Top 10 Books On Cybersecurity You Must Read In 2020

This year, the world has witnessed one of the common attacks of cybersecurity — data breaching. According to reports, data breaches have run at a record pace in 2019. There were over 3,800 publicly-disclosed breaches and 4.1 billion exposed records in just the first half of 2019. Understanding cybersecurity has become a must for all of us nowadays. In one of our articles, we discussed the steps for how to start a career in cybersecurity.

In this article, we list down 10 interesting books on cybersecurity one must read in 2020.


Sign up for your weekly dose of what's up in emerging technology.

(The books are listed according to their year of publishing, starting from the latest)

1| Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World 

Published: 2019 

Rating: 5 out of 5 (

Authors: Jennifer Jin and Marcus J Carey.

About: This book is for everyone who joined the cybersecurity industry, considering consulting, working in corporate, etc. One can learn the qualities and credentials to advance in the cybersecurity field, understand how social media and the Internet of Things have changed cybersecurity and other such.

Buy here

2| The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime

Published: 2019

Rating: 4.4 out of 5 (Goodreads)

Author: Scott Augenbaum

About: The Secret to Cybersecurity written by Scott Augenbaum, a 29-year veteran of the FBI who specialized in cybercrimes uses real-life examples to educate and inform readers explaining various scams, methods and other ways of cyber crimes and how cybercriminals operate.

Buy here.

3| Cybersecurity Blue Team Toolkit

Published: 2019

Rating: 4.5 out of 5 (

Author: Nadean H. Tanner

About: Cybersecurity Blue Team Toolkit is a practical handbook on cybersecurity which helps in understanding the best practices and tools available to both cybersecurity management and hands-on professionals. The book covers the topics as security assessment and configuration, strategies for protection and defence, offensive measures, and remediation while aligning the concept with the right tool using the CIS Controls.

Buy here.

4| Cybersecurity: Attack and Defense Strategies

Published: 2018

Rating: 4 out of 5 (

Author: Yuri Diogenes Erdal Ozkaya 

About: This book basically starts with the initial incident response process and then it moves to the red team techniques. One can learn the basic syntax for the Windows and Linux tools as well as hands-on experience of using red team techniques with tools like Python and PowerShell, how to compromise a system, hack a user’s identity, tools used by the red team etc.  

Buy here.

5| The Hacker Playbook 3

Published: 2018

Rating: 4.3 out of 5 (Goodreads)

Author: Peter Kim

About: This is the third iteration of The Hacker Playbook (THP) series. The book discusses new and interesting vulnerabilities and attacks such as abusing active directory, abusing Kerberos, cloud vulnerabilities, lateral movement attacks, multiple custom labs, physical attacks, PowerShell attacks and much more.

Read here.

6| Cybersecurity Essentials

Published: 2018

Rating: 4.3 out of 5 ( 

Authors: Charles J. Brooks, Christopher Grow, Philip Craig, and Donald Short.

About: This book provides a comprehensive introduction as well as an expert coverage of essential topics required for entry-level cybersecurity certifications. One can learn about securing the infrastructure, securing devices, local networks and perimeter through the instances of real-world scenarios. 

Buy here.

7| Dark Territory: The Secret History of Cyber War

Published: 2017 

Rating: 4.2 out of 5 (

Author: Fred Kaplan

About: This book is a history of the US government efforts in order to manage the national security from the open global communications network established by the World Wide Web. It covers inner findings of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the “information warfare” squads of the military services, and the national security debates in the White House to reveal the details of the officers, policymakers, scientists, and spies who devised a new form of cybersecurity warfare. 

Buy here.

8| Blue Team Field Manual (BTFM)

Published: 2017

Rating: 5 out of 5 (

Authors: Alan White and Ben Clark

About: Blue Team Field Manual (BTFM) is a cybersecurity incident response guide which aligns with the NIST cybersecurity framework which consists of five core functions to identify, protect, detect, respond, and recover. The book provides steps to follow and commands to use while preparing for, working through and recovering from a cybersecurity incident.  

Buy here.

9| Ghost In The Wires: My Adventures as the World’s Most Wanted Hacker

Published: 2017 

Rating: 4.1 out of 5 (

Authors: Kevin Mitnick and Steve Wozniak  

About: This book is a thrilling memory of the world’s most wanted computer hacker, Kevin Mitnick who is keen to codes and even managed to rob a bank. This book is filled with lots of stories such as breaking into corporate computers, having accessed credit card numbers, stealing software, and much more. 

Read here.

10| Hacked Again

Published: 2016 

Rating: 4.8 out of 5 ( 

Author: Scott N. Schober

About: This book explains the struggles to understand the motives and mayhem behind being hacked. The writer shares tips and best practices for all consumers to prevent data breaching and securing systems. 

Buy here.

More Great AIM Stories

Ambika Choudhury
A Technical Journalist who loves writing about Machine Learning and Artificial Intelligence. A lover of music, writing and learning something out of the box.

Our Upcoming Events

Masterclass, Virtual
How to achieve real-time AI inference on your CPU
7th Jul

Conference, in-person (Bangalore)
Cypher 2022
21-23rd Sep

Conference, Virtual
Deep Learning DevCon 2022
29th Oct

3 Ways to Join our Community

Discord Server

Stay Connected with a larger ecosystem of data science and ML Professionals

Telegram Channel

Discover special offers, top stories, upcoming events, and more.

Subscribe to our newsletter

Get the latest updates from AIM