Cyber Reading List




No Author Title Reference Year
1 Clarke, Richard A. and Robert A. Knake. Cyber War: The Next Threat to National Security and What to Do About It. HarperCollins; 2012 .
ISBN 978-0-06-196224-0
2 Engbretson, Patrick. The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy. New York: Syngress, 2013.
ISBN 978-0-12-411644-3
3 Doctorow, Cory Little Brother. Cory Doctorow, Little Brother, (New York: Tor, 2008.
ISBN-13: 9780765323118
4 Aldrich, Richard J GCHQ: The Uncensored Story of Britain’s Most Secret Intelligence Agency. Harper Collins, 2010.
ISBN-13: 978-0007312665
5 Andress, Jason, and Steve Winterfeld Cyber Warfare Second Edition: Techniques, Tactics and Tools for Security Practitioners. Waltham, MA: Syngress, 2014.
ISBN: 978-0-12-416672-1
6 Armistead, Leigh, ed. Information Operations: Warfare and the Hard Reality of Soft Power. Dulles, Virginia: Potomac Books, Inc., 2004.
ISBN-13:  978-1574886993
7 Bamford, James. Body of Secrets: Anatomy of the Ultra-Secret National Security Agency. Anchor Books a division of Random House Inc., 2002.
ISBN-13: 978-0385499088
8 Bowden, Mark. Worm: The First Digital World War New York: Atlantic Monthly Press, 2011.
ISBN 978-0-8021-1983-4
9 Carr, Jeffrey. Inside Cyber Warfare: Mapping the Cyber Underworld.


Inside Cyber Warfare: Mapping the Cyber Underworld – link 2

O’Reilly Media, 2009.
ISBN-13: 978-1449310042
10 Christensen, Clayton M. The Innovator’s Dilemma: The Revolutionary Book That Will Change the Way You Do Business. New York: Harper Business, 2011.
ISBN-10: 0875845851
ISBN-13: 978-0062060242
11 Harris, Shane. @War: The Rise of the Military-Internet Complex. New York: Eamon Dolan/Houghton Mifflin Harcourt, 2014.
ISBN-13: 978-0544570283
12 Harrison Dinniss, Heather. Cyber Warfare and the Laws of War (Cambridge Studies in International and Comparative Law). New York: Cambridge University Press, 2012.
ISBN-13: 978-1107416994
13 Healey, Jason, and Karl Grindal A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. Arlington, Virginia: Cyber Conflict Studies Association, 2013.
ISBN-13: 978-0989327404
14 Kaplan, Fred Dark Territory: The Secret History of Cyber War. Simon & Schuster (March 1 2016)
ISBN-13: 978-1476763255
15 Lemieux, Frederic. Current and Emerging Trends in Cyber Operations. Palgrave Macmillan, 2015.
ISBN-13: 978-1137455543
16 Liang, Qiao and Wang Xiangsui Unrestricted Warfare: China’s Master Plan to Destroy America Echo Point Books & Media; Reprint ed. edition (November 10, 2015) 2015
17 Hacking Exposed 7: Network Security Secrets and Solutions. New York: McGraw-Hill, 2012.
ISBN-13: 978-0071780285
18 Mitnick, Kevin. Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker. New York: Little, Brown and Company, 2011.
ISBN-13: 978-0316037723
19 Schmitt, Michael N, ed. Tallinn Manual on the International Law Applicable to Cyber Warfare. New York: Cambridge University Press, 2013.
ISBN-13: 978-1107613775
20 Stoll, Cliff. The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage. New York: Doubleday, 1989.
ISBN-13: 978-1416507789
21 Thomas, Timothy L. Dragon Bytes: Chinese Information-War Theory and Practice FOREIGN MILITARY STUDIES OFFICE; 1st edition 2004
22 Winterfeld, Steve, and Jason Andress. The Basics of Cyber Warfare in Theory and Practice. Waltham, MA: Syngress, 2012.
ISBN13:  9780124047372
23 Zetter, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. New York: Crown Publishers, a division of Raondom House LLC, 2014
ISBN-13: 978-0770436193


Articles & Papers


No Author Title Reference Year
1 Krekel, Bryan. Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation Northrop Grumman Corporation: Information Systems Section, 2009. 2009
2 Bernier, Melanie. Military Activities and Cyber Effects (MACE) Taxonomy. Defence R&D Canada – CORA Technical Memorandum, 2013. 2013
3 Fink, Kallie. Lt Cmdr (U.S. Navy), and Major John D. Jordan (U.S. Marine Corps) and Major James E. Wells (U.S. Air Force) Considerations for Offensive Cyberspace Operations. Military Review: May-June 2014, pp 4-11.
4 Lewis, James A. Cyberspace and Armed Forces – The case for offensive cyber capabilities. The Australian Strategic Policy Institute Limited, 2016 2016
5 Williams, Brett T. Major(U.S. Air Force) The Joint Force Commander’s Guide to Cyberspace Operations. Joint Force Quarterly 73, 2nd Quarter 2014, pp 12-19.
6 FireEye Inc, and Mandiant CYBERSECURITY’S MAGINOT LINE: A Real-World Assessment of the Defense-in-Depth Model. FireEye, Inc. and Mandiant, 2014.
7 Kagan, Frederick W. and Tommy Stiansen THE GROWING CYBERTHREAT FROM IRAN: THE INITIAL REPORT OF PROJECT PISTACHIO HARVEST American Enterprise Institute Critical Threats Project and Norse Corportation, 2015
8 United States War College Strategic Cyberspace Operations Guide Center for Strategic Leadership, United States War College, 1 June 2016 2016


Powered by Wild Apricot Membership Software