(source) Cybersecurity.
This revision was published May 2014.
Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization
Eric Cole
View on Amazon.com | I've read this book
America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare
Joel Brenner
View on Amazon.com | All books by Joel Brenner | I've read this book
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
Dawn M. Cappelli
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses
Edward Skoudis
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Cliff Stoll
Cyber Adversary Characterization: Auditing the Hacker Mind
Tom Parker
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Will Gragido
Cyberpower and National Security
Franklin Kramer
Cyber War: The Next Threat to National Security and What to Do About It
Richard A. Clarke
Defeating Adversary Network Intelligence Efforts with Active Cyber Defense Techniques
Keith A. Repik
The Defense of Hill 781
James R. McDonough
Design and analysis of knowledge-base centric insider threat models.
Qutaibah Althebyan
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Joseph Menn
Ghost Fleet: A Novel of the Next World War
P. W. Singer
View on Amazon.com | All books by P. W. Singer | I've read this book
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Kevin Mitnick
The Grey Line: Modern Corporate Espionage and Counterintelligence
Andrew Brown
Hacking Exposed 7: Network Security Secrets and Solutions
Stuart McClure
Inside Cyber Warfare: Mapping the Cyber Underworld
Jeffrey Carr
Little Brother
Cory Doctorow
Managing the Insider Threat: No Dark Corners
Nick Catrantzos
Newton's Telecom Dictionary: Telecommunications, Networking, Information Technologies, The Internet, Wired, Wireless, Satellites and Fiber
Harry Newton
Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security
Gary M. Jackson
Reverse Deception: Organized Cyber Threat Counter-Exploitation
Sean Bodmer
Sams Teach Yourself Networking in 24 Hours
Uyless Black
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier
View on Amazon.com | All books by Bruce Schneier | I've read this book
The Singularity Is Near: When Humans Transcend Biology
Ray Kurzweil
Snow Crash
Neal Stephenson
Wired for War: The Robotics Revolution and Conflict in the 21st Century