Best Privacy & Online Safety Books

Given the prevalence of cybercrime and risks to online security, it is prudent to educate yourself on how to improve your privacy and online security.

1. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide

Author: by Mike Chapple
Sybex
English
1248 pages

View on Amazon

CISSP Study Guide – fully updated for the 2021 CISSP Body of Knowledge (ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex Study Guide covers 100% of the exam objectives.

You’ll prepare for the exam smarter and faster with Sybex thanks to expert content, knowledge from our real-world experience, advice on mastering this adaptive exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you’ve learned with key topic exam essentials and chapter review questions.

The three co-authors of this book bring decades of experience as cybersecurity practitioners and educators, integrating real-world expertise with the practical knowledge you’ll need to successfully pass the CISSP exam. Combined, they’ve taught cybersecurity concepts to millions of students through their books, video courses, and live training programs.


2. Extreme Privacy: What It Takes to Disappear

Author: by Michael Bazzell
B094LDWKGZ
English
639 pages

View on Amazon

Completely rewritten Third Edition (2021) presents the definitive 635-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from public view. He is now known in Hollywood as the guy that fixes things. His previous books about privacy were mostly REACTIVE and he focused on ways to hide information, clean up an online presence, and sanitize public records to avoid unwanted exposure.

This textbook is PROACTIVE. It is about starting over. It is the complete guide that he would give to any new client in an extreme situation. It leaves nothing out, and provides explicit details of every step he takes to make someone completely disappear, including document templates and a chronological order of events.

The information shared in this volume is based on real experiences with his actual clients, and is unlike any content ever released in his other books.


3. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601))

Author: by Wm. Arthur Conklin
McGraw-Hill Education
English
784 pages

View on Amazon

This fully updated study guide covers every topic on the current version of the CompTIA Security+ examGet complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required to perform essential security functions and to secure hardware, systems, and software.

You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. Covers all exam domains, including:Threats, Attacks, and VulnerabilitiesArchitecture and DesignImplementationOperations and Incident ResponseGovernance, Risk, and ComplianceOnline content includes:250 practice exam questionsTest engine that provides full-length practice exams and customizable quizzes by chapter or by exam domain


4. Password Book: Personal Internet and Password Keeper and Organizer for Usernames, Logins and Web Addresses. Suitable for Home and Office (Alphabetically sorted)

Author: by Safe & Sound Publishing
B08XLGFTF5
English
106 pages

View on Amazon

Are you suffering from too many brain farts ? Are you tired of forgetting passwords to every website you visit ? This high quality password log book is the perfect solution for you. Slick, elegant and perfectly sized to keep all of your secrets in a safe and easy to use space.

Features:Dimensions: 6″ x 9″Pages: 105Cover: MatteAlphabetically arrengedHome network settings and ISP informations sectionsHigh quality printMake your life a little easier and get your new password booklet NOW !


5. Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601)

Author: by Mike Meyers
McGraw-Hill Education
English
832 pages

View on Amazon

An up-to-date CompTIA Security+ exam guide from training and exam preparation guru Mike MeyersIn Mike Meyers’ CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601), the leading expert on CompTIA certification and training brings his highly effective methodology to IT security.

Within each chapter, modules drill down on specific exam objectives, providing a clear learning path. All official exam objectives are covered, and chapter-ending practice exam questions reinforce the concepts presented. This practical resource goes beyond knowledge application and teaches you the skills you need to anticipate security risks and guard against them.

Covers all the exam topics, including:Risk managementCryptographyAuthentication and authorizationHost, LAN, and application securityWireless, cloud, and mobile securityEnvironmental security and controlsOnline content includes:200+ practice exam questions in a customizable test engineOne hour+ of video training from Mike MeyersFree lab simulationsMike’s toolbox of favorite network securityrelated freeware and shareware


6. Hacking: The Art of Exploitation, 2nd Edition

Author: by Jon Erickson
English
488 pages
1593271441

View on Amazon

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker’s perspective.

The included LiveCD provides a complete Linux programming and debugging environmentall without modifying your current operating system. Use it to follow along with the book’s examples as you fill gaps in your knowledge and explore hacking techniques on your own.

Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server’s logging behavior to hide your presence Redirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrixHackers are always pushing the boundaries, investigating the unknown, and evolving their art.


7. Internet Password Logbook (Cognac Leatherette): Keep track of: usernames, passwords, web addresses in one easy & organized location

Author: by Editors of Rock Point
Rock Point
English
128 pages

View on Amazon

Just say no to piles of sticky notes and scraps of paper with your passwords and logins! Keep track of them in this elegant, yet inconspicuous, alphabetically tabbed cognac leatherette notebook. In this 4 6 hardcover notebook with removable cover band, record the necessarily complex passwords and user login names required to thwart hackers.

You’ll find: Internet password safety and naming tipsA to Z tabbed pages with space to list website, username, and five passwords for eachDedicated pages to record software license information, with spaces for license number, purchase date, renewal date, and monthly feeDedicated pages to record network settings and passwords, including for modem, router, WAN, LAN, and wirelessA notes section with blank lined pages This internet password logbook provides an easy way to keep track of website addresses, usernames, and passwords in one discreet and convenient location.


8. The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Author: by Kevin Mitnick
Back Bay Books
English
320 pages

View on Amazon

Real-world advice on how to be invisible online from “the FBI’s most wanted hacker” (Wired). Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you “the art of invisibility” – online and real-world tactics to protect you and your family, using easy step-by-step instructions.

Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity. Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening.

The world’s most famous – and formerly the US government’s most wanted – computer hacker, he has hacked into some of the country’s most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI.


9. Cybersecurity For Dummies

Author: by Joseph Steinberg
For Dummies
English
368 pages

View on Amazon

Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being “cyber-secure” means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked.

If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You’ll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!

The who and why of cybersecurity threats Basic cybersecurity concepts What to do to be cyber-secure Cybersecurity careers What to think about to stay cybersecure in the future Now is the time to identify vulnerabilities that may make you a victim of cyber-crime and to defend yourself before it is too late.

10. Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict

Author: by Dan Borges
English
246 pages
1801076200

View on Amazon

Master cutting-edge techniques and countermeasures to protect your organization from live hackers. Learn how to harness cyber deception in your operations to gain an edge over the competition. Key FeaturesGain an advantage against live hackers in a competition or real computing environmentUnderstand advanced red team and blue team techniques with code examplesLearn to battle in short-term memory, whether remaining unseen (red teams) or monitoring an attacker’s traffic (blue teams)Book DescriptionLittle has been written about what to do when live hackers are on your system and running amok.

Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse.

This book contains two subsections in each chapter, specifically focusing on the offensive and defensive teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts.

11. Spooked: The Trump Dossier, Black Cube, and the Rise of Private Spies

Author: by Barry Meier
Harper (May 18, 2021)
English
336 pages

View on Amazon

A Pulitzer Prize winning investigative journalist’s journey into a billon-dollar secret industry that is shaping our world the booming business of private spying, operatives-for-hire retained by companies, political parties and the powerful to dig up dirt on their enemies and, if need be, destroy them.

For decades, private eyes from Allan Pinkerton, who formed the first detective agency in the U.S., to Jules Kroll, who transformed the investigations business by giving it a corporate veneer, private spies were content to stand in the shadows.

Now, that is all changing. High-profile stories grabbing recent headlines the Steele Dossier, Black Cube, the Theranos scandal, Harvey Weinstein’s attacks on his accusers all share a common thread, the involvement of private spies. Today, operatives-for-hire are influencing presidential elections, the news media, government policies and the fortunes of companies..

They are also peering into our personal lives as never before, using off-the shelf technology to listen to our phone calls, monitor our emails, and decide what we see on social media. Private spying has never been cheaper and the business has never been more lucrativejust as its power has never been more pervasive.

12. Social Engineering: The Science of Human Hacking

Author: by Christopher Hadnagy
Wiley
English
320 pages

View on Amazon

Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoirewhy hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past.

The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest.

This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the system in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely.

13. (ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests

Author: by Mike Chapple
Sybex
English
496 pages

View on Amazon

Full-length practice tests covering all CISSP domains for the ultimate exam prep The (ISC)2 CISSP Official Practice Tests is a major resource for (ISC)2 Certified Information Systems Security Professional (CISSP) candidates, providing 1300 unique practice questions. The first part of the book provides 100 questions per domain.

You also have access to four unique 125-question practice exams to help you master the material. As the only official practice tests endorsed by (ISC)2, this book gives you the advantage of full and complete preparation. These practice tests align with the 2021 version of the exam to ensure up-to-date preparation, and are designed to cover what you will see on exam day.

Coverage includes: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management (IAM), Security Assessment and Testing, Security Operations, and Software Development Security. The CISSP credential signifies a body of knowledge and a set of guaranteed skills that put you in demand in the marketplace.

14. Password Book: Personal Internet and Password Keeper and Organizer for Usernames, Logins and Web Addresses. Suitable for Home and Office (Alphabetically sorted)

Author: by Safe & Sound Publishing
B08WS2WNH2
English
106 pages

View on Amazon

Are you suffering from too many brain farts ? Are you tired of forgetting passwords to every website you visit ? This high quality password log book is the perfect solution for you. Slick, elegant and perfectly sized to keep all of your secrets in a safe and easy to use space.

Features:Dimensions: 6″ x 9″Pages: 105Cover: MatteAlphabetically arrengedHome network settings and ISP informations sectionsHigh quality printMake your life a little easier and get your new password booklet NOW !

15. The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

Author: by Dafydd Stuttard
Wiley
English
912 pages

View on Amazon

The highly successful security book returns with a new edition, completely updatedWeb applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications.

You’ll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous editionDiscusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and moreFeatures a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasksFocusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws..

16. CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)

Author: by Wm. Arthur Conklin
McGraw-Hill Education
English
647 pages

View on Amazon

Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This fully updated study guide covers every topic on the current version of the CompTIA Security+ examTake the latest version of the CompTIA Security+ exam with complete confidence using the detailed information contained in this highly effective self-study system.

Written by a team of leading information security experts, this authoritative guide addresses the skills required for securing a network and managing risk and enables you to become CompTIA Security+ certified. CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501) covers all exam domains and features 200 accurate practice questions.

To aid in study, the book features learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. All questions mirror those on the live test in style, format, and difficulty. Beyond fully preparing you for the challenging SY0-501 exam, the book also serves as a valuable on-the-job reference for IT professionals.