Reading List

Information & Cyber Security

Book Shelf: Cyber Security Canon Winners

  1. How to Measure Anything in Cybersecurity Risk
  2. The Failure of Risk Management
  3. CISO Desk Reference Guide Volume 1 Stamper
  4. CISO Desk Reference Guide Volume 2 Stamper
  5. Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers
  6. The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage
  7. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
  8. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
  9. The Perfect Weapon: How the Cyber Arms Race Set the World Afire
  10. The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
  11. Zero Trust Networks: Building Secure Systems in Untrusted Networks
  12. LikeWar: The Weaponization of Social Media
  13. Ciso Compass: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers
  14. Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
  15. American Spies: Modern Surveillance, Why You Should Care, and What to Do about It
  16. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  17. Security Engineering: A Guide to Building Dependable Distributed Systems
  18. Site Reliability Engineering: How Google Runs Production Systems
  19. Worm: The First Digital World War
  20. Crypto: How the Code Rebels Beat the Government–Saving Privacy in the Digital Age
  21. Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
  22. Winning As a Ciso
  23. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon
  24. Cyber War: The Next Threat to National Security and What to Do About It
  25. Future Crimes
  26. Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
  27. Measuring and Managing Information Risk: A Fair Approach
  28. Tallinn Manual on the International Law Applicable to Cyber Warfare
  29. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)
  30. Zero Day

Leadership

  1. The 360 Degree Leader by John C. Maxwell
  2. The Delicate Art of Bureaucracy by Mark Schwartz
  3. The 5 Levels of Leadership by John C. Maxwell
  4. An Elegant Puzzle by Will Larson
  5. The 21 Irrefutable Laws of Leadership by John C. Maxwell
  6. Good Strategy Bad Strategy by Richard Rumelt

Spirituality

  1. The Nature of Personal Reality by Jane Roberts
  2. Autobiography of a Yogi by Paramhansa Yogananda
  3. Many Lives, Many Masters by Brian L. Weiss

ADHD

  1. Thriving With Adult ADHD by Phil Boissiere MFT

Learning

  1. Ultralearning by Scott Young
  2. Steal Like an Artist by Austin Kleon
  3. The 15 Invaluable Laws of Growth by John C. Maxwell
  4. Effective Notetaking by Fiona McPherson
  5. Neuro-Learning by Peter Hollins
  6. The Inner Game of Work by W. Timothy Gallwey
  7. The Lifetime Learner’s Guide to Reading and Learning by Gary Hoover

Creative Expression

  1. The War of Art by Steven Pressfield
  2. Show Your Work! by Austin Kleon

Psychology

  1. Get Anyone to Do Anything by David J. Lieberman
  2. Mind Lines by L. Michael Hall

Project Management

  1. Goal Setting by Brian Tracy
  2. Deeply Practical Project Management by William Stewart
You've successfully subscribed to Ishan Girdhar
Great! Next, complete checkout to get full access to all premium content.
Error! Could not sign up. invalid link.
Welcome back! You've successfully signed in.
Error! Could not sign in. Please try again.
Success! Your account is fully activated, you now have access to all content.
Error! Stripe checkout failed.
Success! Your billing info is updated.
Error! Billing info update failed.