ICS0018 Library: Difference between revisions

From ICO wiki
Jump to navigationJump to search
No edit summary
No edit summary
 
(One intermediate revision by the same user not shown)
Line 3: Line 3:
=== Books ===
=== Books ===


* ANDRESS, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in
* ANDRESS, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress 2011
Theory and Practice. Syngress 2011
* CONTOS, Brian T. Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures. Syngress 2006
* CONTOS, Brian T. Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise
* GRAGIDO, Will, PIRC, John. Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats. Syngress 2011
Security Management Countermeasures. Syngress 2006
* GRAGIDO, Will et al. Blackhatonomics: An Inside Look at the Economics of Cybercrime. Syngress 2013
* GRAGIDO, Will, PIRC, John. Cybercrime and Espionage: An Analysis of Subversive Multi-vector
Threats. Syngress 2011
* GRAGIDO, Will et al. Blackhatonomics: An Inside Look at the Economics of Cybercrime. Syngress
2013
* HADNAGY, Christopher. Social Engineering: The Art of Human Hacking. Wiley Publishing 2011
* HADNAGY, Christopher. Social Engineering: The Art of Human Hacking. Wiley Publishing 2011
* HADNAGY, Christopher. Social Engineering: The Science of Human Hacking. Wiley Publishing 2018 (note: it is essentially an updated edition of the former)
* HADNAGY, Christopher. Social Engineering: The Science of Human Hacking. Wiley Publishing 2018 (note: it is essentially an updated edition of the former)
* HADNAGY, Christopher, SCHULMAN, Seth.  
* HADNAGY, Christopher, SCHULMAN, Seth. Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You. Harper Business 2021
* LONG, Johnny. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving and Shoulder
* LONG, Johnny. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving and Shoulder Surfing. Syngress 2008
Surfing. Syngress 2008
* LONG, Johnny et al. Google Hacking for Penetration Testers. Third Edition. Syngress 2016
* LONG, Johnny et al. Google Hacking for Penetration Testers. Third Edition. Syngress 2016
* MCCARTY, Ben. Cyberjutsu: Cybersecurity for the Modern Ninja. No Starch Press 2021
* MCCARTY, Ben. Cyberjutsu: Cybersecurity for the Modern Ninja. No Starch Press 2021
* MITNICK, Kevin D., SIMON, William L. The Art of Deception: Controlling the Human Element of
* MITNICK, Kevin D., SIMON, William L. The Art of Deception: Controlling the Human Element of Security. Wiley Publishing 2003
Security. Wiley Publishing 2003
* MITNICK, Kevin D., SIMON, William L. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers. Wiley Publishing 2005
* MITNICK, Kevin D., SIMON, William L. The Art of Intrusion: The Real Stories Behind the Exploits fo
* NISSEN, Thomas Elkjer. The Weaponization of Social Media: Characteristics of Contemporary Conflicts. Royal Danish Defence College 2015 (also available online at https://www.stratcomcoe.org/thomasnissen-weaponization-social-media)
Hackers, Intruders & Deceivers. Wiley Publishing 2005
* NISSEN, Thomas Elkjer. The Weaponization of Social Media: Characteristics of Contemporary
Conflicts. Royal Danish Defence College 2015 (also available online at https://www.stratcomcoe.org/thomasnissen-
weaponization-social-media)





Latest revision as of 11:44, 17 January 2023

Kaido's recommendations

Books

  • ANDRESS, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress 2011
  • CONTOS, Brian T. Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures. Syngress 2006
  • GRAGIDO, Will, PIRC, John. Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats. Syngress 2011
  • GRAGIDO, Will et al. Blackhatonomics: An Inside Look at the Economics of Cybercrime. Syngress 2013
  • HADNAGY, Christopher. Social Engineering: The Art of Human Hacking. Wiley Publishing 2011
  • HADNAGY, Christopher. Social Engineering: The Science of Human Hacking. Wiley Publishing 2018 (note: it is essentially an updated edition of the former)
  • HADNAGY, Christopher, SCHULMAN, Seth. Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You. Harper Business 2021
  • LONG, Johnny. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving and Shoulder Surfing. Syngress 2008
  • LONG, Johnny et al. Google Hacking for Penetration Testers. Third Edition. Syngress 2016
  • MCCARTY, Ben. Cyberjutsu: Cybersecurity for the Modern Ninja. No Starch Press 2021
  • MITNICK, Kevin D., SIMON, William L. The Art of Deception: Controlling the Human Element of Security. Wiley Publishing 2003
  • MITNICK, Kevin D., SIMON, William L. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers. Wiley Publishing 2005
  • NISSEN, Thomas Elkjer. The Weaponization of Social Media: Characteristics of Contemporary Conflicts. Royal Danish Defence College 2015 (also available online at https://www.stratcomcoe.org/thomasnissen-weaponization-social-media)


Online materials


Back to the course page