ICS0018 Library: Difference between revisions

From ICO wiki
Jump to navigationJump to search
No edit summary
No edit summary
Line 3: Line 3:
=== Books ===
=== Books ===


* ANDRESS, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in
* ANDRESS, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress 2011
Theory and Practice. Syngress 2011
* CONTOS, Brian T. Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures. Syngress 2006
* CONTOS, Brian T. Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise
* GRAGIDO, Will, PIRC, John. Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats. Syngress 2011
Security Management Countermeasures. Syngress 2006
* GRAGIDO, Will et al. Blackhatonomics: An Inside Look at the Economics of Cybercrime. Syngress 2013
* GRAGIDO, Will, PIRC, John. Cybercrime and Espionage: An Analysis of Subversive Multi-vector
Threats. Syngress 2011
* GRAGIDO, Will et al. Blackhatonomics: An Inside Look at the Economics of Cybercrime. Syngress
2013
* HADNAGY, Christopher. Social Engineering: The Art of Human Hacking. Wiley Publishing 2011
* HADNAGY, Christopher. Social Engineering: The Art of Human Hacking. Wiley Publishing 2011
* HADNAGY, Christopher. Social Engineering: The Science of Human Hacking. Wiley Publishing 2018 (note: it is essentially an updated edition of the former)
* HADNAGY, Christopher. Social Engineering: The Science of Human Hacking. Wiley Publishing 2018 (note: it is essentially an updated edition of the former)
* HADNAGY, Christopher, SCHULMAN, Seth.  
* HADNAGY, Christopher, SCHULMAN, Seth. Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You. Harper Business 2021
* LONG, Johnny. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving and Shoulder
* LONG, Johnny. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving and Shoulder
Surfing. Syngress 2008
Surfing. Syngress 2008

Revision as of 11:43, 17 January 2023

Kaido's recommendations

Books

  • ANDRESS, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress 2011
  • CONTOS, Brian T. Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures. Syngress 2006
  • GRAGIDO, Will, PIRC, John. Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats. Syngress 2011
  • GRAGIDO, Will et al. Blackhatonomics: An Inside Look at the Economics of Cybercrime. Syngress 2013
  • HADNAGY, Christopher. Social Engineering: The Art of Human Hacking. Wiley Publishing 2011
  • HADNAGY, Christopher. Social Engineering: The Science of Human Hacking. Wiley Publishing 2018 (note: it is essentially an updated edition of the former)
  • HADNAGY, Christopher, SCHULMAN, Seth. Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You. Harper Business 2021
  • LONG, Johnny. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving and Shoulder

Surfing. Syngress 2008

  • LONG, Johnny et al. Google Hacking for Penetration Testers. Third Edition. Syngress 2016
  • MCCARTY, Ben. Cyberjutsu: Cybersecurity for the Modern Ninja. No Starch Press 2021
  • MITNICK, Kevin D., SIMON, William L. The Art of Deception: Controlling the Human Element of

Security. Wiley Publishing 2003

  • MITNICK, Kevin D., SIMON, William L. The Art of Intrusion: The Real Stories Behind the Exploits fo

Hackers, Intruders & Deceivers. Wiley Publishing 2005

  • NISSEN, Thomas Elkjer. The Weaponization of Social Media: Characteristics of Contemporary

Conflicts. Royal Danish Defence College 2015 (also available online at https://www.stratcomcoe.org/thomasnissen- weaponization-social-media)


Online materials


Back to the course page