Buchanan
The Practice of Network Security Monitoring
Richard Bejtlich
The Prince
Niccolò Machiavelli
The Protection of Information in Computer Systems
Saltzer and Schroeder
The Puzzle Palace
James Bamford
The Shadow Factory
James Bamford
The Tao of Network Security Monitoring
Richard Bejtlich
The Tragedy of Great Power Politics
John Mearsheimer
This Is How They Tell Me the World Ends
Nicole Perlroth
This Machine Kills Secrets
Andy Greenberg
Threat Modeling
Adam Shostack
Writing Secure Code
Michael Howard and David LeBlanc
Applied Network Security Monitoring
Chris Sanders
Counter Hack Reloaded
Skoudis and Liston
Cryptography and Network Security
William Stallings
Exploiting Software
Hoglund and McGraw
Firewalls and Internet Security
Steve Bellovin
Game Hacking
Nick Cano
Hacking: The Art of Exploitation, 2nd Edition
J. Erickson
If It's Smart, It's Vulnerable
Mikko Hypponen
Information Security Economics and Beyond
Anderson and Moore
Network Security Bible
Eric Cole
Network Security: Private Communication in a Public World
Charlie Kaufman, Radia Perlman, Mike Speciner
OWASP Testing Guide
OWASP Foundation
Practical Cryptography
Niels Ferguson and Bruce Schneier
Practical UNIX and Internet Security
Gene Spafford et al.
Skating on Stilts
Stewart Baker
SSL And The Future Of Authenticity
Moxie Marlinspike
The Car Hacker's Handbook
Craig Smith
The Hardware Hacking Handbook
Jasper van Woudenberg et al.
Thinking Security
Steve Bellovin
Why Information Security Is Hard
Ross J. Anderson
Windows Internals
Mark Russinovich
Advanced Persistent Threat Hacking
Wrightson
How to Become a Hacker
Eric S. Raymond
The Basics of Cyber Safety
Sammons
The Real Internet of Things
Daniel Miessler
Web Security Essentials
Katie Paxton-Fear