Cybersecurity Canon FAQ



Questions:

  1. What is the history of the Cybersecurity Canon?
  2. How does the Cybersecurity Canon work?
  3. What is the difference between the candidate list and the Canon proper?
  4. What are the categories for the Cybersecurity Canon?
  5. Who are the committee members?
  6. What do committee members do?
  7. Which books have been inducted into the Canon proper?
  8. How do books get added to the candidate list?
  9. How can I add a book to the candidate list if I'm not a committee member?

 

Answers:

  1. What is the history of the Cybersecurity Canon?

  2. In the spring of 2013, Palo Alto Networks created a "Rock and Roll Hall of Fame" for cybersecurity books that we call The Cybersecurity Canon.

    The Cybersecurity Canon's goal is to identify a list of must-read books for all cybersecurity practitioners -- be they from industry, government or academia -- where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional's education.


  3. How does the Cybersecurity Canon work?

  4. Similar to the Rock and Roll Hall of Fame, we have a list of candidate books. Every year we add approximately 10 more books to the candidate list. The working committee selects one or more books from the Canon candidate list each year for induction into the Canon proper.


  5. What is the difference between the candidate list and the Canon proper?

  6. The candidate list is a collection of books that are presented on the Cybersecurity Canon website as candidates for selection into the Cybersecurity Canon proper. The books in this collection are nominees.

    The Canon proper is a collection of books that are presented on the Cybersecurity Canon website as inductees into the Canon. The working committee has chosen these books for induction.


  7. What are the categories for the Cybersecurity Canon?

  8. The committee selects candidate books from the following categories:

    Cyber History and Culture
    Cyber Crime
    Cyber Novels
    Cyber Warfare
    Cyber Hacktivism
    Cyber Technical

  9. Who are the committee members?

  10. Please see the Committee Bios section. Cybersecurity Canon Committee membership is established on an annual basis.


  11. What do committee members do?

  12. Each year, committee members are required to write two book reviews and as a group choose which books to induct into the Canon.

    Committee members are also required to attend quarterly conference calls and an annual in-person event.


  13. Which books have been inducted into the Canon proper?

  14. Please see our Award Winners section.


  15. How do books get added to the candidate list?

  16. Books are added to the candidate list through a submission from either the public or a committee member.


  17. How can I add a book to the candidate list if I'm not a committee member?

  18. Anybody who wants to add a favorite book to the candidate list can write a book review and submit it to the committee for consideration.

    Submit your review