SlideShare a Scribd company logo
1 of 15
Download to read offline
#WorldBookDay
World
Book Day
We asked our
Tripwire friends and
security experts for
their favorite books
that lift, educate and
inspire the
information security
industry...
Tribe of Hackers
Marcus J. Carey and Jennifer Jin
Chloe Messdaghi, @ChloeMessdaghi
This book provides information about
the hacker community, written by the
hacker community. It showcases red
teamers, purple teamers, blue
teamers, and leaders.
#1
Maribeth Pusieski, @MD_PDX
Reading the book, was like dropping
into a coffee tête-à-tête between a
group of security experts
extraordinaire!
Confident Cybersecurity
Dr. Jessica Barker
Sophia McCall, @spookphia
Want to learn more about the
human side of security? Or are you
curious on what roles you could
pursue in cyber? This book is
brilliant at articulating a huge range
of topics that engages the reader
from the get-go.
#2
Parenting for a Digital Future
Sophia Livingstone and Alicia Blum-Ross
Anastasios Arampatzis, @TassosAramp
During the pandemic, our children
transferred their social activities
from the school playgrounds and
parks to their smartphones and
laptops - and that's why I choose
this book.
#3
Click Here to Kill Everybody
Bruce Schneier
Mitch Parker
In the book, the author elucidates
that our hyper-connected world
leaves lots of reason for security
doubt, especially if you consider
the motivations of everyone
involved.
#4
Hacking Exposed - Malware &
Rootkits
Michael A. Davis, Sean Bodmer and Aaron LeMasters
David Gilmore, @DaveG_Tripwire
If you are starting out in
cybersecurity and you are looking
for an interesting read that
provides some fundamentals, then
I recommend this book.
#5
Countdown to Zero Day
Kim Zetter
Raymond Kirk, @Raymond_The_PM
I enjoyed this book because it
demystifies the how and why
security is so important and how it
can have life changing affects
financially, organizationally, and
politically.
#6
The Third Wave
Alvin Toffler
Angus Macrae, @AMACSIA
This book by the late, highly
regarded futurist, writer, and
businessman, Alvin Toffler,
explores the ever accelerating
evolution of mankind through the
lens of three distinct societal
‘waves.’
#7
WebMage
Kelly McCullough
Ary Widdes
This book follows a
hacker/sorcerer called Ravirn, in a
world where the ancient Greek
mythos reigns, magic has been
upgraded to the digital world, and
sorcery can be performed using
programs.
#8
Sandworm
Andy Greenberg
Craig Young, @CraigTweets
In this book, the author uses
interviews with key players to peel
back the curtain of international
cyber-espionage and warfare with
the specific focus on entities of the
Russian federal government.
#9
The Perfect Weapon
David E. Sanger
Jihana Barrett, @IAmJihanna
In this book, Sanger illustrates how
cyber weapons have changed the
way wars are fought similar to the
way the atomic bomb changed
warfare in WW1.
#10
Cybersecurity Leadership
Mansur Hasib
Ambler T. Jackson, @AmblerJackson
The author does a great job
providing an academic and
historical perspective of
cybersecurity, including its
evolution and what it is, and what it
is not.
#11
Practical Packet Analysis
Chris Sanders
Tyler Reguly, @TReguly
If you want to understand
Wireshark, it is the best book on
the market and it’s from the
greatest publisher of technical
books, No Starch Press.
#12
For the latest information security
news, trends and insights, visit:
www.tripwire.com/state-of-security/
What books have inspired you? Share
your favorites with us @tripwireinc
using #WorldBookDay

More Related Content

Similar to World Book Day: Cybersecurity’s Quietest Celebration

New Technologies
New TechnologiesNew Technologies
New TechnologiesPaul Swain
 
'Cyberwar will not take place' Discuss
'Cyberwar will not take place' Discuss'Cyberwar will not take place' Discuss
'Cyberwar will not take place' DiscussGus Rankin
 
Future Of Gi Insurance Avatars In The Social Media Age Upd
Future Of Gi   Insurance Avatars In The Social Media Age UpdFuture Of Gi   Insurance Avatars In The Social Media Age Upd
Future Of Gi Insurance Avatars In The Social Media Age UpdSagi Schliesser
 
Animal Rights Persuasive Essay.pdf
Animal Rights Persuasive Essay.pdfAnimal Rights Persuasive Essay.pdf
Animal Rights Persuasive Essay.pdfBrenda Lopez
 
Pros And Cons Essay Topics
Pros And Cons Essay TopicsPros And Cons Essay Topics
Pros And Cons Essay TopicsKelsey Bjorklund
 
Research Essay Thesis.pdf
Research Essay Thesis.pdfResearch Essay Thesis.pdf
Research Essay Thesis.pdfPamela Brown
 
Research Essay Thesis
Research Essay ThesisResearch Essay Thesis
Research Essay ThesisLisa Wera
 
Do we need a new language to describe cybersecurity?
Do we need a new language to describe cybersecurity?Do we need a new language to describe cybersecurity?
Do we need a new language to describe cybersecurity?Sherry Jones
 
Mba Essay Service. MBA Essay Writing Service Australia from the Academic Experts
Mba Essay Service. MBA Essay Writing Service Australia from the Academic ExpertsMba Essay Service. MBA Essay Writing Service Australia from the Academic Experts
Mba Essay Service. MBA Essay Writing Service Australia from the Academic ExpertsAshley Matulevich
 
Writing A Response To An Article. How To Write A Criti
Writing A Response To An Article. How To Write A CritiWriting A Response To An Article. How To Write A Criti
Writing A Response To An Article. How To Write A CritiBrandy Carpenter
 
Critical Evaluation Essay. An Introduction To The Analysis Of Critical Evalua...
Critical Evaluation Essay. An Introduction To The Analysis Of Critical Evalua...Critical Evaluation Essay. An Introduction To The Analysis Of Critical Evalua...
Critical Evaluation Essay. An Introduction To The Analysis Of Critical Evalua...Carley Kelley
 
Essay On Disadvantages Of Using Internet
Essay On Disadvantages Of Using InternetEssay On Disadvantages Of Using Internet
Essay On Disadvantages Of Using InternetKaty Shaw
 
Martin Luther King I Have A Dream Analysis Essay
Martin Luther King I Have A Dream Analysis EssayMartin Luther King I Have A Dream Analysis Essay
Martin Luther King I Have A Dream Analysis EssayCharlotte Sanders
 
Electronic Interaction Is Making Americans LessLiterateWha.docx
Electronic Interaction Is Making Americans LessLiterateWha.docxElectronic Interaction Is Making Americans LessLiterateWha.docx
Electronic Interaction Is Making Americans LessLiterateWha.docxjack60216
 
Write My Essay- Order Your Best Essay Online Now From 5.99
Write My Essay- Order Your Best Essay Online Now From 5.99Write My Essay- Order Your Best Essay Online Now From 5.99
Write My Essay- Order Your Best Essay Online Now From 5.99Sugar Murillo
 
003 Essay Example Grading Rubric Synthesisqkeythings Page Thatsnotus
003 Essay Example Grading Rubric Synthesisqkeythings Page Thatsnotus003 Essay Example Grading Rubric Synthesisqkeythings Page Thatsnotus
003 Essay Example Grading Rubric Synthesisqkeythings Page ThatsnotusKarla Adamson
 

Similar to World Book Day: Cybersecurity’s Quietest Celebration (18)

New Technologies
New TechnologiesNew Technologies
New Technologies
 
'Cyberwar will not take place' Discuss
'Cyberwar will not take place' Discuss'Cyberwar will not take place' Discuss
'Cyberwar will not take place' Discuss
 
Future Of Gi Insurance Avatars In The Social Media Age Upd
Future Of Gi   Insurance Avatars In The Social Media Age UpdFuture Of Gi   Insurance Avatars In The Social Media Age Upd
Future Of Gi Insurance Avatars In The Social Media Age Upd
 
Animal Rights Persuasive Essay.pdf
Animal Rights Persuasive Essay.pdfAnimal Rights Persuasive Essay.pdf
Animal Rights Persuasive Essay.pdf
 
Essay On Wide Area Networks
Essay On Wide Area NetworksEssay On Wide Area Networks
Essay On Wide Area Networks
 
Pros And Cons Essay Topics
Pros And Cons Essay TopicsPros And Cons Essay Topics
Pros And Cons Essay Topics
 
Research Essay Thesis.pdf
Research Essay Thesis.pdfResearch Essay Thesis.pdf
Research Essay Thesis.pdf
 
Research Essay Thesis
Research Essay ThesisResearch Essay Thesis
Research Essay Thesis
 
Do we need a new language to describe cybersecurity?
Do we need a new language to describe cybersecurity?Do we need a new language to describe cybersecurity?
Do we need a new language to describe cybersecurity?
 
Mba Essay Service. MBA Essay Writing Service Australia from the Academic Experts
Mba Essay Service. MBA Essay Writing Service Australia from the Academic ExpertsMba Essay Service. MBA Essay Writing Service Australia from the Academic Experts
Mba Essay Service. MBA Essay Writing Service Australia from the Academic Experts
 
Writing A Response To An Article. How To Write A Criti
Writing A Response To An Article. How To Write A CritiWriting A Response To An Article. How To Write A Criti
Writing A Response To An Article. How To Write A Criti
 
Critical Evaluation Essay. An Introduction To The Analysis Of Critical Evalua...
Critical Evaluation Essay. An Introduction To The Analysis Of Critical Evalua...Critical Evaluation Essay. An Introduction To The Analysis Of Critical Evalua...
Critical Evaluation Essay. An Introduction To The Analysis Of Critical Evalua...
 
Essay On Disadvantages Of Using Internet
Essay On Disadvantages Of Using InternetEssay On Disadvantages Of Using Internet
Essay On Disadvantages Of Using Internet
 
Arguementative Essays
Arguementative EssaysArguementative Essays
Arguementative Essays
 
Martin Luther King I Have A Dream Analysis Essay
Martin Luther King I Have A Dream Analysis EssayMartin Luther King I Have A Dream Analysis Essay
Martin Luther King I Have A Dream Analysis Essay
 
Electronic Interaction Is Making Americans LessLiterateWha.docx
Electronic Interaction Is Making Americans LessLiterateWha.docxElectronic Interaction Is Making Americans LessLiterateWha.docx
Electronic Interaction Is Making Americans LessLiterateWha.docx
 
Write My Essay- Order Your Best Essay Online Now From 5.99
Write My Essay- Order Your Best Essay Online Now From 5.99Write My Essay- Order Your Best Essay Online Now From 5.99
Write My Essay- Order Your Best Essay Online Now From 5.99
 
003 Essay Example Grading Rubric Synthesisqkeythings Page Thatsnotus
003 Essay Example Grading Rubric Synthesisqkeythings Page Thatsnotus003 Essay Example Grading Rubric Synthesisqkeythings Page Thatsnotus
003 Essay Example Grading Rubric Synthesisqkeythings Page Thatsnotus
 

More from Tripwire

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughTripwire
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyTripwire
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportTripwire
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!Tripwire
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationTripwire
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...Tripwire
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsTripwire
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTripwire
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkTripwire
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksTripwire
 
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7Tripwire
 

More from Tripwire (20)

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase Cole
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber Moments
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

World Book Day: Cybersecurity’s Quietest Celebration

  • 2. We asked our Tripwire friends and security experts for their favorite books that lift, educate and inspire the information security industry...
  • 3. Tribe of Hackers Marcus J. Carey and Jennifer Jin Chloe Messdaghi, @ChloeMessdaghi This book provides information about the hacker community, written by the hacker community. It showcases red teamers, purple teamers, blue teamers, and leaders. #1 Maribeth Pusieski, @MD_PDX Reading the book, was like dropping into a coffee tête-à-tête between a group of security experts extraordinaire!
  • 4. Confident Cybersecurity Dr. Jessica Barker Sophia McCall, @spookphia Want to learn more about the human side of security? Or are you curious on what roles you could pursue in cyber? This book is brilliant at articulating a huge range of topics that engages the reader from the get-go. #2
  • 5. Parenting for a Digital Future Sophia Livingstone and Alicia Blum-Ross Anastasios Arampatzis, @TassosAramp During the pandemic, our children transferred their social activities from the school playgrounds and parks to their smartphones and laptops - and that's why I choose this book. #3
  • 6. Click Here to Kill Everybody Bruce Schneier Mitch Parker In the book, the author elucidates that our hyper-connected world leaves lots of reason for security doubt, especially if you consider the motivations of everyone involved. #4
  • 7. Hacking Exposed - Malware & Rootkits Michael A. Davis, Sean Bodmer and Aaron LeMasters David Gilmore, @DaveG_Tripwire If you are starting out in cybersecurity and you are looking for an interesting read that provides some fundamentals, then I recommend this book. #5
  • 8. Countdown to Zero Day Kim Zetter Raymond Kirk, @Raymond_The_PM I enjoyed this book because it demystifies the how and why security is so important and how it can have life changing affects financially, organizationally, and politically. #6
  • 9. The Third Wave Alvin Toffler Angus Macrae, @AMACSIA This book by the late, highly regarded futurist, writer, and businessman, Alvin Toffler, explores the ever accelerating evolution of mankind through the lens of three distinct societal ‘waves.’ #7
  • 10. WebMage Kelly McCullough Ary Widdes This book follows a hacker/sorcerer called Ravirn, in a world where the ancient Greek mythos reigns, magic has been upgraded to the digital world, and sorcery can be performed using programs. #8
  • 11. Sandworm Andy Greenberg Craig Young, @CraigTweets In this book, the author uses interviews with key players to peel back the curtain of international cyber-espionage and warfare with the specific focus on entities of the Russian federal government. #9
  • 12. The Perfect Weapon David E. Sanger Jihana Barrett, @IAmJihanna In this book, Sanger illustrates how cyber weapons have changed the way wars are fought similar to the way the atomic bomb changed warfare in WW1. #10
  • 13. Cybersecurity Leadership Mansur Hasib Ambler T. Jackson, @AmblerJackson The author does a great job providing an academic and historical perspective of cybersecurity, including its evolution and what it is, and what it is not. #11
  • 14. Practical Packet Analysis Chris Sanders Tyler Reguly, @TReguly If you want to understand Wireshark, it is the best book on the market and it’s from the greatest publisher of technical books, No Starch Press. #12
  • 15. For the latest information security news, trends and insights, visit: www.tripwire.com/state-of-security/ What books have inspired you? Share your favorites with us @tripwireinc using #WorldBookDay