Top 7 must-have cybersecurity books


Are you in cybersecurity and are looking to expand your knowledge horizons? Are you getting your start in cybersecurity and looking for a way to immerse yourself in the field before you take your first job? Don’t worry, because there are many good books that can help light your path toward a better general understanding of cybersecurity.

This article will detail the top seven cybersecurity books that you need to have in your library. It will provide you with briefs on these top seven books and leave you with the kind of impression you need before you consider buying and reading. Even if you are not thinking of books as the information format of choice for cybersecurity-related information, you will be pleasantly surprised!

  1. Tribe of Hackers: Cyber Advice from the Best Hackers in the World by Marcus Carey (July 23, 2019)

    One of the most insightful in terms of real-world experience on this list, “Tribe of Hackers” by Marcus Carey presents readers with 70 thought-provoking interviews with influential security specialists and hackers of note. Just some of these experts include the author himself (owner of cybersecurity firm Threatcare), co-author Jennifer Jin, Steve Ragan, Jeffery Man, Terence Jackson and Jim Christy, among many others.

    Each chapter is an interview with one of these experts and answers questions such as how they got their start in cybersecurity, what qualities those successful in cybersecurity share and tips for getting ahead in cybersecurity.

  2. The Ethics of Cybersecurity by Michele Loi (February 10, 2020)

    Presented as a collection of papers providing an integrative view on cybersecurity, this book by Michele Loi discusses problems, solutions and theories relevant to cybersecurity today.

    “The Ethics of Cybersecurity” takes a practical view, using case studies and ethical issues to outline current ethical issues in cybersecurity, as well as (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Greg Belding. Read the original post at: