The Cybersecurity Canon's goal is to identify a list of must-read books for all cybersecurity practitioners -- be they from industry, government or academia -- where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional's education.
Similar to the Rock and Roll Hall of Fame, we have a list of candidate books. Every year we add approximately 10 more books to the candidate list. The working committee selects one or more books from the Canon candidate list each year for induction into the Canon proper.
The candidate list is a collection of books that are presented on the Cybersecurity Canon website as candidates for selection into the Cybersecurity Canon proper. The books in this collection are nominees.
The Canon proper is a collection of books that are presented on the Cybersecurity Canon website as inductees into the Canon. The working committee has chosen these books for induction.
The committee selects candidate books from the following categories:Cyber History and Culture
Please see the Committee Bios section. Cybersecurity Canon Committee membership is established on an annual basis.
Each year, committee members are required to write two book reviews and as a group choose which books to induct into the Canon.
Committee members are also required to attend quarterly conference calls and an annual in-person event.
Books are added to the candidate list through a submission from either the public or a committee member.
Anybody who wants to add a favorite book to the candidate list can write a book review and submit it to the committee for consideration.