top of page

Cybersecurity Book Club

The Cybersecurity Book Club explores key works in the field to deepen our understanding of cybersecurity challenges, from hacking history to state-sponsored cyber threats and privacy issues. Through discussion, we aim to enhance our knowledge and spark informed conversations about the evolving digital landscape.

cuckoosegg.jpg

The Cuckoo's Egg

Clifford Stoll

A real-life cyber thriller about an astronomer-turned-sysadmin who uncovers a Cold War-era hacker spying for the Soviet Union, leading to one of the first major cyber espionage investigations.

HackerState.jpg

The Hacker and the State

Ben Buchanan

Explores how governments leverage cyber operations for espionage, warfare, and political influence, reshaping global power dynamics in the digital age.

cyberpunk.jpg

Cyberpunk: Outlaws and Hackers on the Computer Frontier

Katie Hafner & John Markoff

Using the exploits of three international hackers, Cyberpunk provides a fascinating tour of a bizarre subculture populated by outlaws who penetrate even the most sensitive computer networks and wreak havoc on the information they find.

81MmgtlS-9L._UF894,1000_QL80_.jpg

The Hacker Crackdown

Bruce Stealing

Using the exploits of three international hackers, Cyberpunk provides a fascinating tour of a bizarre subculture populated by outlaws who penetrate even the most sensitive computer networks and wreak havoc on the information they find.

81MmgtlS-9L._UF894,1000_QL80_.jpg

The Hacker Crackdown

Bruce Stealing

Using the exploits of three international hackers, Cyberpunk provides a fascinating tour of a bizarre subculture populated by outlaws who penetrate even the most sensitive computer networks and wreak havoc on the information they find.

tubes.jpg

Tubes

Andrew Blum

Explores the physical infrastructure of the internet, tracing the hidden network of cables, data centers, and switch points that connect the digital world.

Sandworm.jpg

Sandworm

Andy Greenberg

Exposes the rise of a dangerous Russian cyberwarfare unit responsible for devastating attacks, including the blackout of Ukraine's power grid and the global NotPetya malware outbreak.

611WnkHzWRL.jpg

The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Paulson

Jonathan Littman

Drawing on interviews with Poulsen, convicted of computer piracy and espionage, the author traces Poulsen's long career, from his arrest at seventeen to his descent underground in Hollywood, where he used computers to stalk movie stars.

At_Large.jpg

@ Large

Jonathan Littman

Drawing on interviews with Poulsen, convicted of computer piracy and espionage, the author traces Poulsen's long career, from his arrest at seventeen to his descent underground in Hollywood, where he used computers to stalk movie stars.

At_Large.jpg

@ Large

Jonathan Littman

Drawing on interviews with Poulsen, convicted of computer piracy and espionage, the author traces Poulsen's long career, from his arrest at seventeen to his descent underground in Hollywood, where he used computers to stalk movie stars.

PermRecord_.jpg

Permanent Record

Edward Snowden

A memoir detailing Snowden's journey from NSA contractor to whistleblower, revealing the U.S. government's mass surveillance programs and his decision to expose them.

DataGoliath.jpg

Data and Goliath

Bruce Schneier

Reveals how governments and corporations collect, exploit, and manipulate personal data, while offering strategies to protect privacy in the digital age.

CountdownToZD.jpg

Countdown to Zero Day

Kim Zetter

A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare.

919FmjPjsEL._SL1500_.jpg

The Perfect Weapon

David E. Sanger

A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare.

919FmjPjsEL._SL1500_.jpg

The Perfect Weapon

David E. Sanger

A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare.

List Title

bottom of page