Security Readings and Films list
“The Lives of Others,” by F. Henckel von Donnersmarck
The 2007 Oscar winner of Best Foreign Language Film of the Year, this film tells the story of a secret police agent in East Berlin in 1984 who surveils a writer and becomes increasingly absorbed his life.
“The Conversation,” by Francis Ford Coppola
A classic 1974 film psychological thriller starring Gene Hackman that revolves around surveillance. It is more relevant today than when it debuted.
“Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door,” by Brian Krebs.
In Spam Nation, investigative journalist Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies-and countless viruses, phishing, and spyware attacks-he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.
“Beyond Fear: Thinking Sensibly About Security in an Uncertain World,” by Bruce Schneier.
This book is about national security, terrorism, and how to think sensibly about whether security measures are worth the cost to society
“Data and Goliath: The Hidden Battles to Collect your Data and Control your World,” by Bruce Schneier.
Great book about the threats of surveillance to society, and what we can do about it. After reading the book, you probably won’t view surveillance the same way again.
“Liars and Outliers: Enabling the Trust that Society Needs to Thrive,” by Bruce Schneier.
Interesting book about how security enables trust that society needs to function.
“Secrets and Lies: Digital Security in a Networked World,” by Bruce Schneier.
Excellent overview of information security, from cryptography to authentication to the human factor
“Social Engineering: The Art of Human Hacking,” by Christopher Hadnagy.
Another well-regarded book on social engineering, from the organization that operates the Social Engineer Village at DEF CON.
“The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage,” by Cliff Stoll.
Classic security novel – the true story of how a network admin got caught up in global computer espionage using network security monitoring. Reads like a thriller.
“Nothing to Hide: The False Tradeoff Between Privacy and Security,” by Daniel Solove.
A book that debunks the most common attack to privacy arguments.
“Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks,” by Deviant Ollam.
Another great and accessible book on more advanced lock-picking by Deviant Ollam.
“Practical Lock Picking, Second Edition: A Physical Penetration Tester’s Training Guide,” by Deviant Ollam.
The best book available to learn lock-picking.
“Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance,” by Julia Angwin.
Award-winning journalist Julia Angwin reports from the front lines of America’s surveillance economy, offering a revelatory and unsettling look at how the government, private companies, and even criminals use technology to indiscriminately sweep up vast amounts of our personal data.
“The Art of Deception: Controlling the Human Element of Security,” by Kevin Mitnick.
In-depth discussion of the techniques of social engineering and how to educate your organization to be less susceptible to these attacks.
“Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker,” by Kevin Mitnick.
Autobiography of Kevin Mitnick, famed computer hacker and social engineer. In addition to being a very entertaining and fascinating read, you’ll learn a lot about social engineering techniques from the accounts of his experiences.
“Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground,” by Kevin Poulsen.
“Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon,” by Kim Zetter.
Interesting and compelling read about the discovery of Stuxnet and how it changed the world.
“The Practice of Network Security Monitoring,” by Richard Beljtlich.
Excellent book on the principles of NSM and how to get started with Security Onion.
“The Code Book,” by Simon Singh.
This is a very interesting and gripping book about the history and intrigue of cryptography and cryptanalysis.
“Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age,” by Steven Levy.
A very engaging look at the modern history of cryptography, including the development of DES, RSA, and PGP. Also, it describes the fight in the 1990’s to legalize the use of strong cryptography.
This page is based on content created by Dr. Anthony Vance.