{"id":2,"date":"2018-01-11T09:32:32","date_gmt":"2018-01-11T17:32:32","guid":{"rendered":"http:\/\/pages.palomar.edu\/dmeske\/?page_id=2"},"modified":"2020-05-27T11:35:44","modified_gmt":"2020-05-27T18:35:44","slug":"books-page","status":"publish","type":"page","link":"https:\/\/pages.palomar.edu\/dmeske\/books-page\/","title":{"rendered":"Books to Read"},"content":{"rendered":"<p>Over the years, there have been specific books that have influenced my career in Cybersecurity and others that provide a good historical foundation to the cybersecurity field. Some of these books are technical in nature, but a majority of them are not. If you have any interest in computers, hacking, or cybersecurity in general, you may want to review one or more of the following books. Enjoy!<\/p>\n<p>Ghost in the Wires (Kevin Mitnick)<\/p>\n<p>The Art of Invisibility (Kevin Mitnick)<\/p>\n<p>The Cuckoo&#8217;s Egg (Clifford Stoll)<\/p>\n<p>Silicon Snake Oil (Clifford Stoll)<\/p>\n<p>SPAM Nation (Brian Krebs)<\/p>\n<p>Fatal System Error (Joseph Menn)<\/p>\n<p>Cult of the Dead Cow (Joseph Menn)<\/p>\n<p>Dark Territory: The Secret History of Cyber War (Fred Kaplan)<\/p>\n<p>&nbsp;<\/p>\n<h4 class=\"title\"><strong>Supplemental Reading Based on Your Needs<\/strong><\/h4>\n<p class=\"title\"><strong>Linux Fundamentals<\/strong><\/p>\n<p class=\"p1\">LINUX BASICS FOR HACKERS: Getting Started with Networking, Scripting, and Security in Kali by OccupyTheWeb<\/p>\n<p class=\"title--1IuUh\">The Linux Command Line, 2nd Edition by William E. Shotts<\/p>\n<p class=\"p1\">A Practical Guide to Red Hat\u00ae Linux\u00ae, Third Edition: Fedora\u2122 Core and Red Hat Enterprise Linux by Mark G. Sobell<\/p>\n<p class=\"title\"><strong>Kali Linux<\/strong><\/p>\n<p class=\"p1\">Beginning Ethical Hacking with Kali Linux by Sanjib Sinha<\/p>\n<p class=\"title t-title\">Kali Linux &#8211; An Ethical Hacker&#8217;s Cookbook by Himanshu Sharma<\/p>\n<p class=\"subtitle\">Kali Linux Revealed \u2013 Mastering the Penetration Testing Distribution<\/p>\n<p class=\"title\"><strong>PenTesting<\/strong><\/p>\n<p class=\"title\">Penetration Tester by 30Bird Media<\/p>\n<p class=\"moderatorPanelToggler\">Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman<\/p>\n<p class=\"moderatorPanelToggler\">Metasploit: The Penetration Tester&#8217;s Guide<\/p>\n<p class=\"title\"><strong>Social Engineering<\/strong><\/p>\n<p class=\"title t-title\">No Tech Hacking by Kevin Mitnick &amp; Johnny Long<\/p>\n<p class=\"title--1IuUh\">The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick, William L. Simon and Steve Wozniak<\/p>\n<p class=\"title\"><strong>Password Cracking<\/strong><\/p>\n<p class=\"moderatorPanelToggler\">Hash Crack: Password Cracking Manual by Joshua Picolet<\/p>\n<p class=\"moderatorPanelToggler\"><strong>Cryptography<\/strong><\/p>\n<p class=\"title t-title\">Computer Security and Cryptography by Alan G. Konheim<\/p>\n<p class=\"moderatorPanelToggler\">Serious Cryptography: A Practical Introduction to Modern Encryption by Jean-Philippe Aumasson<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the years, there have been specific books that have influenced my career in Cybersecurity and others that provide a good historical foundation to the cybersecurity field. Some of these books are technical in nature, but a majority of them are not. If you have any interest in computers, hacking, or cybersecurity in general, you [&hellip;]<\/p>\n","protected":false},"author":50,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"_acf_changed":false,"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-2","page","type-page","status-publish","hentry"],"acf":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P6Sp7b-2","_links":{"self":[{"href":"https:\/\/pages.palomar.edu\/dmeske\/wp-json\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pages.palomar.edu\/dmeske\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pages.palomar.edu\/dmeske\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pages.palomar.edu\/dmeske\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/pages.palomar.edu\/dmeske\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":5,"href":"https:\/\/pages.palomar.edu\/dmeske\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":220,"href":"https:\/\/pages.palomar.edu\/dmeske\/wp-json\/wp\/v2\/pages\/2\/revisions\/220"}],"wp:attachment":[{"href":"https:\/\/pages.palomar.edu\/dmeske\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}