The May 2014 revision of the Joint Special Operations University reading list

(source) Cybersecurity.

This revision

Book cover for Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization

Book cover for America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare

Book cover for The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Book cover for Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses

Book cover for The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

Book cover for Cyber Adversary Characterization: Auditing the Hacker Mind

Book cover for Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Book cover for Cyberpower and National Security

Book cover for Cyber War: The Next Threat to National Security and What to Do About It

Book cover for Defeating Adversary Network Intelligence Efforts with Active Cyber Defense Techniques

Book cover for The Defense of Hill 781

Book cover for Design and analysis of knowledge-base centric insider threat models.

Book cover for Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

Book cover for Ghost Fleet: A Novel of the Next World War

Book cover for Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Book cover for The Grey Line: Modern Corporate Espionage and Counterintelligence

Book cover for Hacking Exposed 7: Network Security Secrets and Solutions

Book cover for Inside Cyber Warfare: Mapping the Cyber Underworld

Book cover for Little Brother

Book cover for Managing the Insider Threat: No Dark Corners

Book cover for Newton's Telecom Dictionary: Telecommunications, Networking, Information Technologies, The Internet, Wired, Wireless, Satellites and Fiber

Book cover for Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security

Book cover for Reverse Deception: Organized Cyber Threat Counter-Exploitation

Book cover for Sams Teach Yourself Networking in 24 Hours

Book cover for Secrets and Lies: Digital Security in a Networked World

Book cover for The Singularity Is Near: When Humans Transcend Biology

Book cover for Snow Crash

Book cover for Wired for War: The Robotics Revolution and Conflict in the 21st Century