• Emergency Incident Response
  • Emergency Incident Response
  • Services
    • Managed Security
    • Cybersecurity Assessments
    • Compliance
    • Software & Application Development
    • Training
  • Industries
    • Financial Services
    • Healthcare
    • Manufacturing
    • Legal
    • Transportation
    • Federal Government Cybersecurity
    • State & Local Government
  • Company
    • About
    • Our Partners
    • Intellectual Property
  • Resources
  • Careers
  • Contact
  • LinkedIn
  • Twitter
Insights
March 31, 2021
Gartner: Top Risk Management Trends for 2021
Gartner hosted their annual Security and Risk Management Summit where Research Vice President, Peter Firstbrook, presented ...
Insights
November 2, 2020

The Top 5 CS Books You Should Read

If you’re interested in expanding your cybersecurity knowledge, we gathered a list of cybersecurity books you should read.

The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security by Allison Cerra
This book is a step-by-step guide to protecting your organization from online threats and integrating good security habits into every employee’s everyday life. It includes actionable plans, easy-to-follow methods, and proven strategies to protecting your business. IT security is the responsibility of every employee, and this book explains how to develop the culture of improving the online habits of every employee.

Hacking: The Art of Exploitation By Jon Erickson
This book explains the technical aspects of hacking. Erickson includes common security issues in programming, networking, and cryptography. The more you understand about the techniques behind hacking the better prepared you can make your business to stay safe from an attack.

The Art of Invisibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data by Kevin D. Mitnick, Robert Vamosi
Kevin Mitnick is the world’s most famous and formerly most wanted computer hacker, and in his book, he explains how consumers’ identities are being watched and stolen. He also provides step-by-step instructions on how to best protect yourself online and ensure your privacy.

Social Engineering: The Science of Human Hacking by Christopher Hadnagy
In this book, Hadnagy explores the human side of a cyber-attack. Social engineering relies on human fault to gain access to sensitive information. The book dives into the most commonly used techniques, how they have been used in the past, and how you can better protect your business and sensitive data.

The Hacker Playbook: Practical Guide to Penetration Testing by Peter Kim
This straightforward guide features real-life examples and advice from some of the top cybersecurity professionals in the field. For a seasoned security professional or someone starting out in their career, this playbook is essential to learning and understanding the framework for running a successful penetration test.

Do you have a book to add to the list? Tweet us your recommendation at @Software_Blue.

Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on LinkedIn
  • Share by Mail
Back to Blogs
Blue Star provides managed cybersecurity services, IT network security assessments, custom application development, and training and compliance services. With more than a decade of experience leading the nation’s most advanced IT security programs, we deliver heightened resilience and peace of mind to commercial enterprises. Your customers and employees trust you to safeguard their data. With the Blue Star team in your corner, you’re empowered to deliver results.
  • LinkedIn
  • Twitter
  • Services
  • Company
  • Industries
  • Resources
  • Careers
  • Contact

© Blue Star 2023

Sitemap | Privacy Policy

Scroll to top