GOAL

To identify a list of must-read books for all cybersecurity practitioners – be they from industry, government or academia -- where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.

The Canon candidates include both fiction and nonfiction and, for a book to make it into the Canon, it must accurately depict the history of the cybercrime community, characterize key places or significant milestones in the community, or precisely describe technical details that do not exaggerate the craft.

We want to hear from you! Find out how you can be involved with the Canon and nominate your favorite cybersecurity book for inclusion in the candidate list. Read the full set of blog posts about the Cybersecurity Canon to learn more. Drop Rick a line at rhoward@paloaltonetworks.com and let him know your thoughts – he loves a good argument.

 

Congratulations to the 2016 Cybersecurity Canon inductees!

Tallinn Manual on the International Law Applied to Cyber Warfare

Cyber War: The Next Threat to National Security and What to Do About It

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It

@War: The Rise of the Military-Internet Complex”

Measuring and Managing Information Risk: A FAIR Approach

Kingpin

Zero Day

The CERT Guide to Insider Threats



This year’s inductees into the Cybersecurity Canon were announced at Ignite 2016 in Las Vegas.

In anticipation of announcing the 2016 inductees into the Cybersecurity Canon in April 2016, the Cybersecurity Canon Committee decided to run a March Madness-style voting competition with the candidate books. About 45 books went into the competition in February and after six rounds of Internet voting, Mark Russinovich’s "Zero Day” emerged as the popular winner, and joins this year's group of inductees.

For more on this year’s Canon induction:

 

2016 CYBERSECURITY CANON CANDIDATE LIST

CYBER HISTORY & CULTURE

no-place-to-hide
worm
wizards
Data-and-Goliath
america
 

 

CYBER CRIME

fatal-sys-error
kingpin
future-crimes

 

NOVELS

cryptonomicon
daemon
freedom
neuromancer
reamde
snow-crash

blue-nowhere
dragon-tattoo
trojan-horse
zero-day
breakpoint
florentine

 

CYBER WARFARE

confront-conceal
cyberwar
cyberwarfare
cyberwarfare-oreilly
Tallinn
at-war-book

 

CYBER TECH

cert-guide
practice-network-sec-monitoring
secrets-lies
security-metrics
the-code-book
info-risk
lockeddown
metasploit

 

 

CYBER LAW & POLICY

 

GOVERNANCE, RISK, & COMPLIANCE

 

Honorable Mention

Occasionally a book gets nominated, but doesn’t meet one or more of the criteria to make it to the Canon candidate list. These are still noteworthy books, and good reads, so we include them in their own section where you can check out our reviews and judge for yourself. Do you have a favorite cybersecurity book that you think should be considered for the Canon? Nominate it here.

cybercrime
Internet-police
illusion