ICS0018 Library: Difference between revisions
From ICO wiki
Jump to navigationJump to search
Kaido.kikkas (talk | contribs) Created page with "=== Kaido's recommendations ===" |
Kaido.kikkas (talk | contribs) No edit summary |
||
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
== Kaido's recommendations == | |||
=== Books === | |||
* ANDRESS, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress 2011 | |||
* CONTOS, Brian T. Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures. Syngress 2006 | |||
* GRAGIDO, Will, PIRC, John. Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats. Syngress 2011 | |||
* GRAGIDO, Will et al. Blackhatonomics: An Inside Look at the Economics of Cybercrime. Syngress 2013 | |||
* HADNAGY, Christopher. Social Engineering: The Art of Human Hacking. Wiley Publishing 2011 | |||
* HADNAGY, Christopher. Social Engineering: The Science of Human Hacking. Wiley Publishing 2018 (note: it is essentially an updated edition of the former) | |||
* HADNAGY, Christopher, SCHULMAN, Seth. Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You. Harper Business 2021 | |||
* LONG, Johnny. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving and Shoulder Surfing. Syngress 2008 | |||
* LONG, Johnny et al. Google Hacking for Penetration Testers. Third Edition. Syngress 2016 | |||
* MCCARTY, Ben. Cyberjutsu: Cybersecurity for the Modern Ninja. No Starch Press 2021 | |||
* MITNICK, Kevin D., SIMON, William L. The Art of Deception: Controlling the Human Element of Security. Wiley Publishing 2003 | |||
* MITNICK, Kevin D., SIMON, William L. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers. Wiley Publishing 2005 | |||
* NISSEN, Thomas Elkjer. The Weaponization of Social Media: Characteristics of Contemporary Conflicts. Royal Danish Defence College 2015 (also available online at https://www.stratcomcoe.org/thomasnissen-weaponization-social-media) | |||
=== Online materials === | |||
* [https://social-engineer.org social-engineer.org] - a large collection of materials from Christopher Hadnagy and his team; especially check out the [https://social-engineer.org/resources/seorg-book-list SEORG Book List]. | |||
[[Social Engineering | Back to the course page]] |
Latest revision as of 11:44, 17 January 2023
Kaido's recommendations
Books
- ANDRESS, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress 2011
- CONTOS, Brian T. Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures. Syngress 2006
- GRAGIDO, Will, PIRC, John. Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats. Syngress 2011
- GRAGIDO, Will et al. Blackhatonomics: An Inside Look at the Economics of Cybercrime. Syngress 2013
- HADNAGY, Christopher. Social Engineering: The Art of Human Hacking. Wiley Publishing 2011
- HADNAGY, Christopher. Social Engineering: The Science of Human Hacking. Wiley Publishing 2018 (note: it is essentially an updated edition of the former)
- HADNAGY, Christopher, SCHULMAN, Seth. Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You. Harper Business 2021
- LONG, Johnny. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving and Shoulder Surfing. Syngress 2008
- LONG, Johnny et al. Google Hacking for Penetration Testers. Third Edition. Syngress 2016
- MCCARTY, Ben. Cyberjutsu: Cybersecurity for the Modern Ninja. No Starch Press 2021
- MITNICK, Kevin D., SIMON, William L. The Art of Deception: Controlling the Human Element of Security. Wiley Publishing 2003
- MITNICK, Kevin D., SIMON, William L. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers. Wiley Publishing 2005
- NISSEN, Thomas Elkjer. The Weaponization of Social Media: Characteristics of Contemporary Conflicts. Royal Danish Defence College 2015 (also available online at https://www.stratcomcoe.org/thomasnissen-weaponization-social-media)
Online materials
- social-engineer.org - a large collection of materials from Christopher Hadnagy and his team; especially check out the SEORG Book List.