Cyber Reading List

The following is a recommended list of cyber-related readings provided by D Cyber Ops FD.

Books

No

Author Title Reference

Year

1

Clarke, Richard A. and Robert A. Knake. The Fifth Domain: Defending our Country, Our Companies, and Ourselves in the Age of Cyber Threats. Penguin Random House; 2019.   ISBN 978-0-52-556196-5 2019

2

Clarke, Richard A. and Robert A. Knake. Cyber War: The Next Threat to National Security and What to Do About It. HarperCollins; 2012 .
ISBN 978-0-06-196224-0
2012

3

Engbretson, Patrick. The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy. New York: Syngress, 2013.
ISBN 978-0-12-411644-3
2013

4

Doctorow, Cory Little Brother. Cory Doctorow, Little Brother, (New York: Tor, 2008.
ISBN-13: 9780765323118
2008

5

Aldrich, Richard J GCHQ: The Uncensored Story of Britain’s Most Secret Intelligence Agency. Harper Collins, 2010.
ISBN-13: 978-0007312665
2010

6

Andress, Jason, and Steve Winterfeld Cyber Warfare Second Edition: Techniques, Tactics and Tools for Security Practitioners. Waltham, MA: Syngress, 2014.
ISBN: 978-0-12-416672-1
2014

7

Armistead, Leigh, ed. Information Operations: Warfare and the Hard Reality of Soft Power. Dulles, Virginia: Potomac Books, Inc., 2004.
ISBN-13: 978-1574886993
2004

8

Bamford, James. Body of Secrets: Anatomy of the Ultra-Secret National Security Agency. Anchor Books a division of Random House Inc., 2002.
ISBN-13: 978-0385499088
2002

9

Bowden, Mark. Worm: The First Digital World War New York: Atlantic Monthly Press, 2011.
ISBN 978-0-8021-1983-4
2011

10

Carr, Jeffrey. Inside Cyber Warfare: Mapping the Cyber Underworld. O’Reilly Media, 2009.
ISBN-13: 978-1449310042
2009

11

Christensen, Clayton M. The Innovator’s Dilemma: The Revolutionary Book That Will Change the Way You Do Business. New York: Harper Business, 2011.
ISBN-10: 0875845851
ISBN-13: 978-0062060242
2011

12

Harris, Shane. @War: The Rise of the Military-Internet Complex. New York: Eamon Dolan/Houghton Mifflin Harcourt, 2014.
ISBN-13: 978-0544570283
2014

13

Harrison Dinniss, Heather. Cyber Warfare and the Laws of War (Cambridge Studies in International and Comparative Law). New York: Cambridge University Press, 2012.
ISBN-13: 978-1107416994
2012

14

Healey, Jason, and Karl Grindal A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. Arlington, Virginia: Cyber Conflict Studies Association, 2013.
ISBN-13: 978-0989327404
2013

15

Kaplan, Fred Dark Territory: The Secret History of Cyber War. Simon & Schuster. Reprint edition (March 28 2017)
ISBN-13: 978-1476763262
2017

16

Lemieux, Frederic. Current and Emerging Trends in Cyber Operations. Palgrave Macmillan, 2015.
ISBN-13: 978-1137455543
2015

17

Liang, Qiao and Wang Xiangsui Unrestricted Warfare: China’s Master Plan to Destroy America Echo Point Books & Media; Reprint ed. edition (November 10, 2015) 2015

18

  Hacking Exposed 7: Network Security Secrets and Solutions. New York: McGraw-Hill, 2012.
ISBN-13: 978-0071780285
2012

19

Mitnick, Kevin. Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker. New York: Little, Brown and Company, 2011.
ISBN-13: 978-0316037723
2011

10

Schmitt, Michael N, ed. Tallinn Manual on the International Law Applicable to Cyber Warfare. New York: Cambridge University Press, 2013.
ISBN-13: 978-1107613775
2013

21

Stoll, Cliff. The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage. New York: Doubleday, 1989.
ISBN-13: 978-1416507789
1989

22

Thomas, Timothy L. Dragon Bytes: Chinese Information-War Theory and Practice FOREIGN MILITARY STUDIES OFFICE; 1st edition 2004

23

Winterfeld, Steve, and Jason Andress. The Basics of Cyber Warfare in Theory and Practice. Waltham, MA: Syngress, 2012.
ISBN13: 9780124047372
2012

24

Zetter, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. New York: Crown Publishers, a division of Random House LLC, 2014
ISBN-13: 978-0770436193
2014

25

Sanger, David. The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

New York: Crown Publishers, a division of Random House LLC, 2018
ISBN-13: 978-0451497895

2018

Articles & Papers

No

Author Title

Reference

Year

1

Krekel, Bryan. Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation Northrop Grumman Corporation: Information Systems Section, 2009. 2009

2

Bernier, Melanie. Military Activities and Cyber Effects (MACE) Taxonomy. Defence R&D Canada – CORA Technical Memorandum, 2013. 2013

3

Fink, Kallie. Lt Cmdr (U.S. Navy), and Major John D. Jordan (U.S. Marine Corps) and Major James E. Wells (U.S. Air Force) Considerations for Offensive Cyberspace Operations. Military Review: May-June 2014, pp 4-11. 2014

4

Lewis, James A. Cyberspace and Armed Forces – The case for offensive cyber capabilities. The Australian Strategic Policy Institute Limited, 2016 2016

5

Williams, Brett T. Major(U.S. Air Force) The Joint Force Commander’s Guide to Cyberspace Operations. Joint Force Quarterly 73, 2nd Quarter 2014, pp 12-19. 2014

6

FireEye Inc, and Mandiant CYBERSECURITY’S MAGINOT LINE: A Real-World Assessment of the Defense-in-Depth Model. FireEye, Inc. and Mandiant, 2014. 2014

7

Kagan, Frederick W. and Tommy Stiansen THE GROWING CYBERTHREAT FROM IRAN: THE INITIAL REPORT OF PROJECT PISTACHIO HARVEST American Enterprise Institute Critical Threats Project and Norse Corportation, 2015 2015

8

United States War College Strategic Cyberspace Operations Guide Center for Strategic Leadership, United States War College, 1 June 2016 2016

9

Dr. Jabbour, Kamal T. and Dr. Devendorf, Erich

Cyber Threat Characterization
Cyber Defense Review, Fall 2017 2017

10

Smeets, Max

The Strategic Promise of Offensive Cyber Operations
Strategic Studies Quarterly, Fall 2018 2018

11

Greenberg, Andy

The Untold Story of NotPetya, the Most Devastating Cyberattack in History WIRED, 22 Aug 2018 2018

12

Barker, Ken

Cyberattack: What Goes Around, Comes Around – Risks of a Cyberattack Strategy A Joint Policy Paper from The School of Public Policy and the Canadian Global Affairs Institute, 01 Jun 2019 2019

13

Efrony, Dan and Shany, Yuval

A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice

American Journal of International Law,   Volume 112, Issue 4, October 2018,             pp. 583-657

2018

14

Long, Austin

A Cyber SIOP? Operational Considerations for Strategic Offensive Cyber Planning
Journal of Cybersecurity, 2017, 1–10
doi: 10.1093/cybsec/tyw016
Research paper
2017

15

Thatcher, Chris

Land C4ISR: The bridge to a better way to buy high tech?
Canadian Army Today, 09 Jul 2019
2019

16

Smeets, Max

A Matter of Time: On the Transitory Nature of Cyberweapons
The Journal of Strategic Studies, 01 Jan 2018
2018

17

Schoka, Andrew

Cyber Command, the NSA, and Operating in Cyberspace: Time to End the Dual Hat
War on the Rocks, 03 Apr 2019
2019

18

Corriveau, Guillaume Maj

Canada’s Foray into Offensive Cyber: A Joint CAF-CSE Endeavour
Canadian Forces College, JCSP 43 DL, 2017-2018
2018

19

Sanger, David E. and Perlroth, Nicole

U.S. Escalates Online Attacks on Russia’s Power Grid
New York Times, 15 Jun 2019
2019

Government – Policy, Doctrine

No

Country, Block Title

Reference

Year

1

Canada Strong, Secured, Engaged – Canada’s Defence Policy Canada’s Defence Policy 2017

2

Canada Canadian Armed Forces – Cyber Joint Doctrine Note Cyber Operations, Joint Doctrine Branch, Canadian Forces Warfare Centre 2017

3

Canada From Bullets to Bytes: Industry`s Role in Preparing Canada for the Future of Cyber Defence Canadian Association of Defense and Security Industries Report, 01 Jan 2019 2019

4

Canada Canadian Centre for Cyber Security: An Introduction to the Cyber Threat Canadian Centre for Cyber Security 2019

5

Canada Cyber Operations Force Development Campaign Plan 2018-2033 SharePoint: DGCYBER – Campaign Plan 2018

6

USA U.S. Cyber Command Narrative U.S. Cyber Command Narrative 1-pager 2018

7

USA Joint Publication 3-12: Cyberspace Operations (US) U.S. Cyber Command Narrative, 8 June 2018 2018

8

NATO Cyber Defence Awareness E-Course The NATO Cooperative Cyber Defense Centre of Excellence