ICS0018 Library: Difference between revisions
From ICO wiki
Jump to navigationJump to search
Kaido.kikkas (talk | contribs) Created page with "=== Kaido's recommendations ===" |
Kaido.kikkas (talk | contribs) No edit summary |
||
Line 1: | Line 1: | ||
== Kaido's recommendations == | |||
=== Books === | |||
* ANDRESS, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in | |||
Theory and Practice. Syngress 2011 | |||
* CONTOS, Brian T. Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise | |||
Security Management Countermeasures. Syngress 2006 | |||
* GRAGIDO, Will, PIRC, John. Cybercrime and Espionage: An Analysis of Subversive Multi-vector | |||
Threats. Syngress 2011 | |||
* GRAGIDO, Will et al. Blackhatonomics: An Inside Look at the Economics of Cybercrime. Syngress | |||
2013 | |||
* HADNAGY, Christopher. Social Engineering: The Art of Human Hacking. Wiley Publishing 2011 | |||
* HADNAGY, Christopher. Social Engineering: The Science of Human Hacking. Wiley Publishing 2018 (note: it is essentially an updated edition of the former) | |||
* HADNAGY, Christopher, SCHULMAN, Seth. | |||
* LONG, Johnny. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving and Shoulder | |||
Surfing. Syngress 2008 | |||
* LONG, Johnny et al. Google Hacking for Penetration Testers. Third Edition. Syngress 2016 | |||
* MCCARTY, Ben. Cyberjutsu: Cybersecurity for the Modern Ninja. No Starch Press 2021 | |||
* MITNICK, Kevin D., SIMON, William L. The Art of Deception: Controlling the Human Element of | |||
Security. Wiley Publishing 2003 | |||
* MITNICK, Kevin D., SIMON, William L. The Art of Intrusion: The Real Stories Behind the Exploits fo | |||
Hackers, Intruders & Deceivers. Wiley Publishing 2005 | |||
* NISSEN, Thomas Elkjer. The Weaponization of Social Media: Characteristics of Contemporary | |||
Conflicts. Royal Danish Defence College 2015 (also available online at https://www.stratcomcoe.org/thomasnissen- | |||
weaponization-social-media) | |||
=== Online materials === | |||
* [https://social-engineer.org social-engineer.org] - a large collection of materials from Christopher Hadnagy and his team; especially check out the [https://social-engineer.org/resources/seorg-book-list SEORG Book List]. | |||
[[Social Engineering | Back to the course page]] |
Revision as of 11:40, 17 January 2023
Kaido's recommendations
Books
- ANDRESS, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in
Theory and Practice. Syngress 2011
- CONTOS, Brian T. Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise
Security Management Countermeasures. Syngress 2006
- GRAGIDO, Will, PIRC, John. Cybercrime and Espionage: An Analysis of Subversive Multi-vector
Threats. Syngress 2011
- GRAGIDO, Will et al. Blackhatonomics: An Inside Look at the Economics of Cybercrime. Syngress
2013
- HADNAGY, Christopher. Social Engineering: The Art of Human Hacking. Wiley Publishing 2011
- HADNAGY, Christopher. Social Engineering: The Science of Human Hacking. Wiley Publishing 2018 (note: it is essentially an updated edition of the former)
- HADNAGY, Christopher, SCHULMAN, Seth.
- LONG, Johnny. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving and Shoulder
Surfing. Syngress 2008
- LONG, Johnny et al. Google Hacking for Penetration Testers. Third Edition. Syngress 2016
- MCCARTY, Ben. Cyberjutsu: Cybersecurity for the Modern Ninja. No Starch Press 2021
- MITNICK, Kevin D., SIMON, William L. The Art of Deception: Controlling the Human Element of
Security. Wiley Publishing 2003
- MITNICK, Kevin D., SIMON, William L. The Art of Intrusion: The Real Stories Behind the Exploits fo
Hackers, Intruders & Deceivers. Wiley Publishing 2005
- NISSEN, Thomas Elkjer. The Weaponization of Social Media: Characteristics of Contemporary
Conflicts. Royal Danish Defence College 2015 (also available online at https://www.stratcomcoe.org/thomasnissen- weaponization-social-media)
Online materials
- social-engineer.org - a large collection of materials from Christopher Hadnagy and his team; especially check out the SEORG Book List.