top of page
Search

Cryptography, Steganography, Security, Surveillance & Intelligence Reading List

The Hidden Code of Cryptic Crosswords – Francois Greeff

The Code Book – Simon Singh

Introduction to Cryptography - Johannes Buchman

A Treatise on the Art of Deciphering, and of Writing in Cypher: With a Harmonic Alphabet – Philip Thicknesse

Introduction to Modern Cryptography - Jonathan Katz, Yehuda Lindell

Cryptography: A Very Short History – Fred Piper, Sean Murphy

Unveiling Cicada 3301 - Bhavesh Tekwani

The Voynich Manuscript - Stephen Skinner

The Voynich Manuscript - Ramond Clemens, Deborah E. Harkness

Unsolved! – Craig P. Bauer

Codebreaker: The History of Secret Communication – Stephen Pincock, Mark Frary

Codes and Ciphers: A History of Cryptography – Alexander D’ Agapeyeff

Codes and Ciphers – Robert Churchhouse

Codebreaking: A Practical Guide – Elonka Dunin, Klaus Schmeh

Decrypted Secrets: Methods and Maxims of Cryptography – F. L. Bauer

The Mathematics of Secrets – Joshua Holden

Cryptanalysis – Helen Fouché Gaines

Encyclopaedia of Cryptology – David E. Newton

Cryptology: Classical and Modern – Richard Klima, Neil Sigmon

Cryptology: Machines, History & Methods – ‘Cipher A. Deavours’, Louis Kruh, David A. Kahn

Selections from Cryptologia – ‘Cipher A. Deavours’, Louis Kruh, David A. Kahn

Cryptologia, vol. VIII, no. I - David Kahn, Louis Kruh, Brian J. Winkel

The Venetian Ciphers of Agostino Amani – D. P. J. A. Scheers

Advances in Cryptology - Colin Boyd

The Friedman Lectures on Cryptology - William F. Friedman

Codes and Ciphers (Cryptology) - William F. Friedman

Basic Cryptologic Glossary - William F. Friedman

Advanced Military Cryptography - William F. Friedman

Military Cryptanalysis Part I: Monoalphabetic Substitution Systems, Fourth Edition – William F. Friedman

Military Cryptanalysis Part I: Polygraphic Substitution, Four Square and Two Square Matrices, Third Edition - William F. Friedman

Military Cryptanalysis Part II: Simpler Varieties of Polyalphabetic Substitution Cipher - William F. Friedman

Military Cryptanalysis Part III: Small Types of Aperiodic Substitution System (Introduction and Lesson One) – William F. Friedman

Military Cryptanalysis Part IV: Transposition and Fractionating Systems - William F. Friedman

S. I. Course Section IV: Poly-Alphabetic Ciphers – William F. Friedman

The Index of Coincidence - William F. Friedman

Synoptic Tables for the Solution of Ciphers and a Bibliography of Cipher Literature - William F. Friedman

Ref ID: A69073, Technical Papers - William F. Friedman

Ref ID: A69531, Technical Papers – William F. Friedman

Statistical Methods in Cryptanalysis, Revised Edition – Solomon Kullback

General Solution for the Double Transposition Cipher – Solomon Kullback

Solving Cipher Problems – Frank W. Lewis

Articles on Cryptography and Cryptanalysis – The Signal Corps Bulletin

Theory of Cryptography - Mono Naor

Handbook of Applied Cryptography - A. Menezes, P. van Oorschot, S. Vanstone

Cryptanalysis of the Hagelin Cryptograph - Wayne G. Barker

 

Introduction to Modern Cryptography – Jonathan Katz, Yehuda Lindell

Real-World Cryptography – David Wong

Serious Cryptography: A Practical Introduction to Modern Encryption – Jean-Philippe Aumasson

Modern Cryptanalysis: Techniques for Advanced Codebreaking - Christopher Swenson

Introduction to Cryptography with Coding Theory – Wade Trappe, Lawrence C. Washington

Codes and Automata – Jean Berstel, Dominique Perrin, Christophe Reutenauer

Elementary Number Theory, Cryptography, and Codes – M. Welleda Baldoni, Ciro Ciliberto, G. M. Piacentini Cattaneo

Mathematics of Public Key Cryptography – Steven D. Galbraith

Cryptanalysis of the SoDark Family of Cipher Algorithms - Marcus Danserie

Lai-Massey Cipher Designs - Jorge Nakahara Jr.

The Taman Shud Cipher - J. N. Amour

The Block Cipher Companion - Lars R. Knudsen, Matthew Robshaw

Feistel Ciphers - Valerie Nachef, Jacques Paterin, Emmanuel Volte

Cryptography and Data Security - Daniel Garfield

Cryptography Engineering: Design Principles and Practical Applications – Niels Ferguson, Bruce Schneier, Tadayoshi Kohno

 

Hiding in Plain Sight – Eric Cole

Steganography, the Art of Hiding Information – Karen Bailey, Kevin Curran

Steganography, the World of Secret Communications – Michael Hegarty

Noiseless Steganography: The Key to Covert Communication – Abdelrahman Desoky

Integrated Research in Steganography – Audrey Coon

Steganography in Digital Media: Principles, Algorithms, and Applications – Jessica Fridrich

Optimal Soft Computing for Audio Steganography – Abhay Pandy

Audio Steganography using Combined Approach of Compression & Cryptography – Anju Gera

Hiding Data in VoIP - Józef Lubacz, Wojciech Mazurczyk, Krzysztof Szczypiorski

Statistically Undetectable Steganography - Jessica Fridrich

Spycomm: Covert Communication Techniques of the Underground – Lawrence W. Myers

Clandestine Communication Systems – John T. Corley

Obfuscation: A User’s Guide for Privacy and Protest – Finn Brunton, Helen Nissenbaum

Cyber Deception: Techniques, Strategies, and Human Aspects – Tiffany Bao, Milind Tambe, Cliff Wang

 

Spies in the Sky: Surveillance Satellites in War and Peace – Pat Norris

Strategic Defense Systems of the Future – Philip Margulies

Teller’s War – William J. Broad

Space Weapons and the Strategic Defense Initiative – Crockett L. Grabbe

War in Space: The Science and Technology Behind Our Next Theater of Conflict – Linda Dawson

Space and Defense Policy – Damon Coletta, Frances T. Pilch

Original Sin: Power, Technology and War in Outer Space – Bleddyn E. Bower

War in Space: Strategy, Spacepower, Geopolitics – Bleddyn E. Bower

Space Warfare in the 21st Century: Arming the Heavens – Joan Johnson-Freese

Space Electronic Warfare - David L. Adamy

Electronic Warfare Against a New Generation of Threats – David L. Alamy

Introduction to Electronic Defense Systems, Second Edition – Fillipo Neri

Information Warfare: Principles and Operations - Edward Waltz

Electronic Warfare in the Information Age – D. Curtis Schleher

Design and Analysis of Modern Tracking Systems – Samuel Blackman, Robert Popoli

Electronic Warfare: Receivers and Receiving Systems – Richard A. Poisel

RF Electronics for Electronic Warfare – Richard A. Poisel

Modern Communications Jamming: Principles and Techniques – Richard A. Poisel

 

How the World was One: Turbulent History of Global Communications - Arthur C. Clarke

Satellite Communications Systems: Systems, Techniques, and Technology, Sixth Edition – Gerard Maral, Michael Bousquet, Zhili Sun

Where Wizards Stay Up Late: The Origins of the Internet – Katie Hafner, Michael Lyon

Surveillance Valley: A Secret Military History of the Internet – Yasah Levine

The ARPAnet Sourcebook: The Unpublished Foundations of the Internet – Peter H. Salus

 

The Sigint Secrets: The Signals Intelligence War 1900 to Today – Nigel West

Historical Dictionary of British Intelligence – Nigel West

Electronic Communication Interception Technologies and Issues of Power – Daniel Ventre, Philippe Guillot

GPS Declassified: From Smart Bombs to Smartphones – Richard D. Easton, Eric F. Frazier

A Short Introduction to Geospatial Intelligence - Jack O'Connor

Surveillance Technologies and Early Warning Systems: Data Mining Applications for Risk Detection – Ali Serhan Koyuncugil, Nermin Ozgulbas

Electronic Surveillance Devices – Paul Brookes

Hacking with Hardware Gadgets – Mark B.

Big Brother Technology: PRISM, XKeyscore and Other Spy Tools of the Global Surveillance State – Axel Balthazar

State-Sponsored Worms: A Look into the Evolution of Cyber Warfare – Benjamin Stephenson

Stuxnet to Sunburst: Twenty Years of Digital Exploitation and Cyber Warfare – Andrew J. Jenkinson

Modelling Nation-state Information Warfare and Cyber-operations – Brett Van Niekerk, Tishana Ramluckan, Neal Kushwaha

Means of Control: How the Hidden Alliance of Tech and Government is Creating a New American Surveillance – Byron Tau

The Big Black Book of Electronic Surveillance – Edward Teach

Handbook of Surveillance Technologies, Third Edition – Julie K. Petersen

Wiretapping and Electronic Eavesdropping – G Stevens, C. Doyle

 

Surveillance Countermeasures – Aden C. Magee

Practical Anonymity – Peter Loshin

An Ethical Guide to Cyber Anonymity - Kushantha Gunawardana

Is My Cell Phone Bugged? Everything You Need to Know to Keep Your Mobile Conversations Private - Kevin D. Murray

Digital Data: Develop an Effective Data Destruction Policy – Aisha Soldner

Linking Sensitive Data: Methods and Techniques for Practical Privacy-Preserving Information Sharing – Peter Christen, Thilina Ranbaduge, Rainer Schnell

The Complete Privacy and Security Desk Reference – Michael Bazzell, Justin Carroll

Hiding From the Internet: Eliminating Personal Online Information, Third Edition - Michael Bazzell

Extreme Privacy, Fourth Edition - Michael Bazzell

 

Whistleblowers, Leakers, and Their Networks: From Snowden to Samizdat – Jason Ross Arnold

Permanent Record: A Memoir of a Reluctant Whistleblower - Edward Snowden

Dark Mirror: Edward Snowden and the Surveillance State - Barton Gellman

Google Leaks: A Whistleblower’s Exposé of Big Tech Censorship – Zach Vorhies, Kent Heckenlively

Whistleblower’s Handbook: A Step-by-Step Guide to Doing What’s Right and Protecting Yourself – Stephen Martin Kohn

Truth Teller’s Shield: A Manual for Whistle Blowers and Hell Raisers, the Theory and Practice of Letting Your Truth, and The Truth Prevail – Kevin Daniel Annett

 

An Introduction to Formal Language Theory – Robert N. Moll, Michael A. Arbib, A. J. Kfoury

Formal Language and Automata Theory, Second Edition – Ajit Singh

A First Course in Formal Language Theory – V. J. Rayward-Smith

A Second Course in Formal Languages and Automata Theory – Jeffrey Shallit

Build Your Own Website the Right Way Using HTML & CSS, Third Edition – Ian Lloyd

The C++ Programming Language, Fourth Edition – Bjarne Stroustrup

Effective C++: 55 Specific Ways to Improve Your Programs and Designs – Scott Meyers

The Art of Functional Programming – Minh Quang Tran

Introduction to Networking: How the Internet Works – Charles R. Severance

Ipv4 Addressing, Subnetting & VLSM Workbook: CCNA 200-301 – S. Rajkumar, Rajasekar VR

A Professional’s Guide to Data Communication in a TCP/IP World – E. Bryan Carne

TCP/IP Illustrated: vol. 1, The Protocols, Second Edition – Keven R. Fall, W. Richard Stevens

TCP/IP Illustrated: vol. 2, The Implementation – Gary R. Wright, W. Richard Stevens

TCP/IP Illustrated: vol. 3, TCP for Transactions, HTTP, NNTP, and the Unix Domain Protocols – W. Richard Stevens

Build Your Own VPN Server: A Step-by-Step Guide - Lin Song

Set up your own IPsec VPN, OpenVPN and WireGuard Server - Lin Song

Linux Field Manual – Tim Bryant

Operating Systems: Three Easy Pieces – Remzi H. Arpaci-Dusseau, Andrea C. Apraci-Dusseau

Risk Assessment and Decision Analysis with Bayesian Networks, Second Edition – Norman Fenton, Martin Neil

Operator Handbook - Joshua Picolet

Reversing: Secrets of Reverse Engineering – Eldam Eilam

X86 Software Reverse Engineering, Cracking and Counter-Measures – Stephanie Domas, Christopher Domas

Blue Fox: Arm Assembly Internals and Reverse Engineering – Maria Markstedter

Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly – Dennis Andriesse

Malware Forensics Field Guide for Windows Systems – Cameron H. Malin, Eoghan Casey, James M. Aquilina

Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats – Alex Matrosov, Eugene Rodionov, Sergey Bratus

The Art of Attack: Attacker Mindset for Security Professionals – Maxie Reynolds

Attacking Network Protocols: A Hacker’s Guide to Capture, Analysis, and Exploitation – James Forshaw

Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things – Fotios Chantzis, Ioannis Stais

 

Grey Man: Camouflage for Crowds, Cities, and Civil Crisis -  Matthew Dermody

Grey Man 2: Intermediate Skills and Tactics – Matthew Dermody

Conversational Camouflage: Oratory Discretion and Pretexting for Behavioural Concealment – Matthew Dermody

 

Reasoning for Intelligence Analysts: A Multidimensional Approach of Traits, Techniques, and Targets – Noel Hendrickson

Activity-Based Intelligence: Principles and Applications – Patrick Biltgen, Stephen Ryan

Critical Thinking and Intelligence Analysis – David T. Moore

Critical Thinking for Strategic Intelligence – Katherine H. Pherson, Randolph H. Pherson

Curing Analytic Pathologies: Pathways to Improved Intelligence Analysis – Jeffrey R. Cooper

Counterintelligence: Theory and Practice, Second Edition – Hank Prunckun

Methods of Inquiry for Intelligence Analysis – Hank Prunckun

Scientific Methods of Inquiry for Intelligence Analysis, Second Edition – Hank Prunckun

The Lockwood Analytical Method for Prediction (LAMP): A Method for Predictive Intelligence Analysis – Jonathan Samuel Lockwood

Counterdeception Principles and Applications for National Security – Michael Bennett, Edward Waltz

Deception: Counterdeception and Counterintelligence - Robert M. Clark, William L. Mitchell

Intelligence Gathering – Orlando Wilson

Getting Started with OSINT – Mark B.

OSINT Techniques: Resources for Uncovering Online Information, Tenth Edition - Michael Bazzell

Offensive Intelligence: 300 Techniques, Tools, and Tips to Know Everything About Everyone, in Companies or Elsewhere, Third Edition – Philippe Dylewski

The Grey Line: Modern Corporate Espionage and Counterintelligence – Andrew Brown

Of Moles and Molehunters: A Review of Counterintelligence Literature, 1977-92 – Center for the Study of Intelligence

Intelligence Oversight in Times of Transnational Impunity: Who Will Watch the Watchers? – Didier Bigo, Emma Mc Cluskey, Félix Tréguer

1 view0 comments

Recent Posts

See All

Kommentare


bottom of page