Best Books on Privacy

7 books on the list
Sort by
Number of Articles
Layout

The Code Book
The Science of Secrecy from Ancient Egypt to Quantum Cryptography
This fascinating book delves into the history of encryption, outlining its evolution and revealing the profound effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, to the Navajo Code Talkers, to the breakthrough that made internet commerce secure, The Code Book tells the story of secrecy as the most powerful intellectual weapon ever known. With in-depth technical explanations and portraits of notable figures, this book is both accessible and gripping, forever changing the reader's view of history and what drives it. It will make you wonder just how private your messages truly are.
Featured in 2 articles

Practical Malware Analysis
The Hands-On Guide to Dissecting Malicious Software
Discover the tools and techniques used by professional analysts to safely analyze, debug, and disassemble any malicious software that comes your way. Practical Malware Analysis teaches you how to overcome malware tricks and analyze special cases of malware with real-life examples. Hands-on labs challenge you to practice and synthesize your skills, ensuring you have what it takes to succeed in the ever-changing world of malware analysis.
Featured in 2 articles
Follow the escapades of a legendary hacker as he bypasses the security measures of big corporations like Sun Microsystems, Digital Equipment Corporation, and Nokia. In Ghost in the Wires, the author provides a first-hand account of his passion for trickery and adventure. This memoir offers a complete retelling of his exploits and is the most comprehensive book on the subject to date.
Featured in 2 articles

Future Crimes
Inside the Digital Underground and the Battle for Our Connected World
In "Future Crimes," a security expert takes readers on a journey into the dark underbelly of technology, revealing how criminals, companies, and even countries are using emerging technologies to harm individuals. From hacked baby monitors to GPS stalkers, no aspect of modern technology is immune to exploitation. And with even more advanced technologies on the horizon, such as the Internet of Things, the risks grow exponentially. Goodman offers clear steps to avoid the pitfalls of tomorrow and take back control of our devices before it's too late.
Featured in 2 articles
Recommended by
Matt BurgessLearn how to adopt a structured approach to threat modeling with this comprehensive guide, which covers all methods and is up-to-date with the latest threats. Whether you're a security professional, software developer or systems manager with security responsibilities, this jargon-free and accessible introduction provides actionable advice without being tied to specific software, operating systems or languages. With tools, frameworks and examples to follow, you can break away from a technology-centered way of thinking and focus on threats and effective operational countermeasures. Don't view software security as an afterthought - make it a priority.
Featured in 2 articles

The Art of Invisibility
The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Learn to protect yourself in the age of Big Brother and Big Data. In this explosive yet practical book, the world's most famous hacker illustrates what is happening without your knowledge, and teaches you "the art of invisibility." He provides both online and real life tactics and inexpensive methods to protect you and your family, including advanced "elite" techniques to maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.
Featured in 2 articles
This computer security book is a must-read for businesses and consumers alike. "Hacking Exposed 7" covers advanced persistent threats, wireless security, malware, and more to keep you up-to-date on the latest security measures. The book uses technical rigor and from-the-trenches experience to make computer technology usage and deployments safer and more secure. With a new "5 Deployments" approach and updated information on Microsoft Windows Server 2010, Cisco, and data theft, this book is a valuable tool for anyone interested in computer security.
Featured in 2 articles