Books

software quality - cybersecurity books

Software quality

Are your systems build for change?
Are you measuring technical debt?
Are you suffering from low developer productivity?
If you cannot answer these questions, this ebook is written for 
you! Within 90 pages you will understand the most important software quality concepts.

Social Engineering - cybersecurity books

Social Engineering

This book contains the most common social engineering threats. You will understand why people are the weakest link in your organisation’s security posture. You will understand the following without having to understand technical stuff (e.g. source code):
1) what the most common social engineering threats and are,
2) the impact per threat for your business,
3) how these threats can be executed and / or mitigated.

we have root - cybersecurity books

Bruce Schneier

In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the  role of technology in national security, war, transportation, the Internet of Things, elections, and more. 

data and goliath

Bruce Schneier

Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you’re unemployed, sick, or pregnant. You’ll never look at your phone, your computer, your credit cards, or even your car in the same way again.

cybersecurity books

Hubbard and Seiersen

Insightful and enlightening, this book will inspire a closer examination of your company’s own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing—as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.

het is oorlog - cybersecurity books

Huib Modder-kolk

[Dutch] Modderkolk beschrijft stapsgewijs hoe groot de afhankelijkheid van technologie is en welke risico’s daarmee gepaard gaan. Vijandige regimes dringen ongezien Nederlandse organisaties binnen en overheden en bedrijven slurpen data. Iedere ontdekking roept nieuwe vragen op. Hoe ver reiken de tentakels van de Nederlandse veiligheidsdiensten? En hoe kunnen we onszelf beschermen?

Je hebt wel iets te verbergen

Martijn and Tokmet-zis

[Dutch] In Je hebt wél iets te verbergen laten onderzoeksjournalisten Maurits Martijn en Dimitri Tokmetzis zien waarom privacy het meest bedreigde mensenrecht van onze tijd is. Hun journalistieke zoektocht voor De Correspondent werd de afgelopen jaren bekroond met diverse prijzen, waaronder De Loep voor de beste online onderzoeksjournalistiek.

Edward Snowden

Edward Snowden

Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
Maria Genova

Maria Genova

[Dutch] Maria Genova laat zich hacken. Met een onthutsend resultaat. Ook begeeft ze zich zelf op het schimmige hackerspad. Na een schokkende, maar soms ook hilarische zoektocht op het randje van de privacy, kijk je met heel andere ogen naar je computer. Het boek eindigt met talloze tips van experts om identiteitsfraude te voorkomen.
Brenno de winter

Brenno de winter

[Dutch] Dit boek biedt een praktische, pragmatische insteek op het gebied van informatieveiligheid zonder het te oversimplificeren. We bannen de cybersecurityvoodoo uit en maken het thema beheersbaar.

Arjan Kamp-huis

Arjan Kamp-huis

This FREE handbook is a very important practical tool for journalists. And it is of particular importance to investigative reporters. Although this handbook is largely about how to use your computer, you don’t need to have a computer science degree to use it.
software security

Gary McGraw

The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle.

Full disclosure: this page contains affiliate links. Income is used to, among other things, pay for hosting.