Security and Privacy in a Networked World/Reading list

From Wikiversity

Note: these are recommended, not compulsory reading!


  • ALDER, Raven et al (2005). Stealing the Networkː How to Own an Identiry. Syngress.
  • ALLSOPP, Wil (2009). Unauthorised Accessː Physical Penetration Testing for IT Security Teams. John Wiley & Sons.
  • ANDREJEVIC, Mark (2007). iSpy: Surveillance and Power in the Interactive Era. University Press of Kansas
  • GOLDSTEIN, Emmanuel (2008). The Best of 2600: A Hacker Odyssey. Wiley
  • HAGER, Nicky (1996). Secret Power - New Zealand's Role in the International Spy Network. Craig Potton Publishing.
  • LONG, Johnny (2008). No Tech Hacking - A Guide to Social Engeering, Dumpster Diving, and Shoulder Surfing. Syngress Publishing (a chapter is available at
  • MCCARTHY, Linda (2003). IT Security: Risking the Corporation. Prentice Hall.
  • MITNICK, Kevin D.,SIMON, William L. (2002). The Art of Deception. John Wiley & Sons
  • MITNICK, Kevin D.,SIMON, William L. (2005). The Art of Intrusion. John Wiley & Sons
  • O'CONNOR, TJ (2012). Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers. Syngress
  • STERLING, Bruce (1992). Hacker Crackdown: Law and Disorder on the Electronic Frontier. Bantam Books.
  • STOLL, Cliff (2005). The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. Pocket Books
  • VITALIEV, Dmitri (2007). Digital Security and Privacy for Human Rights Defenders. Front Line.
  • WINTERFELD, Steve, ANDRESS, Jason (2013). The Basics of Cyber Warfare. Syngress.

Other resources[edit]

Back to the Main Page