Cybersecurity Book Club
The Cybersecurity Book Club explores key works in the field to deepen our understanding of cybersecurity challenges, from hacking history to state-sponsored cyber threats and privacy issues. Through discussion, we aim to enhance our knowledge and spark informed conversations about the evolving digital landscape.

The Cuckoo's Egg
Clifford Stoll
A real-life cyber thriller about an astronomer-turned-sysadmin who uncovers a Cold War-era hacker spying for the Soviet Union, leading to one of the first major cyber espionage investigations.

The Hacker and the State
Ben Buchanan
Explores how governments leverage cyber operations for espionage, warfare, and political influence, reshaping global power dynamics in the digital age.

Cyberpunk: Outlaws and Hackers on the Computer Frontier
Katie Hafner & John Markoff
Using the exploits of three international hackers, Cyberpunk provides a fascinating tour of a bizarre subculture populated by outlaws who penetrate even the most sensitive computer networks and wreak havoc on the information they find.

The Hacker Crackdown
Bruce Stealing
Using the exploits of three international hackers, Cyberpunk provides a fascinating tour of a bizarre subculture populated by outlaws who penetrate even the most sensitive computer networks and wreak havoc on the information they find.

The Hacker Crackdown
Bruce Stealing
Using the exploits of three international hackers, Cyberpunk provides a fascinating tour of a bizarre subculture populated by outlaws who penetrate even the most sensitive computer networks and wreak havoc on the information they find.

Tubes
Andrew Blum
Explores the physical infrastructure of the internet, tracing the hidden network of cables, data centers, and switch points that connect the digital world.

Sandworm
Andy Greenberg
Exposes the rise of a dangerous Russian cyberwarfare unit responsible for devastating attacks, including the blackout of Ukraine's power grid and the global NotPetya malware outbreak.

The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Paulson
Jonathan Littman
Drawing on interviews with Poulsen, convicted of computer piracy and espionage, the author traces Poulsen's long career, from his arrest at seventeen to his descent underground in Hollywood, where he used computers to stalk movie stars.

@ Large
Jonathan Littman
Drawing on interviews with Poulsen, convicted of computer piracy and espionage, the author traces Poulsen's long career, from his arrest at seventeen to his descent underground in Hollywood, where he used computers to stalk movie stars.

@ Large
Jonathan Littman
Drawing on interviews with Poulsen, convicted of computer piracy and espionage, the author traces Poulsen's long career, from his arrest at seventeen to his descent underground in Hollywood, where he used computers to stalk movie stars.
Permanent Record
Edward Snowden
A memoir detailing Snowden's journey from NSA contractor to whistleblower, revealing the U.S. government's mass surveillance programs and his decision to expose them.

Data and Goliath
Bruce Schneier
Reveals how governments and corporations collect, exploit, and manipulate personal data, while offering strategies to protect privacy in the digital age.

Countdown to Zero Day
Kim Zetter
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare.

The Perfect Weapon
David E. Sanger
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare.

The Perfect Weapon
David E. Sanger
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare.