Sign up for ISW's Newsletter

Non-technical & Misc. books:

Non-technical & Misc. /
Non-technical & Misc. / Encryption
Non-technical & Misc. / Web Security
Non-technical & Misc. / Wireless Security

Black Ice: The Invisible Threat of Cyber-Terrorism by Dan Verton, Jane Brownlow (Editor)
The first book to define the clear and present danger posed by a cyber-terrorist attack on the U.S. computer- and network-dependent infrastructure. The pages are packed with interviews from members of terrorist groups, including al-Qaida, as well as key insiders involved in planning and executing the U.S. plan for the defense of cyberspace, including Tom Ridge, James Gilmore, CIA and NSA officials--and even al-Qaeda supporters. Internet security expert Dan Verton investigates how cyber-terrorism could occur, what the global and financial implications are, the impact this is having and will continue to have on privacy and civil liberties, and how to prepare and prevent against cyber-terrorism.(from
Crimeware - Understanding New Attacks and Defenses by Markus Jakobsson & Zulfikar Ramzan

There is a new breed of online predators - serious criminals intent on stealing big bucks and top-secret information - and their weapons of choice are a dangerous array of tools called
Execution: The Discipline of Getting Things Done by Larry Bossidy, Ram Charan, et al.
The book that shows how to get the job done and deliver results...whether you’re running an entire company or in your first management job.
Information Trickery: The Great IT Upgrade Scam by Brian Hitchen and Mike Lee
Able Smith & Winston found themselves the victim of an organized Hack from a Russian based team. Like any company that doesn’t prioritize information security, they were in the position of having an insecure network. But the result for them was a lot more serious than just illegal access...they found lives at risk and their livelihood threatened.
Introduction to Computer Security by Matt Bishop
Explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools--as well as how to defend against attackers.

A chapter excerpt is available in PDF format for your review. To view it click here.

Mapping Security by Tom Patterson w/ Scott Gleeson Blue
Informaiton Security Officers global guidebook. Covers best practices, culture and key regulations covering 30 countries is a must book for those in International roles!
Privacy : What Developers and IT Professionals Should Know by J. C. Cannon
Teaches how to systematically build privacy safeguards into any application, Web site, or enterprise system, in any environment, on any platform.
Stealing the Network: How to Own an Indentity by Raven Adler, Jay Beale, Riley “Caez
A book that shows just how far someone is willing to go to steal an identity. This book will open your eyes, through a brilliantly written story to the underground world of identity thieves.
The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick & William L. Simon
The Art of Deception is about gaining someone's trust by lying to them and then abusing that trust for fun and profit. Hackers use the euphemism 'social engineering' and hacker-guru Kevin Mitnick examines many example scenarios.(from
The Art of intrusion by Kevin D. Mitnick & William L. Simon
The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers.
The Hacker Diaries : Confessions of Teenage Hackers by Dan Verton
To many who knew him, there was nothing odd about him. He was a normal kid...
On February 7, 2000, was the first victim of the biggest distributed denial-of-service attack ever to hit the Internet. On May 8th, was battling a massive denial-of-service attack. Later that afternoon, also reported significant outages of service, as did Then CNN's global online news operation started to grind to a crawl. By the following day, Datek and E-Trade entered crisis... (from
The Little Black Book of Computer Security by Joel Dubin
A new approach to Information Security books, checklists! Joel provides checklists to many concerns in technology. These checklists are great for auditing, or just ensuring you have thought of the most common issues facing technology today.
The Myth of Homeland Security by Marcus Ranum
In this timely book, Ranum explains what’s wrong with today’s homeland security policy and why it might--or might not--be fixable. Packed with vivid stories and examples, The Myth of Homeland Security exposes the bad ideas that have already been implemented in the government’s efforts to develop new procedures for airline security, to stop terrorists from hacking into secret databases, and to communicate with the public about threats. He demonstrates how current policies downplay low-tech threats and 'social engineering,' focus on immigration while overlooking the 'nuts' already among us, ignore dangerous defects in the government’s own computer security, and are hampered by interagency bickering and corporate self-dealing. He then presents ideas for change, but argues that homeland security will always be a matter of degree, and not an absolute. This is a problem that is by its nature insolvable, but which at the same time cannot be ignored.

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , All rights reserved. Comments are property of the respective posters.