Search
  • Videos
  • Windows 10
  • 5G
  • CES
  • Best VPNs
  • Cloud
  • Security
  • more
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • CES
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Cybersecurity reads for every hacker's bookshelf

13 of 13 NEXT PREV
  • A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security

    A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security

    Author: Tobias Klein

    It isn't all about black-hat activities -- the white-hat work can be exciting, too. In A Bug Hunter's Diary, security expert Tobias Klein describes how he became involved in tracking down exploits and vulnerabilities, how vendors view the bug bounty industry, and all of the happiness and frustration which is part of the job.

    Published: May 10, 2017 -- 08:00 GMT (01:00 PDT)

    Caption by: Charlie Osborne

  • The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

    The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

    Author: Kevin Mitnick

    In The Art of Intrusion, Kevin Mitnick tells us through real-life examples how hacking is not just about breaking into large corporations, but also infiltrate other areas of live. Tales include how a group of friends reverse-engineered slot machines to win big and how computer hacking entered a Texas prison.

    Published: May 10, 2017 -- 08:00 GMT (01:00 PDT)

    Caption by: Charlie Osborne

  • Black Hat Python: Python Programming for Hackers and Pentesters

    Black Hat Python: Python Programming for Hackers and Pentesters

    Author: Justin Seitz

    Python is a programming language which takes hackers beyond the basics and into the realm of the professional security expert. Black Hat Python is an excellent way to start by fully investigating how the language can be used for both the light -- and dark -- sides of hacking.

    Published: May 10, 2017 -- 08:00 GMT (01:00 PDT)

    Caption by: Charlie Osborne

  • Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

    Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

    Author: Kevin Mirnick

    Kevin Mirnick's autobiography, Ghost in the Wires: My Adventures as the World's Most Wanted Hacker, speaks about the now-security consultant's time as a hacker led FBI agents a merry chase in his capture after hacking into some of the world's largest firms.

    Published: May 10, 2017 -- 08:00 GMT (01:00 PDT)

    Caption by: Charlie Osborne

  • The Hacker Playbook 2: Practical Guide To Penetration Testing

    The Hacker Playbook 2: Practical Guide To Penetration Testing

    Author: Peter Kim

    For a practical guide to penetration testing right from the beginning, The Hacker Playbook is likely not just to appeal to beginners, but to professionals who might appreciate a reference guide to hand. The book covers everything from network infiltration to sandboxing, how to circumvent antivirus software and what damage can be caused when a system is breached.

    Published: May 10, 2017 -- 08:00 GMT (01:00 PDT)

    Caption by: Charlie Osborne

  • Secrets and Lies: Digital Security in a Networked World

    Secrets and Lies: Digital Security in a Networked World

    Author: Bruce Schneier

    Bruce Schneier's Secrets and Lies: Digital Security in a Networked World focuses on how networks operate and the security themes and concepts important in today's world; especially useful for those in the field, and very interesting to any tech enthusiast.

    Published: May 10, 2017 -- 08:00 GMT (01:00 PDT)

    Caption by: Charlie Osborne

  • Countdown to Zero Day

    Countdown to Zero Day

    Author: Kim Zetter

    Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon follows the discovery of Stuxnet, a worm designed to attack industrial sectors.

    Ketter's story is a fascinating insight into how cybersecurity firms operate and introduces the reader to a number of key themes and topics which can be applied to the threat landscape today.

    Published: May 10, 2017 -- 08:00 GMT (01:00 PDT)

    Caption by: Charlie Osborne

  • Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

    Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

    Author: Bruce Schneier

    Bruce Schneier's latest offering, Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, expands beyond network security to how our information is protected -- or left exposed. The main thrust of the book is a discussion of whether mass surveillance has a place in our world when it comes to security, and whether a balance between surveillance and privacy is possible.

    Published: May 10, 2017 -- 08:00 GMT (01:00 PDT)

    Caption by: Charlie Osborne

  • We Are Anonymous

    We Are Anonymous

    Author: Parmy Olson

    Anonymous, a loose, global hacktivist collective which often targets groups online for political motives, has made the news many times in recent years. The group does not hide their activities but rather taunts their victims -- more often than not in order to promote a political message. If you would like to read up on them and their motives, We Are Anonymous is a fantastic read which follows the stories of four key members.

    Published: May 10, 2017 -- 08:00 GMT (01:00 PDT)

    Caption by: Charlie Osborne

  • Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

    Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

    Author: Kevin Poulsen

    In this book, former hacker Kevin Poulsen takes us on a journey through modern-day cybercriminal rings and operations by following the story of an unlikely kingpin of the criminal world. If you want to know how a nondescript programmer managed to avoid authorities, hack fellow hackers and steal credit card data in the millions, check out the story.

    Published: May 10, 2017 -- 08:00 GMT (01:00 PDT)

    Caption by: Charlie Osborne

  • Social Engineering: The Art of Human Hacking

    Social Engineering: The Art of Human Hacking

    Author: Kevin Mitnick

    If you have an interest in social engineering -- the way that threat actors can utilize human behavior rather than software for their own ends -- this read is for you. The book delves into the science and behavioral patterns behind the concept, as well as ways to protect yourself from such manipulation.

    Published: May 10, 2017 -- 08:00 GMT (01:00 PDT)

    Caption by: Charlie Osborne

  • Spam Nation

    Spam Nation

    Author: Brian Krebs

    Spam Nation: The Inside Story of Organized Cybercrime is a detailed look at spam and hacking operations today. Spam may be little more than a nuisance to most, but behind the scenes, such campaigns can mask vast underground cybercriminal operations, the flow of illegal cash, and the malware marketplace.

    Published: May 10, 2017 -- 08:00 GMT (01:00 PDT)

    Caption by: Charlie Osborne

  • The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

    The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

    Author: Kevin Mitnick

    In this book, former most-wanted hacker and now security consultant Kevin Mitnick takes us on a journey using real-life examples of how your data is collected -- and how to fight back. From staying invisible online to keeping your accounts safe, Mitnick offers a variety of tactics to keep your privacy intact.

    Published: May 10, 2017 -- 08:00 GMT (01:00 PDT)

    Caption by: Charlie Osborne

13 of 13 NEXT PREV
Charlie Osborne

By Charlie Osborne | May 10, 2017 -- 08:00 GMT (01:00 PDT) | Topic: Security

  • A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
  • The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
  • Black Hat Python: Python Programming for Hackers and Pentesters
  • Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
  • The Hacker Playbook 2: Practical Guide To Penetration Testing
  • Secrets and Lies: Digital Security in a Networked World
  • Countdown to Zero Day
  • Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
  • We Are Anonymous
  • Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
  • Social Engineering: The Art of Human Hacking
  • Spam Nation
  • The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Take a plunge into the world of hacking, exploits, and cybersecurity with these recommended reads this summer.

Read More Read Less

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Author: Kevin Mitnick

In this book, former most-wanted hacker and now security consultant Kevin Mitnick takes us on a journey using real-life examples of how your data is collected -- and how to fight back. From staying invisible online to keeping your accounts safe, Mitnick offers a variety of tactics to keep your privacy intact.

Published: May 10, 2017 -- 08:00 GMT (01:00 PDT)

Caption by: Charlie Osborne

13 of 13 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Charlie Osborne

By Charlie Osborne | May 10, 2017 -- 08:00 GMT (01:00 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

  • YubiKey 5Ci Clear Limited Edition

    Transparency in security.

  • Certo AntiSpy iPhone Spyware Detection

    Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion. ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums