0% found this document useful (0 votes)
275 views31 pages

28 Essential Cybersecurity Books You Must Own

Uploaded by

Álvaro MT
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
275 views31 pages

28 Essential Cybersecurity Books You Must Own

Uploaded by

Álvaro MT
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

28 Essential Cybersecurity

Books You Must Own

Jordan Snapper
28 Essential Cybersecurity Books

That will show you:

→ How easy it is to be hacked (despite


thinking you're secured)
→ Security challenges CISOs face daily
→ How to start a career in cybersecurity
→ What's trending in the cyber industry
→ If an organization is TRULY equipped
to handle a breach

READY?
The CISO Evolution: Business
Knowledge for Cybersecurity
Executives by Matthew K. Sharp &
Kyriakos Lambros

NEXT BOOK
Cyber for Builders: The Essential
Guide to Building a Cybersecurity
Startup by Ross Haleliuk

NEXT BOOK
Alice and Bob Learn Application
Security by Tanya Janca

NEXT BOOK
You CAN Stop Stupid: Stopping
Losses from Accidental and Malicious
Actions by Ira Winkler & Dr. Tracy
Celaya Brown

NEXT BOOK
CISO Desk Reference Guide: A
Practical Guide for CISOs by Bill
Bonney, Gary Hayslip & Matt Stamper

NEXT BOOK
Future Crimes: Inside The Digital
Underground and The Battle for Our
Connected World by Marc Goodman

NEXT BOOK
Countdown to Zero Day: Stuxnet
and the Launch of the World's First
Digital Weapon by Kim Zetter

NEXT BOOK
This Is How They Tell Me the World
Ends: The Cyberweapons Arms
Race by Nicole Perlroth

NEXT BOOK
Cybersecurity For Dummies by
Joseph Steinberg

NEXT BOOK
Threat Modeling: Designing for
Security by Adam Shostack

NEXT BOOK
The Pentester BluePrint: Starting a
Career as an Ethical Hacker by
Phillip L. Wylie & Kim Crawley

NEXT BOOK
Cybersecurity Career Master
Plan: Proven techniques and
effective tips to help you advance
in your cybersecurity career by Dr
Gerald Auger, Jaclyn Jax Scott,
Jonathan Helmus

NEXT BOOK
The DevSecOps Playbook:
Deliver Continuous Security at
Speed by Sean D. Mack

NEXT BOOK
Data and Goliath: The Hidden Battles
to Collect Your Data and Control
Your World by Bruce Schneier

NEXT BOOK
Project Zero Trust: A Story about a
Strategy for Aligning Security and
the Business by George Finney

NEXT BOOK
Effective Vulnerability Management:
Managing Risk in the Vulnerable
Digital Ecosystem by Chris Hughes &
Nikki Robinson

NEXT BOOK
Penetration Testing: A Hands-On
Introduction to Hacking by Georgia
Weidman

NEXT BOOK
Manipulated: Inside the Cyberwar to
Hijack Elections and Distort the Truth
by Theresa Payton

NEXT BOOK
Spam Nation: The Inside Story of
Organized Cybercrime - from Global
Epidemic to Your Front Door by Brian
Krebs

NEXT BOOK
Security Yearbook 2024: A History
and Directory of the IT Security
Industry by Richard Stiennon

NEXT BOOK
Security Chaos Engineering:
Sustaining Resilience in Software
and Systems by Kelly Shortridge

NEXT BOOK
The Cybersecurity Playbook for
Modern Enterprises: An end-to-end
guide to preventing data breaches
and cyber attacks by Jeremy Wittkop

NEXT BOOK
CISO COMPASS: Navigating
Cybersecurity Leadership Challenges
with Insights from Pioneers by Todd
Fitzgerald

NEXT BOOK
The Art of Attack: Attacker Mindset
for Security Professionals by Maxie
Reynolds

NEXT BOOK
Navigating the Cybersecurity
Career Path by Helen E. Patton

NEXT BOOK
If It's Smart, It's Vulnerable by Mikko
Hypponen

NEXT BOOK
Cybersecurity Risk Management:
Mastering the Fundamentals Using
the NIST Cybersecurity Framework
by Cynthia Brumfield & Brian Haugli

NEXT BOOK
Cybersecurity First Principles: A
Reboot of Strategy and Tactics by
Rick Howard

THERE’S MORE
Follow Me for More
Cybersecurity Marketing
Strategies.

100% Buzzword Free

Jordan Snapper

Ring the Bell

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy