Home > Articles

This chapter is from the book

Further Reading

Anderson, Ross. Security Engineering, 3rd ed. Wiley, 2020.

Barnum, Todd. The Cybersecurity Manager’s Guide. O’Reilly, 2021.

Bishop, Matt. Computer Security: Art and Science. Pearson, 2019.

Garfinkel, Simson, and Spafford, Eugene. Web Security, Privacy, & Commerce, 2nd ed. O’Reilly and Associates, 2002.

Hubbard, Douglas W., and Seiersen, Richard. How to Measure Anything in Cybersecurity Risk. Wiley, 2016.

Kaufman, Charlie. Network Security: Private Communication in a Public World, 2nd ed. (R. Perlman and M. Speciner, eds.). Pearson, 2002.

Lipner, Steven B. “The Birth and Death of the Orange Book,” IEEE Annals of the History of Computing. Vol. 37, No. 2 (2015): 19–31; https://muse.jhu.edu/article/584410.

Loscocco, Peter A., Smalley, Stephen D., Muckelbauer, Patrick A., Taylor, Ruth C., Turner, Jeff S., and Farrell, John F. “The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments,” Proceedings of the 21st National Information Systems Security Conference, 1998.

Miller, Alyssa. Cybersecurity Career Guide. Manning, 2022.

NIST Risk Management Framework. https://csrc.nist.gov/Projects/risk-management.

NIST Zero Trust Architecture. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf.

Patton, Helen. Navigating the Cyber Security Career Path. Wiley, 2022.

Pfleeger, Charles P., et al. Security in Computing, 5th ed. Pearson, 2015.

Rasner, Gregory C. Cybersecurity and Third-Party Risk. Wiley, 2021.

Saydjari, O. Sami. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time, 1st ed. McGraw-Hill Education, 2018.

Viega, John. The Myths of Security: What the Computer Security Industry Doesn’t Want You to Know. O’Reilly, 2009.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.