Information & Cyber Security
Book Shelf: Cyber Security Canon Winners
- How to Measure Anything in Cybersecurity Risk
- The Failure of Risk Management
- CISO Desk Reference Guide Volume 1 Stamper
- CISO Desk Reference Guide Volume 2 Stamper
- Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers
- The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage
- Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
- We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
- The Perfect Weapon: How the Cyber Arms Race Set the World Afire
- The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
- Zero Trust Networks: Building Secure Systems in Untrusted Networks
- LikeWar: The Weaponization of Social Media
- Ciso Compass: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers
- Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
- American Spies: Modern Surveillance, Why You Should Care, and What to Do about It
- Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
- Security Engineering: A Guide to Building Dependable Distributed Systems
- Site Reliability Engineering: How Google Runs Production Systems
- Worm: The First Digital World War
- Crypto: How the Code Rebels Beat the Government–Saving Privacy in the Digital Age
- Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
- Winning As a Ciso
- Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon
- Cyber War: The Next Threat to National Security and What to Do About It
- Future Crimes
- Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- Measuring and Managing Information Risk: A Fair Approach
- Tallinn Manual on the International Law Applicable to Cyber Warfare
- The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)
- Zero Day
Leadership
- The 360 Degree Leader by John C. Maxwell
- The Delicate Art of Bureaucracy by Mark Schwartz
- The 5 Levels of Leadership by John C. Maxwell
- An Elegant Puzzle by Will Larson
- The 21 Irrefutable Laws of Leadership by John C. Maxwell
- Good Strategy Bad Strategy by Richard Rumelt
Spirituality
- The Nature of Personal Reality by Jane Roberts
- Autobiography of a Yogi by Paramhansa Yogananda
- Many Lives, Many Masters by Brian L. Weiss
ADHD
Learning
- Ultralearning by Scott Young
- Steal Like an Artist by Austin Kleon
- The 15 Invaluable Laws of Growth by John C. Maxwell
- Effective Notetaking by Fiona McPherson
- Neuro-Learning by Peter Hollins
- The Inner Game of Work by W. Timothy Gallwey
- The Lifetime Learner’s Guide to Reading and Learning by Gary Hoover