Top Books To Read In 2023

The Amazon links listed below are Cyber Recon affiliate links, we will receive a small commission if you purchase items using these links




Buy on Amazon

Sandworm

Sandworm

A strange sequence of cyberattacks first appeared in the public eye in 2014. More and more audacious attacks were launched on American utilities, NATO facilities, and Eastern European power networks. These attacks culminated in the summer of 2017, when the NotPetya virus was released, infiltrating, disrupting, and crippling some of the world’s top enterprises, ranging from pharmaceutical and software firms to transportation corporations. ATMs stopped working in the Ukrainian city in the focus of the onslaught. Trains stopped running, and mail stopped being delivered. Many hospitals lost power. The global dissemination of NotPetya resulted in the costliest cyberattack in history, estimated at $10 billion.

The hackers behind these attacks, collectively referred to as “Sandworm,” are swiftly becoming renowned as the most lethal gang of cyberwarriors in history. They are a relentless, highly competent group working for Russia’s military intelligence agency, and they are willing to conduct broad, unconstrained strikes on their enemies’ most essential infrastructure. They attack both the public and business sectors, as well as the armed forces and regular citizens.

Sandworm is a terrifying international mystery that thinks about the threat this group poses to international peace and safety. Sandworm not only reveals the truth about Russia’s worldwide digital onslaught in an age when conflict is no longer fought on the battlefield, but also about the Kremlin’s role in manipulating other governments. It demonstrates the disturbing trend toward a blurring of borders between online and offline violence, between war and peace.

two

Buy on Amazon

February Cyber Book Club Selection
Kingpin

Kingpin

Kevin Poulsen, who used to be a hacker, has established himself over the course of the previous decade as one of the most prominent investigative reporters covering the cybercrime beat. In Kingpin, he presents his unparalleled access and experience in the form of a book for the very first time. The result is an engrossing game of cat and mouse, as well as an unprecedented look into the sort of organized crime that has emerged as the hallmark of the twenty-first century.

The news quickly traveled through the underground hacking community like some kind of unstoppable new virus: Someone, some bright and audacious criminal, had just launched a hostile takeover of an online criminal network that stole billions of dollars from the economy of the United States.

The Federal Bureau of Investigation (FBI) moved quickly to initiate a significant undercover operation with the goal of locating the new kingpin, while other agencies all around the world deployed scores of moles and double agents. The cybercops worked together to capture a large number of unsuspecting hackers and bring them into custody… Despite this, their primary target consistently demonstrated an incredible ability to identify their informants and see through their schemes at every turn.

They were looking for the most improbable of criminals, which turned out to be a talented coder with a hippie philosophy who also had a secret identity as a supervillain. As the famous “white-hat” hacker Max “Vision” Butler, he was a star in the field of programming and even worked as a consultant for the FBI at one point. However, while operating under the alias “Iceman,” he discovered that the realm of data theft was an appealing opportunity to put his enormous skills to the test. He gained unauthorized access to tens of thousands of computers across the country and stole untold millions of credit card details. He was so skilled at hacking computers that he was able to take advantage of his fellow hackers and steal their ill-gotten profits. He was a part of a vast real-world criminal enterprise that was run in conjunction with a smooth-talking con artist.

three

Buy on Amazon

March Cyber Book Club Selection
The Kill Chain

The Kill Chain

Our nation has been the preeminent military power in the globe for many generations of our country’s citizens. How the United States military fights, as well as the technologies and weapons it uses in battle, have never been called into question. Nevertheless, that long-standing reality is increasingly disintegrating. Traditional sources of power in the United States are dwindling as a result of the proliferation of new technology and the increasing military threat presented by competitors such as China. The United States faces a very real possibility of being defeated in a future battle.

Artificial intelligence, autonomous systems, and other emerging technologies are currently revolutionizing global industries and are now poised to turn the model of American defense on its head. As Christian Brose reveals in this urgent wake-up call, the future will be defined by artificial intelligence, autonomous systems, and other emerging technologies. This book addresses the existential threats that are on the horizon, and it charts a method for the United States military to adapt and flourish by utilizing new ways of thinking in addition to new technologies. Although informative, this book is also alarming. The United States of America has to construct a battle network consisting of technology that will enable people to rapidly comprehend dangers, come to judgments, and carry out military actions. This is the process that is known as “the kill chain.” The Kill Chain is an examination of dangers originating from China, Russia, and other parts of the world. It gives hope and, ultimately, insights on how the United States may employ new technologies to prevent war, dissuade aggression, and preserve peace.

four

Buy on Amazon


On Cyber

On Cyber

On Cyber is a seminal study that bridges the gap between information security and military science to establish the groundwork for an operational art for cyberspace operations. There are hundreds of books that have been written on the strategies of cybersecurity, and there are dozens of books that have been written on the implications of cyberwar for strategic planning. However, there isn’t a book that connects the two of them. That void is filled by On Cyber.

Traditional kinetic warfare has been honed to a fine art over the course of millennia of battle and is now enshrined in an established and tested body of military doctrine. However, cyber operations are always changing, and although this presents a number of opportunities, it also poses a number of serious obstacles. There has been a mad dash among nations all over the world to establish cyber organizations and capabilities, but these nations are having trouble using cyber operations to their advantage. Some have been unsuccessful, while others have had a significant influence on the battlefield and the geopolitical situation throughout the world. At the same time, firms and even individuals are now confronting threats in cyberspace from country states and threat actors supported by nation states, yet their governments appear to be unable to protect them.

On Cyber is a fundamental book, and the principles you acquire from reading it will help you perform your job more effectively, regardless of whether you are a network defender or a cyber operator. Importantly, network defenders will have a solid understanding of the ways in which nation-state threat actors conceive, organize themselves, carry out their operations, and target your company. The operators of cyberspace will get a look into the future of how cyber doctrine will develop.

The authors are possibly the best two people to author such an ambitious work because they have served on the faculty of West Point for a combined 20 years, participated in military cyber operations and training, helped architect the U.S. Army’s Cyber Branch, and together possess more than 50 years of military experience. In addition, the authors have served on the faculty of West Point.

five

Buy on Amazon

May Cyber Book Club Selection
The Cuckoo's Egg

The Cuckoo’s Egg

Even before it was widely known that terrorists use the internet as a tool on a worldwide scale, one astute citizen of the United States realized its menacing potential. Armed with conclusive evidence of electronic espionage, he embarked on a very personal mission to unearth a covert network of spies that posed a risk to national security. But would the authorities agree with him and support him? The dramatic firsthand account that Cliff Stoll provides is described by Smithsonian as “a computer-age detective thriller that is instantly engaging [and] stunningly captivating.”

Cliff Stoll, who had formerly worked as an astronomer but was now employed as a systems manager at Lawrence Berkeley Lab, was alerted to the presence of an illegal user on his system by an accounting error involving 75 cents. “Hunter” was the code name given to the hacker, who was an unknown intruder who was successful in breaking into US computer networks and stealing vital information related to military and security. Stoll started his own investigation, which consisted of eavesdropping on the person who was spying on him. It was a risky game of deceit that involved broken codes, satellites, and missile bases – a one-man sting operation that eventually caught the notice of the CIA…and ultimately led to the capture of a worldwide spy ring that was fueled by cash, cocaine, and the KGB.

six

Buy on Amazon

June Cyber Book Club Selection
Hacking the Art of Exploitation

Hacking – The Art of Exploitation

Hacking is the art of finding creative solutions to challenging problems, whether that means discovering an unusual solution to a difficult problem or exploiting weaknesses in sloppy code. Hacking may also be thought of as the art of solving problems. There are a lot of people who say they are hackers, but very few actually have the solid technical foundation that is necessary to really push the edge.

The author, Jon Erickson, does not only demonstrate how to utilize pre-existing vulnerabilities; rather, he elucidates the inner-workings of obscure hacking techniques. The second edition of Hacking: The Art of Exploitation presents an overview of the principles of C programming from the point of view of a hacker. This is done with the intention of making the art and science of hacking available to a wider audience.

You won’t need to make any changes to your existing operating system because the LiveCD that comes with the package gives you access to a full Linux development and debugging environment. Utilize it to fill in any knowledge gaps you may have and investigate various hacking tactics on your own as you follow along with the examples provided in the book. Participate actively in the debugging of code, the overflowing of buffers, the hijacking of network traffic, the bypassing of protections, the exploiting of cryptographic weaknesses, and possibly even the invention of new exploits. You will learn in this book how to do the following things: Computers can be programmed through the use of C, assembly language, and shell scripts.
– By exploiting buffer overflows and format strings, corrupt the memory of the system in order to run arbitrary code.
– Examine the processor registers and the memory of the system using a debugger in order to obtain an accurate comprehension of what is taking place — Find a way to circumvent conventional security precautions such as nonexecutable stacks and intrusion detection systems – You can disguise your presence by modifying the way a server logs activity after gaining access to a remote server using port-binding or connect-back shellcode and then hiding your presence.
– Traffic on the network can be redirected, open ports can be hidden, and TCP connections can be taken over — Use the FMS attack to decrypt wireless traffic that has been encrypted, and use a password probability matrix to speed up brute-force attacks.

Hackers are always exploring new territory, expanding their knowledge of the unknown, and developing their artistic skills. Even if you are not previously familiar with programming, the second edition of Hacking: The Art of Exploitation will provide you with a comprehensive understanding of programming, machine architecture, network connections, and the various hacking techniques that are now in use. When you combine this information with the Linux environment that is provided, the only thing missing is your own originality.

seeven

Buy on Amazon

July Cyber Book Club Selection
Fifth Domain

The Fifth Domain

An urgent new warning from two security experts who have written books that have sold millions of copies, as well as a riveting look inside at how governments, businesses, and ordinary citizens can confront and contain the tyrants, hackers, and criminals who are intent on turning the digital realm into a war zone.

“In the battle raging between offense and defense in cyberspace, Clarke and Knake have some important ideas about how we can avoid cyberwar for our country, prevent cybercrime against our companies, and in doing so, reduce resentment, division, and instability at home and abroad.” (Bill Clinton)

The shadowy parts of cyberspace contain many terrifying things to be afraid of. We have entered an era in which online threats can have real-world consequences. This is evidenced by well-known stories such as the Stuxnet attack, which helped slow down Iran’s nuclear program. Less well-known stories include EternalBlue, the cyber battle that took place in 2017 and caused hospitals in Britain to close and shipping crates in Germany to freeze in midair. However, we are not obligated to sit back and watch as crooks and autocrats run rampant in the digital arena. We now have a significant amount of knowledge regarding how to make cyberspace significantly safer, as well as how to protect our nation’s security, economy, democracy, and privacy from being compromised by cyberattacks.

This is a book about the fifth domain, which is the term used by the Pentagon to refer to cyberspace. This is a domain in which no one should ever desire to fight a war. Our tour leaders are two of the most highly regarded cybersecurity professionals in the United States. Both are seasoned practitioners who are equally at home in the Situation Room of the White House as they are in the boardrooms of Fortune 500 companies. The authors, Richard A. Clarke and Robert K. Knake, take the reader on a vivid and captivating tour of the often unknown terrain of cyberspace. They introduce us to the scientists, executives, and public servants who have learned through hard experience how government agencies and private firms can defend themselves against cyber threats.

Clarke and Knake take us inside quantum-computing labs that are in a race to develop cyber superweapons; bring us into the boardrooms of the many businesses that have been hacked and the few that have not; and walk us through the corridors of the United States intelligence community with officials who are working to defend America’s elections from foreign malice. They make a compelling case for “cyber resilience,” which involves building systems that are able to resist the majority of attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding the trap of overreacting to digital attacks. They do this by focusing on solutions rather than scaremongering, which is a common tactic.

Above all else, Clarke and Knake show us how to preserve the fifth domain a buzzing engine of economic growth and human progress by not giving in to those who would turn it into a wasteland of conflict. This can be accomplished by not giving in to those who would convert it into a wasteland of conflict. The Fifth Domain is a gripping, agenda-setting insider look at what works in the effort to avoid cyberwar, backed by decades of high-level experience in both the White House and the commercial sector.

eight

Buy on Amazon

August Cyber Book Club Selection
Risk a users guide

Risk – A Users Guide

Stan McChrystal, a retired four-star general, has led a life that has been closely identified with the potentially lethal dangers of combat. McChrystal has observed how individuals and companies fail to manage risk throughout his career, beginning with his first day at West Point, continuing through his years in Afghanistan, and culminating in his efforts to assist corporate executives in navigating a worldwide pandemic. Why? Simply because they concentrate their attention on the likelihood of something occurring rather than the means through which it can be controlled or managed.

In his newest book, “Fighting Fires,” General Stanley McChrystal presents a tried-and-true method for identifying danger and taking appropriate action. Instead of framing risk as a force that needs to be predicted, McChrystal and her collaborator Anna Butrico demonstrate that there are in reality ten aspects of control that may be adjusted at any given time. By keeping a close eye on these controls, we can ensure that our Risk Immune System is in good shape. This gives us the ability to successfully anticipate, recognize, investigate, and respond to the ever-present risk that things will not go according to plan.

McChrystal illustrates how these 10 factors are always in effect by drawing on examples ranging from military history to the business world and offering practical exercises to improve preparedness. He also demonstrates how individuals and organizations can exert mastery over every conceivable type of risk that they might face by considering these 10 factors and how they are always in effect.

We may not be able to see what lies ahead, but with McChrystal’s advice, we can strengthen our resistance and construct a robust defense against both what we know and what we don’t know.

nine

Buy on Amazon

September Cyber Book Club Selection
AI Super Powers

AI Super Powers

One of the most well-respected experts in the world on artificial intelligence and China, Dr. Kai-Fu Lee, explains that China has unexpectedly caught up to the United States at an amazingly swift and unexpected speed.

Kai-fu Lee makes a compelling case in his book, AI Superpowers, that because of recent groundbreaking advancements in artificial intelligence, momentous changes are on the horizon far sooner than many of us anticipated they would be. In point of fact, as the battle between the United States and China in the field of artificial intelligence (AI) continues to heat up, Lee urges both countries to acknowledge and enthusiastically embrace the enormous responsibilities that come along with tremendous technological strength. Already, the vast majority of experts agree that artificial intelligence would have a catastrophic effect on blue-collar jobs. However, Lee believes that both Chinese and American AI will have a significant impact on white-collar occupations in the near future. Is a universal basic income the answer to our problems? According to Lee’s assessment, it’s highly unlikely. But he gives a clear picture of which jobs will be affected and how soon, which jobs can be upgraded with AI, and most crucially, how we can supply solutions to some of the most profound shifts in human history that are coming shortly.



Buy on Amazon

October Cyber Book Club Selection
Chinese Cyber Nationalism

Chinese Cyber Nationalism

This book provides the first exhaustive analysis of the social and ideological movement known as Chinese Cyber Nationalism. This movement blends the cultural traditions of Confucianism with modern forms of media. Over the course of the last ten years, the Internet has evolved into a communication hub, organizational platform, and channel of execution for the purpose of promoting Chinese nationalist causes all over the world. Dr. Xu Wu traces the path of the movement’s evolution as it progressed through five distinct phases of development over the course of a period of twelve years. This book provides an analysis of the characteristics of the movement as well as the political implications that stem from it. The analysis is accomplished through the utilization of online surveys as well as in-depth interviews with leading intellectuals in China, foreign policy makers, and nationalist webmasters. Xu provides academics with an original framework to help them comprehend China’s modernisation and its momentous re-entry onto the world stage. The study of political communication and China’s foreign policy should definitely include an examination of the phenomenon of Chinese cyber nationalism.

eleven

Buy on Amazon

November Cyber Book Club Selection
invasion of privacy

Invasion of Privacy

Ads that pop up on your screen, cookies that track your activity, spyware, junk mail, and calls from telemarketers. Your personal information has become more valuable as a result of the rapid pace of technological advancement, making you a potential target. Your profile has been made public, and it is not just available to the highest bidder; rather, it is available to anybody who places a bid. Our privacy is being invaded on multiple fronts, including by technology, advertising, the media, and the government. Invasion of Privacy reveals the risks and offers a workable solution for protecting one’s privacy. The film “Invasion of Privacy” is about individuals; people who use technology for both good and evil purposes; people who are victims of technology; and people who are victims of technology who become avengers by turning the tables on the technology that victimizes them.



Buy on Amazon

December Cyber Book Club Selection

The Art of War

The words that are contained within this audiobook were penned over two and a half thousand years ago; nonetheless, they continue to ring just as true today as they did in China in the fifth century BC. In the 1980s, best-selling novelist and master storyteller James Clavell (Shgun) brought The Art of War to wider popularity in the Western world. He also demonstrated how the book’s lessons could be applied on a smaller scale and used for personal improvement. The marvelously vivid introduction written by Clavell as well as the helpful comments scattered throughout the text lead the listener through the preparations and combat plans, the appropriate use of weapons, and the knowledge of when to fight and when not to fight.

This military treatise displays the fine art of knowing both one’s enemy and oneself by demonstrating a profound awareness of both military strategy and the nature of human beings. The Art of War has become mandatory reading for anybody who is interested in finding a route of success through the modern world. This includes military leaders, CEOs, and even people who simply want to be more powerful in their own lives.