Invitation to Cybersecurity

Bibliography 331 Payne, B. (2022). Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense. No Starch Press. Petzold, C. (2022). Code: The Hidden Language of Computer Hardware and Software. Microsoft Press. Poulsen, K. (2011). Kingpin: How One Hacker Took Over the Billion-dollar Cybercrime Underground. Crown. Quinn, M. J. (2017). Ethics for the Information Age. Pearson. Raymond, E. S. (1999). The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary. O’Reilly Media. Richards, J. W. (2018). The Human Advantage: The Future of American Work in an Age of Smart Machines. Forum Books. Rosenberg, S. (2008). Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software. Three Rivers Press. Sanger, D. E. (2018). The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Crown. Schmitt, M. N. (Ed.). (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press. Schneider, G., & Gersting, J. (2015). Invitation to Computer Science (7th ed.). Cengage Learning. Schneier, B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons. Schneier, B. (2000). Secrets and Lies: Digital Security in a Networked World. John Wiley & Sons. Schneier, B. (2015). Data and Goliath: The Hidden Battles To Capture Your Data And Control Your World. National Geographic Books. Schneier, B. (2019). Click Here to Kill Everybody: Security and Survival in a Hyper-connected World. National Geographic Books. Schneier, B. (2023). A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back. National Geographic Books. Silberschatz, A., Gagne, G., & Galvin, P. B. (2011). Operating System Concepts (8th ed.). Wiley.

RkJQdWJsaXNoZXIy MTM4ODY=