Recommended Books
Hand-picked by the Simply Cyber community. These titles cover cybersecurity strategy, true crime, career development, and the evolving threat landscape. Start building your professional library.
The Coming Wave
Technology, Power, and the Twenty-first Century's Greatest Dilemma
Mustafa Suleyman
As a co-founder of DeepMind, Suleyman explores the profound impact of artificial intelligence, quantum computing, and other groundbreaking innovations on society. He argues that these technologies will lead to significant prosperity but also pose severe risks, including the destabilization of nation-states and potential for invasive surveillance.
Buy on Amazon open_in_new
Tracers in the Dark
The Global Hunt for the Crime Lords of Cryptocurrency
Andy Greenberg
A story of crime and pursuit unlike any other. With unprecedented access to the major players in federal law enforcement and private industry, veteran cybersecurity reporter Andy Greenberg tells an astonishing saga of criminal empires built and destroyed. He introduces an IRS agent with a defiant streak, a Bitcoin-tracing Danish entrepreneur, and a colorful ensemble of hardboiled agents and prosecutors.
Buy on Amazon open_in_new
Careless People
A Cautionary Tale of Power, Greed, and Lost Idealism
Sarah Wynn-Williams
Careless People offers cybersecurity professionals a rare, unfiltered look into how disinformation, platform decisions, and internal dysfunction at Facebook reshaped the modern world. Sarah Wynn-Williams pulls back the curtain on global influence, digital irresponsibility, and the human cost of power run amok.
Buy on Amazon open_in_new
This Is How They Tell Me the World Ends
The Cyberweapons Arms Race
Nicole Perlroth
Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
Buy on Amazon open_in_new
Show Your Work!
Austin Kleon
A practical, inspiring guide for creatives and cybersecurity professionals alike who want to build visibility without self-promotion. With 10 actionable rules, Kleon reframes networking as generosity — urging you to share your process, ideas, and lessons learned to grow your influence and community.
Buy on Amazon open_in_new
Battlefield Cyber
How China and Russia Are Undermining Our Democracy and National Security
Michael McLaughlin & William Holstein
The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain, malicious cyber activities have reached an all-time high. Russia attracts the most attention, but China is vastly more sophisticated.
Buy on Amazon open_in_new
The Phantom CISO
Mishaal Khan & Hisham Zahid
This book offers a practical and comprehensive approach to becoming successful cybersecurity leaders, whether starting in the industry or aspiring to become a great Chief Information Security Officer (CISO).
Buy on Amazon open_in_new
The Cuckoo's Egg
Tracking a Spy Through the Maze of Computer Espionage
Cliff Stoll
In this white-knuckled true story, an astronomer-turned-cyber-detective begins a personal quest to expose a hidden network of spies that threatens national security and leads all the way to the KGB.
Buy on Amazon open_in_new
Cybersecurity Career Master Plan
Proven Techniques and Effective Tips to Help You Advance in Your Cybersecurity Career
Dr. Gerald Auger, Jaclyn Scott, Jonathan Helmus & Kim Nguyen
The book starts by helping you gain a foundational understanding of cybersecurity, covering cyber law, cyber policy, and frameworks. Next, you'll focus on how to choose the career field best suited to you from options such as security operations, penetration testing, and risk analysis.
Buy on Amazon open_in_new
Fancy Bear Goes Phishing
The Dark History of the Information Age, in Five Extraordinary Hacks
Scott Shapiro
Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
Buy on Amazon open_in_new
Understand, Manage, and Measure Cyber Risk
Practical Solutions for Creating a Sustainable Cyber Program
Ryan Leirvik
This practitioner's guide lays down basic foundational components, with real client examples and pitfalls to avoid when managing cybersecurity in an organization. Leirvik provides a clear, easy-to-understand, and easy-to-deploy "playbook" for a cyber risk management approach applicable to your entire organization.
Buy on Amazon open_in_new
The Fifth Domain
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
Richard A. Clarke & Robert K. Knake
Cybersecurity experts Clarke and Knake guide us through a treacherous cyber landscape, drawing from their extensive experience in U.S. national security and corporate boardrooms. They advocate for "cyber resilience" as a strategy to thwart attackers and protect democratic institutions.
Buy on Amazon open_in_new
Cybersecurity for Space
Protecting the Final Frontier
Jacob G. Oakley
This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats.
Buy on Amazon open_in_new
Ghost in the Wires
My Adventures as the World's Most Wanted Hacker
Kevin Mitnick
Ghost in the Wires chronicles the hacks of Kevin Mitnick, the most elusive phreaker and computer hacker in history. He accessed computers and networks at the world's biggest companies, consistently remaining one step ahead of the authorities in an increasingly sophisticated game of hide-and-seek.
Buy on Amazon open_in_new
The Phoenix Project
A Novel about IT, DevOps, and Helping Your Business Win
Gene Kim, Kevin Behr & George Spafford
The Phoenix Project offers a relatable and eye-opening journey for IT and security professionals navigating the chaos of daily operations within the broader business. Through the DevOps "Three Ways," Bill learns how IT and security can become enablers of business success rather than obstacles.
Buy on Amazon open_in_new
Cult of the Dead Cow
Joseph Menn
The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom, and even democracy itself. The tale of the oldest, most respected, and most famous American hacking group of all time. They invented the concept of hacktivism and helped build cyberweapons that advanced US security.
Buy on Amazon open_in_new
FAIK
A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions
Perry Carpenter
Cybersecurity expert Perry Carpenter exposes the hidden dangers of generative AI while equipping readers with essential media literacy skills to navigate an era of digital deception. Through engaging narratives and practical insights, Carpenter explores how cybercriminals exploit AI-powered tools to create deepfakes and spread disinformation.
Buy on Amazon open_in_new
Operator Handbook
Red Team + OSINT + Blue Team Reference
Joshua Picolet
Takes three disciplines (Red Team, OSINT, Blue Team) and combines them into one complete reference guide. Contains 100+ individual cheat sheet references for many of the most frequently used tools and techniques by practitioners. The goal was to remove the artificial barriers that only certain knowledge exists within a "Team."
Buy on Amazon open_in_new
Principles of Fraud Examination
Joseph T. Wells
Bridges the gap between accounting and cybersecurity by exposing the human element behind deception. The book explores how fraud is committed, detected, and prevented, offering insight into internal threats and external attacks. With real-world cases and investigative techniques, it equips cybersecurity professionals to understand schemes beyond digital logs and alerts.
Buy on Amazon open_in_newNever Miss a Technical Deep Dive
Get notified about new book releases, exclusive course content, and Dr. Auger's latest research summaries.