Invitation to Cybersecurity

INVITATION TO CYBERSECURITY 330 Hafner, K., & Lyon, M. (1998). Where Wizards Stay Up Late: The Origins Of The Internet. Simon and Schuster. Hafner, K., & Markoff, J. (1995). Cyberpunk: Outlaws and Hackers on the Computer Frontier, Revised. Simon and Schuster. Harel, D. (2004). Computers Ltd: What They REALLY Can’t Do. Oxford University Press. Hillis, W. D. (1998). The Pattern on the Stone: The Simple Ideas That Make Computers Work. Basic Books. Hofstadter, D. R. (1999). Godel, Escher, Bach: An Eternal Golden Braid. Basic Books. Hogland, G., & McGraw, G. (2004). Software Security: Building Security In. Addison-Wesley. Isaacson, W. (2014). The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution. Simon and Schuster. Kahn, D. (1996). The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Scribner. Kaplan, F. M. (2016). Dark Territory: The Secret History of Cyber War. Simon and Schuster. Kerr, O. S. (2012). Computer Crime Law. West Academic Publishing. Kosseff, J. (2017). Cybersecurity Law. John Wiley & Sons. Krebs, B. (2014). Spam Nation: The Inside Story of Organized Cybercrime--from Global Epidemic to Your Front Door. Sourcebooks. Kurose, J. F., & Ross, K. W. (2013). Computer Networking: A Top-down Approach (6th ed.). Addison-Wesley. Levy, S. (2001). Crypto: How the Code Rebels Beat the Government, Saving Privacy in the Digital Age. Viking. Mitnick, K. (2012). Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker. Back Bay Books. Mitnick, K. D., & Simon, W. L. (2003). The Art of Deception: Controlling the Human Element of Security. John Wiley & Sons. Moore, D. (2022). Offensive Cyber Operations: Understanding Intangible Warfare. Oxford University Press, USA.

RkJQdWJsaXNoZXIy MTM4ODY=