Source: https://icdt.osu.edu/cybercanon/bookreviews
Year | Title | Author(s)/Editor | Hall of Fame Induction |
---|---|---|---|
1989 | The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage | Clifford Stoll | 2020 |
1992 | Snow Crash | Neal Stephenson | 2021 |
1999 | Hacking Exposed | Stuart McClure, Joel Scambray, and George Kurtz | 2017 |
1999 | The Cathedral & the Bazaar | Eric S. Raymond | 2020 |
2000 | Secrets and Lies: Digital Security in a Networked World | Bruce Schneier | 2017 |
2001 | Crypto: How the Code Rebels Beat the Government… | Steven Levy | 2020 |
2005 | Worm: The First Digital World War | Mark Bowden | 2021 |
2007 | Measuring and Managing Information Risk: A FAIR Approach | Jack A. Jones | 2017 |
2007 | Metasploit: The Penetration Tester’s Guide | David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni | 2021 |
2008 | The CERT Guide to Insider Threats | Dawn Cappelli, Andrew Moore, and Randall Trzeciak | 2017 |
2010 | Cyber War: The Next Threat to National Security & What to Do About It | Richard A. Clarke | 2021 |
2010 | Zero Day | Mark Russinovich | 2017 |
2011 | Cyber Warfare: Truth, Tactics, and Strategies | Edward Hunton | 2020 |
2011 | Reamde | Neal Stephenson | 2021 |
2011 | Security Metrics: A Beginner’s Guide | Caroline Wong | 2021 |
2012 | Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software | Michael Sikorski and Andrew Honig | 2020 |
2013 | Tallinn Manual on the International Law Applicable to Cyber Warfare | edited by Michael N. Schmitt | 2017 |
2013 | The Practice of Network Security Monitoring: Understanding Incident Detection and Response | Richard Bejtlich | 2017 |
2014 | Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon | Kim Zetter | 2021 |
2014 | How to Measure Anything in Cybersecurity Risk | Douglas W. Hubbard and Richard Seiersen | 2017 |
2014 | Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground | Kevin Poulsen | 2021 |
2014 | Spam Nation | Brian Krebs | 2017 |
2014 | The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win | Gene Kim, Kevin Behr, and George Spafford | 2021 |
2014 | We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency | Parmy Olson | 2021 |
2015 | Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World | Bruce Schneier | 2021 |
2015 | Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It | Marc Goodman | 2017 |
2015 | Superforecasting: The Art and Science of Prediction | Philip E. Tetlock and Dan Gardner | 2022 |
2016 | Site Reliability Engineering: How Google Runs Production Systems | Betsy Beyer, Chris Jones, Jennifer Petoff, and Niall Richard Murphy | 2019 |
2016 | Winning as a CISO: How to Earn a Seat at the Business Table and Become a True Leader | Richard Stiennon | 2017 |
2017 | The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age | David E. Sanger | 2019 |
2017 | Zero Trust Networks: Building Secure Systems in Untrusted Networks | Evan Gilman and Doug Barth | 2020 |
2018 | LikeWar: The Weaponization of Social Media | P.W. Singer and Emerson T. Brooking | 2021 |
2019 | Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World | Joseph Menn | 2019 |
2019 | Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers | Andy Greenberg | 2020 |
2019 | Security Engineering: A Guide to Building Dependable Distributed Systems (v.3) | Ross Anderson | 2020 |
2020 | American Spies: Modern Surveillance, Why You Should Care, and What to Do About It | Jennifer Granick | 2020 |
2020 | Click Here to Kill Everybody: Security and Survival in a Hyper-connected World | Bruce Schneier | 2020 |
2020 | Code Girls: The Untold Story of the American Women Code Breakers of World War II | Liza Mundy | 2020 |
2020 | The CISO Compass: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers | Stephen Katz | 2020 |
2020 | CISO Desk Reference Guide: A Practical Guide for CISOs (Volume 1) | Bill Bonney, Gary Hayslip, Matt Stamper | 2020 |
2020 | The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats | Richard A. Clarke | 2020 |
2020 | Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors | Perry Carpenter | 2020 |
2020 | The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics | Ben Buchanan | 2022 |
2021 | @War: The Rise of the Military-Internet Complex | Shane Harris | 2021 |
2021 | A Venerable System: The History of Information Security in the Computer Age | Andrew Stewart | 2021 |
2021 | CISO Desk Reference Guide: A Practical Guide for CISOs (Volume 2) | Bill Bonney, Gary Hayslip, Matt Stamper | 2021 |
2021 | This Is How They Tell Me the World Ends: The Cyberweapons Arms Race | Nicole Perlroth | 2022 |
2022 | Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency | Andy Greenberg | 2023 |