Source: https://icdt.osu.edu/cybercanon/bookreviews

YearTitleAuthor(s)/EditorHall of Fame Induction
1989The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer EspionageClifford Stoll2020
1992Snow CrashNeal Stephenson2021
1999Hacking ExposedStuart McClure, Joel Scambray, and George Kurtz2017
1999The Cathedral & the BazaarEric S. Raymond2020
2000Secrets and Lies: Digital Security in a Networked WorldBruce Schneier2017
2001Crypto: How the Code Rebels Beat the Government…Steven Levy2020
2005Worm: The First Digital World WarMark Bowden2021
2007Measuring and Managing Information Risk: A FAIR ApproachJack A. Jones2017
2007Metasploit: The Penetration Tester’s GuideDavid Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni2021
2008The CERT Guide to Insider ThreatsDawn Cappelli, Andrew Moore, and Randall Trzeciak2017
2010Cyber War: The Next Threat to National Security & What to Do About ItRichard A. Clarke2021
2010Zero DayMark Russinovich2017
2011Cyber Warfare: Truth, Tactics, and StrategiesEdward Hunton2020
2011ReamdeNeal Stephenson2021
2011Security Metrics: A Beginner’s GuideCaroline Wong2021
2012Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious SoftwareMichael Sikorski and Andrew Honig2020
2013Tallinn Manual on the International Law Applicable to Cyber Warfareedited by Michael N. Schmitt2017
2013The Practice of Network Security Monitoring: Understanding Incident Detection and ResponseRichard Bejtlich2017
2014Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital WeaponKim Zetter2021
2014How to Measure Anything in Cybersecurity RiskDouglas W. Hubbard and Richard Seiersen2017
2014Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime UndergroundKevin Poulsen2021
2014Spam NationBrian Krebs2017
2014The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business WinGene Kim, Kevin Behr, and George Spafford2021
2014We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber InsurgencyParmy Olson2021
2015Data and Goliath: The Hidden Battles to Collect Your Data and Control Your WorldBruce Schneier2021
2015Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About ItMarc Goodman2017
2015Superforecasting: The Art and Science of PredictionPhilip E. Tetlock and Dan Gardner2022
2016Site Reliability Engineering: How Google Runs Production SystemsBetsy Beyer, Chris Jones, Jennifer Petoff, and Niall Richard Murphy2019
2016Winning as a CISO: How to Earn a Seat at the Business Table and Become a True LeaderRichard Stiennon2017
2017The Perfect Weapon: War, Sabotage, and Fear in the Cyber AgeDavid E. Sanger2019
2017Zero Trust Networks: Building Secure Systems in Untrusted NetworksEvan Gilman and Doug Barth2020
2018LikeWar: The Weaponization of Social MediaP.W. Singer and Emerson T. Brooking2021
2019Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the WorldJoseph Menn2019
2019Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous HackersAndy Greenberg2020
2019Security Engineering: A Guide to Building Dependable Distributed Systems (v.3)Ross Anderson2020
2020American Spies: Modern Surveillance, Why You Should Care, and What to Do About ItJennifer Granick2020
2020Click Here to Kill Everybody: Security and Survival in a Hyper-connected WorldBruce Schneier2020
2020Code Girls: The Untold Story of the American Women Code Breakers of World War IILiza Mundy2020
2020The CISO Compass: Navigating Cybersecurity Leadership Challenges with Insights from PioneersStephen Katz2020
2020CISO Desk Reference Guide: A Practical Guide for CISOs (Volume 1)Bill Bonney, Gary Hayslip, Matt Stamper2020
2020The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber ThreatsRichard A. Clarke2020
2020Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure BehaviorsPerry Carpenter2020
2020The Hacker and the State: Cyber Attacks and the New Normal of GeopoliticsBen Buchanan2022
2021@War: The Rise of the Military-Internet ComplexShane Harris2021
2021A Venerable System: The History of Information Security in the Computer AgeAndrew Stewart2021
2021CISO Desk Reference Guide: A Practical Guide for CISOs (Volume 2)Bill Bonney, Gary Hayslip, Matt Stamper2021
2021This Is How They Tell Me the World Ends: The Cyberweapons Arms RaceNicole Perlroth2022
2022Tracers in the Dark: The Global Hunt for the Crime Lords of CryptocurrencyAndy Greenberg2023