Mapping Lucky 13 InfoSec Books (2022)
Now I present the collection of books I have selected for a personal study of Ethical Hacking. This is part of my portfolio design in the field of Web3 DeFi InfoSec with the aim of assisting all those working on solutions to the open-sourcing of electricity and the auditing of electrical energy distribution.
The fact that such literature exists in the open is questionable but also points at the significance. There is a general fear about hackers but perhaps there should be more of a concern that anyone can purchase a book and learn something. Sometimes after I have purchased one of these books from the bookshelf it has taken weeks for it to be replaced. I would not be learning anything else for a path of livelihood. I consider this knowledge to be essential for running any business in civilization.
I enjoy learning through mind-mapping, especially from literature. These particular books have begun forming a high assurance weaving of foundational knowledge regarding humans and computers. There exist many books but my need is to map the foundations of top-level work in InfoSec. And to build on it. I already have years of self-study completed, various education levels and employment experiences.
Approach
First I make sure to understand understanding. I am using my mind and body as the primary toolset. The mind is paramount. Technology is secondary.
Then I try to see Ethical Hacking from as many points of view as possible. Next I select the most relevant information for focus. I take notes from specialists and I make notes of my own for my specialization.
I aim to specialize in asset treasury of spiritual and scientific values by acknowledging the existance of severe, covert, malicious and destructive entities. Security may be the deciding factor in the fate of organic life on Earth. This is because of the existance of psychopathic artificial life swarms and nuclear weaponization.
I believe that the presented hacker book collection forms a unique and holisitc cloud for a beginner’s understanding. This compilation cost me around $500 and I expect to spend about 3 months in study. At the event horizon of mind and matter.
Below is a photographic map of how these books relate to one another:
Summaries
The following are brief summaries of each book and the reason for their selection. I bought most of them at Chapters/Indigo bookstore throughout Ottawa, Canada. Each book is linked to a copy available through Amazon and Chapters/Indigo.
Krishnamurti: The Network of Thought
Mind. Holistic overview of the human experience, life, meaning. The relationship of mind to mental contents, time and fear. The future of technology and computing in civilization. Clarity through meditation. Seeds of InfoSec. This book I bought at Seekers Books in Toronto, Canada.
We Have Root: Even more Advice from Schneier on Security.
InfoSec. World issues and the state of security in America and beyond. It’s not looking good.
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World.
Community. Real world stories by top hackers. Professional challenges. Advice. About the general subculture today.
Cyberjutsu: Cybersecurity for the Modern Ninja.
Being. A funinja way of seeing hacking. Historical perspectives from traditional ninja crafts. The development and origin of processes.
Unauthorized Access: Physical penetration testing for IT security teams.
Mind-Matter. The physical-psychological relationship. Physical access to assets is of primary concern.
The Programmer’s Brain: What Every Programmer Needs to Know About Cognition.
Cognition and Code. The relationship of human mentation and running code. Thought and programs. Cognitive load when coding. Making programming easier.
Hacking: The Art of Exploitation, 2nd Edition
Deep Programming. Memory. Machine code. Deep exploitation.
Ethical Hacking: A Hands-on Introduction.
Basic practical guide. Networking, cryptography, social engineering, exploitation.
Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters.
Coding precision. Python. Environment and tools. Writing and escalation. Forensics.
How Cybersecurity Really Works
Cybersecurity. Targets. Tactics. Malware. Tricks. Pirating.
Mastering Kali Linux for Advanced Penetration Testing
Kali Linux and its toolsets.
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities
The Industry. The Internet. Web Vulnerabilities. Expert Techniques.
Real-World Bug Hunting: A Field Guide to Web Hacking
Bug Bounty Basics. Open Redirect. HTTP Paremeter Pollution. Cross-site Request Forgery. HTML Injection, Content Spoofing. XSS. SQLi. SSRFs. Template Injection. XML Entities. Remote Code. Memory. Subdomain Takeover. IDORs. OAUTHs. App logic. Reports.
Time
In one sentence, then one word, the common esoteric unifying piece of information in these books is time.
To me, studying time in Ethical Hacking is fun.