Further Reading

Michael Nizich (New York Institute of Technology, USA)

The Cybersecurity Workforce of Tomorrow

ISBN: 978-1-80382-918-0, eISBN: 978-1-80382-915-9

Publication date: 31 July 2023

Citation

Nizich, M. (2023), "Further Reading", The Cybersecurity Workforce of Tomorrow (The Future of Work), Emerald Group Publishing Limited, Leeds, pp. 147-158. https://doi.org/10.1108/978-1-80382-915-920231012

Publisher

:

Emerald Group Publishing Limited

Copyright © 2023 Michael Nizich. Published under exclusive licence by Emerald Publishing Limited


Recommended Cybersecurity Reads for Students, Professionals, and Job Seekers

The Cuckoo's Egg – Clifford Stoll

Often cited as one of the best cybersecurity reads, this 1989 tale depicts Clifford's extensive investigation into a notable cyber-alert.

The Cybersecurity Playbook – Allison Cerra

This is a step-by-step guide to protecting your organization from unknown threats and adopting good security habits for everyday business situations.

Python Crash Course, 2nd Edition – Eric Matthes

The top seller, according to No Starch Press, is this “hands-on, project-based introduction” to the core of Python programming.

Cyber War: The Next Threat to National Security and What to Do about It – Richard A. Clarke and Robert K. Knake

This is the most heavily-reviewed cybersecurity book on Amazon with more than 240 ratings. In this book, Clarke and Knake trace the rise of the cyber-age and profile the characters involved.

Ghost In The Wires: My Adventures as the World's Most Wanted Hacker – Kevin Mitnick and William Simon

Acting as a biography of Mitnick's rise to infamy, this book depicts how he began his career of social engineering and code-cracking.

Cyber Wars – Charles Arthur

Former technology editor at The Guardian, Arthur's story of “game changing hacks that make organizations around the world tremble” was the second most-read on Perlego's cybersecurity list.

Automate the Boring Stuff with Python, 2nd Edition – Al Sweigart

The second most-read title on No Starch Press' cybersecurity list is another Python guide which promises to show the reader how to use Python to write programs in minutes with no prior programming experience required.

Secrets & Lies: Digital Security in a Networked World – Bruce Schneier

Schneier is a prolific writer and many recommendations were made for this 2000 title looking at the state of cybersecurity as we entered the new millennium.

Social Engineering – Christopher Hadnagy

Another with high Amazon ratings and recommended on Twitter, this 2010 book is widely recognized as the first to reveal the concept of social engineering.

Countdown to Zero Day – Kim Zetter

This book tells the tale of Stuxnet and the story of cyber-espionage involving the United States, Israel, and an Iranian nuclear facility.

The Code Book – The Science of Secrecy from Ancient Egypt to Quantum Cryptography by Simon Singh is a journey through time to look at the history of cryptography.

Ghosts in the Wires – My Adventures as the World's Most Wanted Hacker by Kevin Mitnick and William L. Simon (forward by Steve Wozniak) provides Mitnick's firsthand account of hacking.

Hacking: A Beginners' Guide To Computer Hacking, Basic Security, and Penetration Testing – by John Slavio is a practical handbook for people of all skill levels.

Hacking: The Art of Exploitation – by John Erickson explores how hacking techniques actually work.

Social Engineering: The Science of Human Hacking – by Christopher J. Hadnagy focuses on the motivations for hacking to help thwart future cybersecurity threats.

Permanent Record by Edward Snowden.

Countdown to Zero Day Stuxnet and the Launch of the World's First Digital Weapon by Kim Zetter.

Dark Territory The Secret History of Cyber War by Fred Kaplan.

Comptia Security + Get Certified Get Ahead Sy0-501 Study Guide by Darril Gibson.

The Art of Invisibility. The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data by Kevin Mitnick.

Ghost in the Wires. My Adventures as the World's Most Wanted Hacker by Kevin Mitnick, Steve Wozniak, William L. Simon.

The Cuckoo's Egg by Clifford Stoll.

Snow Crash by Neal Stephenson.

Sandworm. A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers by Andy Greenberg.

Hacking The Art of Exploitation by Jon Erickson.

Kingpin. How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen.

Future Crimes Everything Is Connected, Everyone Is Vulnerable, and What We Can Do About It by Marc Goodman.

The Code Book. The Science of Secrecy from Ancient Egypt to Quantum Cryptography by Simon Singh.

Spam Nation. The Inside Story of Organized Cybercrime-From Global Epidemic to Your Front Door by Brian Krebs.

Cyberwar. The Next Threat to National Security & What to Do About It by Richard A. Clarke, Robert Knake.

Practical Malware Analysis. The Hands-On Guide to Dissecting Malicious Software by Michael Sikorski.

The Perfect Weapon. War, Sabotage, and Fear in the Cyber Age by David E. Sanger.

Cybersecurity and Cyberwar. What Everyone Needs to Know by P.W. Singer and Allan Friedman.

Data and Goliath. The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier.

The Art of Deception. Controlling the Human Element of Security by Kevin D. Mitnick.

American Kingpin. The Epic Hunt for the Criminal Mastermind Behind the Silk Road by Nick Bilton.

Cryptonomicon by Neal Stephenson.

Red Team Field Manual (RTFM) by Ben Clark.

The Web Application Hacker's Handbook Finding and Exploiting Security Flaws by Dafydd Stuttard.

Social Engineering. The Science of Human Hacking by Hadnagy.

The Art of Intrusion. The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers by Kevin D. Mitnick, William L. Simon.

Tribe of Hackers. Cybersecurity Advice from the Best Hackers in the World by Marcus J Carey, Jennifer Jin.

The Hacker Playbook 2. Practical Guide To Penetration Testing by Peter Kim.

The Phoenix Project. A Novel About IT, DevOps, and Helping Your Business Win by Gene Kim, Kevin Behr, George Spafford.

No Place to Hide. Edward Snowden, the NSA, and the US Surveillance State by Glenn Greenwald.

The Innovators. How a Group of Hackers, Geniuses and Geeks Created the Digital Revolution by Walter Isaacson.

We Are Anonymous. Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency by Parmy Olson.

Security Engineering. A Guide to Building Dependable Distributed Systems 2ed by Ross J. Anderson.

The Hacker Playbook 3. Practical Guide to Penetration Testing by Peter Kim.

Secrets and Lies. Digital Security in a Networked World by Bruce Schneier.

Black Hat Python. Python Programming for Hackers and Pentesters by Justin Seitz.

Click Here to Kill Everybody. Security and Survival in a Hyper-connected World by Bruce Schneier.

Applied Cryptography. Protocols, Algorithms, and Source Code in C by Bruce Schneier.

Mindf*ck. Cambridge Analytica and the Plot to Break America by Christopher Wylie.

The Age of Surveillance Capitalism. The Fight for a Human Future at the New Frontier of Power by Shoshana Zuboff.

Open Source Intelligence Techniques. Resources for Searching and Analyzing Online Information by Michael Bazzell.

Penetration Testing. A Hands-On Introduction to Hacking by Georgia Weidman.

The First Digital World War by Mark Bowden.

Cracking the Coding Interview. 189 Programming Questions and Solutions by Gayle Laakmann McDowell.

Lights Out: A Cyberattack: A Nation Unprepared. Surviving the Aftermath by Ted Koppel.

Hackers. Heroes of the Computer Revolution by Steven Levy.

Blue Team Field Manual (BTFM) by Alan J White.

Nmap Network Scanning. The Official Nmap Project Guide to Network Discovery and Security Scanning by Gordon Fyodor Lyon.

The Hacker Playbook. Practical Guide To Penetration Testing by Peter Ki.

@War. The Rise of the Military-Internet Complex by Shane Harris.

Malware Analyst's Cookbook and DVD. Tools and Techniques for Fighting Malicious Code by Michael Ligh, Steven Adair, Blake Hartstein, and Matthew Richard.

Metasploit. The Penetration Tester's Guide by David Kennedy, Jim O'Gorman, Devon Kearns, Mati Aharoni.

Threat Modeling Designing for Security by Adam Shostac.

Crypto. How the Code Rebels Beat the Government–Saving Privacy in the Digital Age by Steven Levy.

Automate the Boring Stuff with Python. Practical Programming for Total Beginners by Al Sweigart.

Gray Hat Hacking. The Ethical Hacker's Handbook by Allen Harper, Daniel Regalado et al.

Python Crash Course, 2nd Edition. A Hands-On, Project-Based Introduction to Programming by Eric Matthes.

Hacker, Hoaxer, Whistleblower, Spy. The Many Faces of Anonymous by Gabriella Coleman.

The Ultimate Unofficial Encyclopedia for Minecrafters. An A–Z Book of Tips and Tricks the Official Guides Don't Teach You by Megan Miller.

The Industries of the Future by Alec Ross.

The Basics of Hacking and Penetration Testing. Ethical Hacking and Penetration Testing Made Easy by Patrick Engebretson.

Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity by Dr. Erdal Ozkaya.

Cryptography Engineering. Design Principles and Practical Applications by Niels Ferguson, Bruce Schneier et al.

Windows Internals, Part 1 User Mode by Pavel Yosifovich, Mark E. Russinovich et al.

Comptia Network + Certification All-In-One Exam Guide, Seventh Edition (Exam N10-007) by Mike Meyers.

The Practice of Network Security Monitoring. Understanding Incident Detection and Response by Richard Bejtlich.

Wtf Is My Password. Password Book, Password Log Book and Internet Password Organizer, Alphabetical Password Book, Logbook to Protect Usernames and Passwords, Password Notebook, Password Book Small 6 × 9 by Booki Nova.

Minecraft. Guide to Creation by Mojang Ab.

The Hacked World Order. How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age by Adam Segal.

This Machine Kills Secrets. How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information by Andy Greenberg.

The Art of Memory Forensics. Detecting Malware and Threats in Windows, Linux, and Mac Memory by Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters.

The IDA Pro Book. The Unofficial Guide to the World's Most Popular Disassembler by Chris Eagle 74.

The Fifth Domain. Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats by Richard A. Clarke, Robert K. Knake.

Blue Team Handbook: Incident Response Edition. A condensed field guide for the Cyber Security Incident Responder by Don Murdoch GSE.

The Cybersecurity Dilemma. Network Intrusions, Trust, and Fear in the International System by Ben Buchanan.

The Hardware Hacker. Adventures in Making and Breaking Hardware by Andrew Bunnie Huang.

The Dark Net. Inside the Digital Underworld by Jamie Bartlett.

Violent Python. A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by TJ O'Connor.

Cybersecurity Essentials by Charles J. Brooks, Christopher Grow et al.

Dark Mirror. Edward Snowden and the American Surveillance State by Barton Gellman.

CISSP All-in-One Exam Guide by Shon Harris.

How to Measure Anything in Cybersecurity Risk by Douglas W. Hubbard, Richard Seiersen, Daniel E. Geer Jr., Stuart McClure.

Password book: A Premium Journal and Logbook to Protect Usernames and Passwords Modern Password Keeper, Vault, Notebook and Online Organizer with … Calligraphy and Hand Lettering Design by Lettering Design Co.

Hacked Again by Scott N. Schober.

The Shellcoder's Handbook. Discovering and Exploiting Security Holes by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte.

Cybersecurity for Beginners by Raef Meeuwisse.

Cryptography Apocalypse. Preparing for the Day When Quantum Computing Breaks Today's Crypto by Roger A. Grimes.

Extreme Privacy. What It Takes to Disappear in America by Michael Bazzell.

Gray Day. My Undercover Mission to Expose America's First Cyber Spy by Eric O'Neill.

Minecraft. Guide to the Nether & the End by Mojang Ab.

Minecraft. Guide to Redstone by Mojang Ab.

McMafia. A Journey Through the Global Criminal Underworld by Misha Glenny.

CCNA 200-301 Official Cert Guide, Volume 1 by Wendell Odom.

(isc)2 Cissp Certified Information Systems Security Professional Official Study Guide, 8e & Cissp Official (Isc)2 Practice Tests, 2e by Mike Chapple.

Secrets of Reverse Engineering by Eldad Eilam.

Linux Basics for Hackers. Getting Started with Networking, Scripting, and Security in Kali by OccupyTheWeb.

Confront and Conceal. Obama's Secret Wars and Surprising Use of American Power by David E. Sange.

(isc)2 Cissp Certified Information Systems Security Professional Official Study Guide by Mike Chapple.

Cryptoconomy by Gary Miliefsky.

Resources for HR Departments and Cybersecurity Job Seekers

https://infosec-jobs.com/

Find awesome jobs and talents in InfoSec/Cybersecurity

https://www.cyberseek.org/

Close the cybersecurity talent gap with interactive tools and data

https://cybersecjobs.com/

Information security jobs and career advice for cleared cybersecurity professionals

https://cybersn.com/

Your match awaits: The Cybersecurity Career Hub, matching talent to opportunity.

https://ninjajobs.org/

Trusted by the Top Brands: NinjaJobs has filled thousands of cybersecurity roles across numerous industries and well-known brands.

https://www.sans.org/hire-cyber-talent/

Hire Cyber Talent: Hire the right talent for the cyber roles on your team

https://www.cisa.gov/cyberjobs

Cybersecurity & IT Jobs at CISA: As technology becomes increasingly more sophisticated, the demand for an experienced and qualified cyber workforce to protect our Nation's networks and information systems has never been greater. Are you up for the challenge?

https://www.cybercom.mil/Employment-Opportunities/

We enable our most valuable assets – our people – in order to gain advantages in cyberspace

https://www.quitch.com/

Increase employee engagement and identify skill gaps in online learning and training instantly. As every moment your employee spends on training is time away from their jobs, gamifying training processes can help you reduce training costs.

https://www.shrm.org/resourcesandtools/pages/cybersecurity.aspx

With cyberthreats growing in sophistication, corporate digital security requires a real team effort. Employers can tap these resources for help improving their cybersecurity efforts in the workplace.

https://www.sans.org/blog/hr-cybersecurity/

SANS institute is committed to helping close the gap for top cybersecurity talent. Beyond training and certification, this gap also includes Human Resources and emerging talent learning how to enter the field successfully.

https://www.nist.gov/system/files/documents/2020/10/30/HR%20One%20Pager%20Final.pdf

Success Strategies for Cybersecurity Hiring for Human Resources and Hiring Professionals

https://www.isc2.org/#

(ISC)2: The World's Leading Cybersecurity Professional Organization

https://www.humanresourcestoday.com/cyber-security/

Cybersecurity or computer security and information security is the act of preventing theft, damage, loss, or unauthorized access to computers, networks, and data. Certifications for cybersecurity are hence the gateway toward pursuing this booming and unique professional space.

https://www.cybersafesolutions.com/

Cybersafe Solutions: The ultimate fusion of cutting-edge technology and human expertise.

https://isc2chapter-liny.org/

(ISC)2 Long Island

https://coppertreestaffing.com/

Coppertree Staffing: From contract employees to full-time hires, we can help you succeed

https://www.forbes.com/sites/forbestechcouncil/2020/05/01/four-ways-employers-can-find-top-cybersecurity-talent/?sh=54854b6a768c

Four Ways Employers Can Find Top Cybersecurity Talent

https://www.betterteam.com/how-to-hire-information-security-analysts

How to Hire Information Security Analysts. A guide to help you recruit top information security analysts.