Skip to main content
Home Straight Talk

Main navigation

  • Technology Trends
    • Cloud
    • Digital
    • Engineering
    • Sustainability
  • News
    • Latest News
    • Career Moves
  • Magazines
  • Articles
  • ST Reels
  • Tweetchats
  • Log in
  • Insights
    • Bloggers
    • Soundboard
    • Stories
    • Listicles
    • Infographics
    • Tech Wisdom
    • Image Gallery
  • Community
  1. Home
  2. Image Gallery
  3. 5 Must Read Books On Cybersecurity

5 Must Read Books On Cybersecurity

Published on 7th Jan, 2019
Digital

Share On

Print
Mail
Books On Cybersecurity
5 Must Read Books On Cybersecurity

All business leaders have to be knowledge leaders. In the fast changing world of technology and security, books still remain the best way to gain in-depth knowledge. Here are five must-read books on cybersecurity for the modern technology executive.

The Hacker Playbook 1 and 2: Practical Guide to Penetration Testing
The Hacker Playbook 1 and 2: Practical Guide to Penetration Testing

The Hacker Playbook 1 and 2: Practical Guide to Penetration Testing

By Peter Kim

Peter Kim offers insights and advice that help cybersecurity executives get into the hacker mind-set and be prepared for modern cyber threats.

Network Security through Data Analysis: Building Situational Awareness
Network Security through Data Analysis: Building Situational Awareness

Network Security through Data Analysis: Building Situational Awareness

By Michael Collins

A highly in-depth and technical book that takes you into a deep dive of data collection and organization, analysis tools, and various analytic scenarios for network administration and security .

The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage
The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage

The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage

By Clifford Stoll

This remarkable memoir tells the experiences of astronomer-turned-systems manager Clifford Stoll as an innocuous 75 cent accounting error at the Lawrence Berkeley Lab leads him to unravel a cyber-spy who is targeting the American military.

Applied Cryptography: Protocols, Algorithms, and Source Code in C
Applied Cryptography: Protocols, Algorithms, and Source Code in C

Applied Cryptography: Protocols, Algorithms, and Source Code in C

By Bruce Schneier

Bruce Schneier’s new edition of the cryptography classic serves as a comprehensive introduction to cryptography and its applications in modern cybersecurity. 

Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon
Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon

Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon

By Kim Zetter

Award-winning journalist Kim Zetter draws on her extensive experience to report the amazing story of the world’s first digital weapon - the Stuxnet worm - from its 2010 discovery within Iran’s nuclear program to the mystery behind its origins.

Related Content

10th Jan, 2021
5 Upcoming Enterprise Use Cases for AR/VR
14th May, 2019
4 Cybersecurity Trends in Finance
13th May, 2019
4 Interesting Books On AI
SUBSCRIBE
NEWSLETTER

SUBSCRIBE NEWSLETTER

The latest insights from your peers on the latest in Enterprise IT, straight to your inbox.

SUBSCRIBE

By providing your contact information and clicking 'Submit', you authorize Straight Talk, HCL Technologies to store your contact details and contact you with information on latest articles, events, webinars, newsletters, announcements and other relevant updates.

Subscribe to Our Newsletter

The Latest insights from your peers on the latest in Enterprise IT straight to your inbox

SUBSCRIBE

By providing your contact information and clicking 'Submit', you authorize Straight Talk, HCL Technologies to store your contact details and contact you with information on latest articles, events, webinars, newsletters, announcements and other relevant updates.

We use cookies on our website. By continuing to use this site, you agree to our cookie policy - Okay, Got it.

Footer menu

  • ABOUT US
  • TERMS OF USE
  • PRIVACY
  • SITEMAP
  • CONTACT US
 

Copyright © 2023by HCL Technologies