Cyber Reading List
The following is a recommended list of cyber-related readings provided by D Cyber Ops FD.
Books
No |
Author | Title | Reference |
Year |
1 |
Clarke, Richard A. and Robert A. Knake. | The Fifth Domain: Defending our Country, Our Companies, and Ourselves in the Age of Cyber Threats. | Penguin Random House; 2019. ISBN 978-0-52-556196-5 | 2019 |
2 |
Clarke, Richard A. and Robert A. Knake. | Cyber War: The Next Threat to National Security and What to Do About It. | HarperCollins; 2012 . ISBN 978-0-06-196224-0 |
2012 |
3 |
Engbretson, Patrick. | The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy. | New York: Syngress, 2013. ISBN 978-0-12-411644-3 |
2013 |
4 |
Doctorow, Cory | Little Brother. | Cory Doctorow, Little Brother, (New York: Tor, 2008. ISBN-13: 9780765323118 |
2008 |
5 |
Aldrich, Richard J | GCHQ: The Uncensored Story of Britain’s Most Secret Intelligence Agency. | Harper Collins, 2010. ISBN-13: 978-0007312665 |
2010 |
6 |
Andress, Jason, and Steve Winterfeld | Cyber Warfare Second Edition: Techniques, Tactics and Tools for Security Practitioners. | Waltham, MA: Syngress, 2014. ISBN: 978-0-12-416672-1 |
2014 |
7 |
Armistead, Leigh, ed. | Information Operations: Warfare and the Hard Reality of Soft Power. | Dulles, Virginia: Potomac Books, Inc., 2004. ISBN-13: 978-1574886993 |
2004 |
8 |
Bamford, James. | Body of Secrets: Anatomy of the Ultra-Secret National Security Agency. | Anchor Books a division of Random House Inc., 2002. ISBN-13: 978-0385499088 |
2002 |
9 |
Bowden, Mark. | Worm: The First Digital World War | New York: Atlantic Monthly Press, 2011. ISBN 978-0-8021-1983-4 |
2011 |
10 |
Carr, Jeffrey. | Inside Cyber Warfare: Mapping the Cyber Underworld. | O’Reilly Media, 2009. ISBN-13: 978-1449310042 |
2009 |
11 |
Christensen, Clayton M. | The Innovator’s Dilemma: The Revolutionary Book That Will Change the Way You Do Business. | New York: Harper Business, 2011. ISBN-10: 0875845851 ISBN-13: 978-0062060242 |
2011 |
12 |
Harris, Shane. | @War: The Rise of the Military-Internet Complex. | New York: Eamon Dolan/Houghton Mifflin Harcourt, 2014. ISBN-13: 978-0544570283 |
2014 |
13 |
Harrison Dinniss, Heather. | Cyber Warfare and the Laws of War (Cambridge Studies in International and Comparative Law). | New York: Cambridge University Press, 2012. ISBN-13: 978-1107416994 |
2012 |
14 |
Healey, Jason, and Karl Grindal | A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. | Arlington, Virginia: Cyber Conflict Studies Association, 2013. ISBN-13: 978-0989327404 |
2013 |
15 |
Kaplan, Fred | Dark Territory: The Secret History of Cyber War. | Simon & Schuster. Reprint edition (March 28 2017) ISBN-13: 978-1476763262 |
2017 |
16 |
Lemieux, Frederic. | Current and Emerging Trends in Cyber Operations. | Palgrave Macmillan, 2015. ISBN-13: 978-1137455543 |
2015 |
17 |
Liang, Qiao and Wang Xiangsui | Unrestricted Warfare: China’s Master Plan to Destroy America | Echo Point Books & Media; Reprint ed. edition (November 10, 2015) | 2015 |
18 |
Hacking Exposed 7: Network Security Secrets and Solutions. | New York: McGraw-Hill, 2012. ISBN-13: 978-0071780285 |
2012 | |
19 |
Mitnick, Kevin. | Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker. | New York: Little, Brown and Company, 2011. ISBN-13: 978-0316037723 |
2011 |
10 |
Schmitt, Michael N, ed. | Tallinn Manual on the International Law Applicable to Cyber Warfare. | New York: Cambridge University Press, 2013. ISBN-13: 978-1107613775 |
2013 |
21 |
Stoll, Cliff. | The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage. | New York: Doubleday, 1989. ISBN-13: 978-1416507789 |
1989 |
22 |
Thomas, Timothy L. | Dragon Bytes: Chinese Information-War Theory and Practice | FOREIGN MILITARY STUDIES OFFICE; 1st edition | 2004 |
23 |
Winterfeld, Steve, and Jason Andress. | The Basics of Cyber Warfare in Theory and Practice. | Waltham, MA: Syngress, 2012. ISBN13: 9780124047372 |
2012 |
24 |
Zetter, Kim. | Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. | New York: Crown Publishers, a division of Random House LLC, 2014 ISBN-13: 978-0770436193 |
2014 |
25 |
Sanger, David. | The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age |
New York: Crown Publishers, a division of Random House LLC, 2018 |
2018 |
Articles & Papers
No |
Author | Title |
Reference |
Year |
1 |
Krekel, Bryan. | Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation | Northrop Grumman Corporation: Information Systems Section, 2009. | 2009 |
2 |
Bernier, Melanie. | Military Activities and Cyber Effects (MACE) Taxonomy. | Defence R&D Canada – CORA Technical Memorandum, 2013. | 2013 |
3 |
Fink, Kallie. Lt Cmdr (U.S. Navy), and Major John D. Jordan (U.S. Marine Corps) and Major James E. Wells (U.S. Air Force) | Considerations for Offensive Cyberspace Operations. | Military Review: May-June 2014, pp 4-11. | 2014 |
4 |
Lewis, James A. | Cyberspace and Armed Forces – The case for offensive cyber capabilities. | The Australian Strategic Policy Institute Limited, 2016 | 2016 |
5 |
Williams, Brett T. Major(U.S. Air Force) | The Joint Force Commander’s Guide to Cyberspace Operations. | Joint Force Quarterly 73, 2nd Quarter 2014, pp 12-19. | 2014 |
6 |
FireEye Inc, and Mandiant | CYBERSECURITY’S MAGINOT LINE: A Real-World Assessment of the Defense-in-Depth Model. | FireEye, Inc. and Mandiant, 2014. | 2014 |
7 |
Kagan, Frederick W. and Tommy Stiansen | THE GROWING CYBERTHREAT FROM IRAN: THE INITIAL REPORT OF PROJECT PISTACHIO HARVEST | American Enterprise Institute Critical Threats Project and Norse Corportation, 2015 | 2015 |
8 |
United States War College | Strategic Cyberspace Operations Guide | Center for Strategic Leadership, United States War College, 1 June 2016 | 2016 |
9 |
Dr. Jabbour, Kamal T. and Dr. Devendorf, Erich |
Cyber Threat Characterization |
Cyber Defense Review, Fall 2017 | 2017 |
10 |
Smeets, Max |
The Strategic Promise of Offensive Cyber Operations |
Strategic Studies Quarterly, Fall 2018 | 2018 |
11 |
Greenberg, Andy |
The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED, 22 Aug 2018 | 2018 |
12 |
Barker, Ken |
Cyberattack: What Goes Around, Comes Around – Risks of a Cyberattack Strategy | A Joint Policy Paper from The School of Public Policy and the Canadian Global Affairs Institute, 01 Jun 2019 | 2019 |
13 |
Efrony, Dan and Shany, Yuval |
A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice |
American Journal of International Law, Volume 112, Issue 4, October 2018, pp. 583-657 |
2018 |
14 |
Long, Austin |
A Cyber SIOP? Operational Considerations for Strategic Offensive Cyber Planning |
Journal of Cybersecurity, 2017, 1–10
doi: 10.1093/cybsec/tyw016
Research paper
|
2017 |
15 |
Thatcher, Chris |
Land C4ISR: The bridge to a better way to buy high tech? |
Canadian Army Today, 09 Jul 2019
|
2019 |
16 |
Smeets, Max |
A Matter of Time: On the Transitory Nature of Cyberweapons |
The Journal of Strategic Studies, 01 Jan 2018
|
2018 |
17 |
Schoka, Andrew |
Cyber Command, the NSA, and Operating in Cyberspace: Time to End the Dual Hat |
War on the Rocks, 03 Apr 2019
|
2019 |
18 |
Corriveau, Guillaume Maj |
Canada’s Foray into Offensive Cyber: A Joint CAF-CSE Endeavour |
Canadian Forces College, JCSP 43 DL, 2017-2018
|
2018 |
19 |
Sanger, David E. and Perlroth, Nicole |
U.S. Escalates Online Attacks on Russia’s Power Grid |
New York Times, 15 Jun 2019
|
2019 |
Government – Policy, Doctrine
No |
Country, Block | Title |
Reference |
Year |
1 |
Canada | Strong, Secured, Engaged – Canada’s Defence Policy | Canada’s Defence Policy | 2017 |
2 |
Canada | Canadian Armed Forces – Cyber Joint Doctrine Note | Cyber Operations, Joint Doctrine Branch, Canadian Forces Warfare Centre | 2017 |
3 |
Canada | From Bullets to Bytes: Industry`s Role in Preparing Canada for the Future of Cyber Defence | Canadian Association of Defense and Security Industries Report, 01 Jan 2019 | 2019 |
4 |
Canada | Canadian Centre for Cyber Security: An Introduction to the Cyber Threat | Canadian Centre for Cyber Security | 2019 |
5 |
Canada | Cyber Operations Force Development Campaign Plan 2018-2033 | SharePoint: DGCYBER – Campaign Plan | 2018 |
6 |
USA | U.S. Cyber Command Narrative | U.S. Cyber Command Narrative 1-pager | 2018 |
7 |
USA | Joint Publication 3-12: Cyberspace Operations (US) | U.S. Cyber Command Narrative, 8 June 2018 | 2018 |
8 |
NATO | Cyber Defence Awareness E-Course | The NATO Cooperative Cyber Defense Centre of Excellence |