Computer Security


Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
The Art of Deception: Controlling the Human Element of Security
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Secrets and Lies: Digital Security in a Networked World
Digital Fortress
Hacking: The Art of Exploitation w/CD
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Hacking Exposed: Network Security Secrets & Solutions
Metasploit: The Penetration Tester's Guide
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Gray Hat Hacking : The Ethical Hacker's Handbook
Bruce Schneier
Computer security can simply be protecting your equipment and files from disgruntled employees, spies, and anything that goes bump in the night, but there is much more. Computer security helps ensure that your computers, networks, and peripherals work as expected all the time, and that your data is safe in the event of hard disk crash or a power failure resulting from an electrical storm. Computer security also makes sure no damage is done to your data and that no one is able to read it unless y ...more
Bruce Schneier

Computer hacking was like a chemical bond holding us all together.
Rachel Zhang, The Emotional Embodiment of Stars

More quotes...
Infosec NZ reading group
1 member, last active 6 years ago
This group is about sharing the latest and greatest innovations from Google Cloud, one of the la…more
1 member, last active one year ago