Cybersecurity

Details
Rating
Readers Count
Controls
A Vulnerable System: The History of Information Security in the Computer Age
A Vulnerable System: The History of Information Security in the Computer Age
  • Andrew J Stewart
31 read
Cyber Privacy
Cyber Privacy
  • April Falcon Doss
31 read
Cybersecurity Myths and Misconceptions
Cybersecurity Myths and Misconceptions
  • Eugene H. Spafford
  • Leigh Metcalf
  • Josiah Dykstra
00 reads
“I Have Nothing to Hide”
“I Have Nothing to Hide”
  • Heidi Boghosian
32 reads
My Glorious Defeats
My Glorious Defeats
  • Barrett Brown
00 reads
Number Go Up: Inside Crypto's Wild Rise and Staggering Fall
Number Go Up: Inside Crypto's Wild Rise and Staggering Fall
  • Zeke Faux
4.252 reads
Sandworm
Sandworm
  • Andy Greenberg
4.1772 reads
She’s In CTRL: How women can take back tech – to communicate, investigate, problem-solve, broker deals and protect themselves in a digital world
She’s In CTRL: How women can take back tech – to communicate, investigate, problem-solve, broker deals and protect themselves in a digital world
  • Anne-Marie Imafidon
01 read
Technocolonialism
Technocolonialism
  • Mirca Madianou
00 reads
The Age of Surveillance Capitalism
The Age of Surveillance Capitalism
  • Shoshana Zuboff
3.861 reads
Cover 2

The Hacker and the State

The Hacker and the State
  • Ben Buchanan
53 reads
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
  • Nicole Perlroth
4.0745 reads
This Machine Kills Secrets: How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
This Machine Kills Secrets: How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
  • Andy Greenberg
4.52 reads
Tracers in the Dark
Tracers in the Dark
  • Andy Greenberg
4.5322 reads
Why Privacy Matters
Why Privacy Matters
  • Neil Richards
02 reads