This year, the world has witnessed one of the common attacks of cybersecurity — data breaching. According to reports, data breaches have run at a record pace in 2019. There were over 3,800 publicly-disclosed breaches and 4.1 billion exposed records in just the first half of 2019. Understanding cybersecurity has become a must for all of us nowadays. In one of our articles, we discussed the steps for how to start a career in cybersecurity.
In this article, we list down 10 interesting books on cybersecurity one must read in 2020.
(The books are listed according to their year of publishing, starting from the latest)
1| Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Rating: 5 out of 5 (Amazon.in)
Authors: Jennifer Jin and Marcus J Carey.
About: This book is for everyone who joined the cybersecurity industry, considering consulting, working in corporate, etc. One can learn the qualities and credentials to advance in the cybersecurity field, understand how social media and the Internet of Things have changed cybersecurity and other such.
2| The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime
Rating: 4.4 out of 5 (Goodreads)
Author: Scott Augenbaum
About: The Secret to Cybersecurity written by Scott Augenbaum, a 29-year veteran of the FBI who specialized in cybercrimes uses real-life examples to educate and inform readers explaining various scams, methods and other ways of cyber crimes and how cybercriminals operate.
3| Cybersecurity Blue Team Toolkit
Rating: 4.5 out of 5 (Amazon.in)
Author: Nadean H. Tanner
About: Cybersecurity Blue Team Toolkit is a practical handbook on cybersecurity which helps in understanding the best practices and tools available to both cybersecurity management and hands-on professionals. The book covers the topics as security assessment and configuration, strategies for protection and defence, offensive measures, and remediation while aligning the concept with the right tool using the CIS Controls.
4| Cybersecurity: Attack and Defense Strategies
Rating: 4 out of 5 (Amazon.in)
Author: Yuri Diogenes Erdal Ozkaya
About: This book basically starts with the initial incident response process and then it moves to the red team techniques. One can learn the basic syntax for the Windows and Linux tools as well as hands-on experience of using red team techniques with tools like Python and PowerShell, how to compromise a system, hack a user’s identity, tools used by the red team etc.
5| The Hacker Playbook 3
Rating: 4.3 out of 5 (Goodreads)
Author: Peter Kim
About: This is the third iteration of The Hacker Playbook (THP) series. The book discusses new and interesting vulnerabilities and attacks such as abusing active directory, abusing Kerberos, cloud vulnerabilities, lateral movement attacks, multiple custom labs, physical attacks, PowerShell attacks and much more.
6| Cybersecurity Essentials
Rating: 4.3 out of 5 (Amazon.in)
Authors: Charles J. Brooks, Christopher Grow, Philip Craig, and Donald Short.
About: This book provides a comprehensive introduction as well as an expert coverage of essential topics required for entry-level cybersecurity certifications. One can learn about securing the infrastructure, securing devices, local networks and perimeter through the instances of real-world scenarios.
7| Dark Territory: The Secret History of Cyber War
Rating: 4.2 out of 5 (Amazon.in)
Author: Fred Kaplan
About: This book is a history of the US government efforts in order to manage the national security from the open global communications network established by the World Wide Web. It covers inner findings of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the “information warfare” squads of the military services, and the national security debates in the White House to reveal the details of the officers, policymakers, scientists, and spies who devised a new form of cybersecurity warfare.
8| Blue Team Field Manual (BTFM)
Rating: 5 out of 5 (Amazon.in)
Authors: Alan White and Ben Clark
About: Blue Team Field Manual (BTFM) is a cybersecurity incident response guide which aligns with the NIST cybersecurity framework which consists of five core functions to identify, protect, detect, respond, and recover. The book provides steps to follow and commands to use while preparing for, working through and recovering from a cybersecurity incident.
9| Ghost In The Wires: My Adventures as the World’s Most Wanted Hacker
Rating: 4.1 out of 5 (Amazon.in)
Authors: Kevin Mitnick and Steve Wozniak
About: This book is a thrilling memory of the world’s most wanted computer hacker, Kevin Mitnick who is keen to codes and even managed to rob a bank. This book is filled with lots of stories such as breaking into corporate computers, having accessed credit card numbers, stealing software, and much more.
10| Hacked Again
Rating: 4.8 out of 5 (Amazon.in)
Author: Scott N. Schober
About: This book explains the struggles to understand the motives and mayhem behind being hacked. The writer shares tips and best practices for all consumers to prevent data breaching and securing systems.
Subscribe to our NewsletterGet the latest updates and relevant offers by sharing your email.
What's Your Reaction?
A Technical Journalist who loves writing about Machine Learning and Artificial Intelligence. A lover of music, writing and learning something out of the box. Contact: email@example.com