Bibliography “It said what he would have said, if it had been possible for him to set his scattered thoughts in order. It was the product of a mind similar to his own, but enormously more powerful, more systematic, less fear-ridden. The best books, he perceived, are those that tell you what you know already.” - 1984 by George Orwell This textbook is a synthesis of many books that have shaped my understanding of cybersecurity. Listed below are several that have had varying levels of influence on this textbook. Bishop, M. A. (2003). Computer Security: Art and Science. Addison-Wesley Professional. Bowden, M. (2012). Worm: The First Digital World War. Grove Press. Brams, S. J. (2003). Biblical Games: Game Theory and the Hebrew Bible. MIT Press. Brooks, F. P. (1995). The Mythical Man-Month: Essays on Software Engineering. Addison-Wesley Professional. Camerer, C. (2003). Behavioral Game Theory: Experiments in Strategic Interaction. Princeton University Press. Chapple, M., Stewart, J. M., & Gibson, D. (2018). (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide. John Wiley & Sons. Colman, A. M. (1995). Game Theory and its Applications in the Social and Biological Sciences. Psychology Press. Conrad, E., Misenar, S., & Feldman, J. (2015). CISSP Study Guide. Syngress Publishing. Du, W. (2022). Computer & Internet Security: A Hands-on Approach (3rd ed.). Self-published. Erickson, J. (2008). Hacking: The Art of Exploitation, 2nd Edition. No Starch Press. Fischerkeller, M. P., Goldman, E. O., & Harknett, R. J. (2022). Cyber Persistence Theory: Redefining National Security in Cyberspace. Oxford University Press, USA. Goodman, M. (2015). Future Crimes: Everything is Connected, Everyone is Vulnerable and What We Can Do about it. Doubleday Books.
RkJQdWJsaXNoZXIy MTM4ODY=