ICS0018 Library: Difference between revisions
From ICO wiki
Jump to navigationJump to search
Kaido.kikkas (talk | contribs) No edit summary |
Kaido.kikkas (talk | contribs) No edit summary |
||
(One intermediate revision by the same user not shown) | |||
Line 3: | Line 3: | ||
=== Books === | === Books === | ||
* ANDRESS, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in | * ANDRESS, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress 2011 | ||
Theory and Practice. Syngress 2011 | * CONTOS, Brian T. Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures. Syngress 2006 | ||
* CONTOS, Brian T. Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise | * GRAGIDO, Will, PIRC, John. Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats. Syngress 2011 | ||
Security Management Countermeasures. Syngress 2006 | * GRAGIDO, Will et al. Blackhatonomics: An Inside Look at the Economics of Cybercrime. Syngress 2013 | ||
* GRAGIDO, Will, PIRC, John. Cybercrime and Espionage: An Analysis of Subversive Multi- | |||
Threats. Syngress 2011 | |||
* GRAGIDO, Will et al. Blackhatonomics: An Inside Look at the Economics of Cybercrime. Syngress | |||
2013 | |||
* HADNAGY, Christopher. Social Engineering: The Art of Human Hacking. Wiley Publishing 2011 | * HADNAGY, Christopher. Social Engineering: The Art of Human Hacking. Wiley Publishing 2011 | ||
* HADNAGY, Christopher. Social Engineering: The Science of Human Hacking. Wiley Publishing 2018 (note: it is essentially an updated edition of the former) | * HADNAGY, Christopher. Social Engineering: The Science of Human Hacking. Wiley Publishing 2018 (note: it is essentially an updated edition of the former) | ||
* HADNAGY, Christopher, SCHULMAN, Seth. | * HADNAGY, Christopher, SCHULMAN, Seth. Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You. Harper Business 2021 | ||
* LONG, Johnny. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving and Shoulder | * LONG, Johnny. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving and Shoulder Surfing. Syngress 2008 | ||
Surfing. Syngress 2008 | |||
* LONG, Johnny et al. Google Hacking for Penetration Testers. Third Edition. Syngress 2016 | * LONG, Johnny et al. Google Hacking for Penetration Testers. Third Edition. Syngress 2016 | ||
* MCCARTY, Ben. Cyberjutsu: Cybersecurity for the Modern Ninja. No Starch Press 2021 | * MCCARTY, Ben. Cyberjutsu: Cybersecurity for the Modern Ninja. No Starch Press 2021 | ||
* MITNICK, Kevin D., SIMON, William L. The Art of Deception: Controlling the Human Element of | * MITNICK, Kevin D., SIMON, William L. The Art of Deception: Controlling the Human Element of Security. Wiley Publishing 2003 | ||
Security. Wiley Publishing 2003 | * MITNICK, Kevin D., SIMON, William L. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers. Wiley Publishing 2005 | ||
* MITNICK, Kevin D., SIMON, William L. The Art of Intrusion: The Real Stories Behind the Exploits | * NISSEN, Thomas Elkjer. The Weaponization of Social Media: Characteristics of Contemporary Conflicts. Royal Danish Defence College 2015 (also available online at https://www.stratcomcoe.org/thomasnissen-weaponization-social-media) | ||
Hackers, Intruders & Deceivers. Wiley Publishing 2005 | |||
* NISSEN, Thomas Elkjer. The Weaponization of Social Media: Characteristics of Contemporary | |||
Conflicts. Royal Danish Defence College 2015 (also available online at https://www.stratcomcoe.org/thomasnissen- | |||
weaponization-social-media) | |||
Latest revision as of 11:44, 17 January 2023
Kaido's recommendations
Books
- ANDRESS, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress 2011
- CONTOS, Brian T. Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures. Syngress 2006
- GRAGIDO, Will, PIRC, John. Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats. Syngress 2011
- GRAGIDO, Will et al. Blackhatonomics: An Inside Look at the Economics of Cybercrime. Syngress 2013
- HADNAGY, Christopher. Social Engineering: The Art of Human Hacking. Wiley Publishing 2011
- HADNAGY, Christopher. Social Engineering: The Science of Human Hacking. Wiley Publishing 2018 (note: it is essentially an updated edition of the former)
- HADNAGY, Christopher, SCHULMAN, Seth. Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You. Harper Business 2021
- LONG, Johnny. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving and Shoulder Surfing. Syngress 2008
- LONG, Johnny et al. Google Hacking for Penetration Testers. Third Edition. Syngress 2016
- MCCARTY, Ben. Cyberjutsu: Cybersecurity for the Modern Ninja. No Starch Press 2021
- MITNICK, Kevin D., SIMON, William L. The Art of Deception: Controlling the Human Element of Security. Wiley Publishing 2003
- MITNICK, Kevin D., SIMON, William L. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers. Wiley Publishing 2005
- NISSEN, Thomas Elkjer. The Weaponization of Social Media: Characteristics of Contemporary Conflicts. Royal Danish Defence College 2015 (also available online at https://www.stratcomcoe.org/thomasnissen-weaponization-social-media)
Online materials
- social-engineer.org - a large collection of materials from Christopher Hadnagy and his team; especially check out the SEORG Book List.