Security
50 books
Applied Cryptography
Bruce Schneier
Countdown to Zero Day
Kim Zetter
Cyber War
Richard A. Clarke and Robert K. Knake
Cyber War Will Not Take Place
Thomas Rid
Dark Territory
Fred Kaplan
Data and Goliath
Bruce Schneier
Ghost in the Wires
Kevin Mitnick
Governing the Commons
Elinor Ostrom
Handbook of Applied Cryptography
Menezes, van Oorschot, Vanstone
Intelligence in War
John Keegan
Liars and Outliers
Bruce Schneier
Privacy on the Line
Whitfield Diffie and Susan Landau
Rise of the Machines
Thomas Rid
Sandworm
Andy Greenberg
Secrets and Lies
Bruce Schneier
Security Engineering
Ross Anderson
Software Security
McGraw
The Art of Deception
Kevin D. Mitnick and William L. Simon
The Art of Invisibility
Kevin Mitnick
The Codebreakers
David Kahn
The Cuckoo's Egg
Cliff Stoll
The Fifth Domain
Richard A. Clarke and Robert K. Knake
The Hacker and the State
Ben Buchanan
The Hacker Crackdown
Bruce Sterling
The Practice of Network Security Monitoring
Richard Bejtlich
The Protection of Information in Computer Systems
Saltzer and Schroeder
The Tao of Network Security Monitoring
Richard Bejtlich
The Tragedy of Great Power Politics
John Mearsheimer
This Is How They Tell Me the World Ends
Nicole Perlroth
Threat Modeling
Adam Shostack
Counter Hack Reloaded
Skoudis and Liston
Cryptography and Network Security
William Stallings
Exploiting Software
Hoglund and McGraw
Firewalls and Internet Security
Steve Bellovin
Hacking: The Art of Exploitation, 2nd Edition
J. Erickson
If It's Smart, It's Vulnerable
Mikko Hypponen
Information Security Economics and Beyond
Anderson and Moore
Network Security: Private Communication in a Public World
Charlie Kaufman, Radia Perlman, Mike Speciner
OWASP Testing Guide
OWASP Foundation
Practical Cryptography
Niels Ferguson and Bruce Schneier
Practical UNIX and Internet Security
Gene Spafford et al.
Skating on Stilts
Stewart Baker
SSL And The Future Of Authenticity
Moxie Marlinspike
The Car Hacker's Handbook
Craig Smith
The Hardware Hacking Handbook
Jasper van Woudenberg et al.
Thinking Security
Steve Bellovin
Windows Internals
Mark Russinovich
Advanced Persistent Threat Hacking
Wrightson
How to Become a Hacker
Eric S. Raymond
The Real Internet of Things
Daniel Miessler