Cyber Security Canon Candidates: You Should Have Read These Books by Now SESSION ID: STU-M04B RICK HOWARD CSO PALO ALTO NETWORKS @RACEBANNON99
Cyber Security Canon Candidates 2
Cyber Security Canon Candidates 3
Cyber Security Canon Candidates 4
Cyber Security Canon Candidates 5
Definition of the Cyber Security Canon can on 6
Definition of the Cyber Security Canon can on /kanən/ 7
Definition of the Cyber Security Canon can on /kanən/ noun 8
Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 9
Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 10
Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 11
Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 12
Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 2. A list of writings officially recognized as genuine. 13
Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 2. A list of writings officially recognized as genuine. 14
Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 2. A list of writings officially recognized as genuine. 15
Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 2. A list of writings officially recognized as genuine. 3. The list of works considered to be permanently established as being of the highest quality: Hopkins was firmly established in the canon of English poetry. 16
Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 2. A list of writings officially recognized as genuine. 3. The list of works considered to be permanently established as being of the highest quality: Hopkins was firmly established in the canon of English poetry. 17
Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 2. A list of writings officially recognized as genuine. 3. The list of works considered to be permanently established as being of the highest quality: Hopkins was firmly established in the canon of English poetry. 18
Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 2. A list of writings officially recognized as genuine. 3. The list of works considered to be permanently established as being of the highest quality: Hopkins was firmly established in the canon of English poetry. 19
20 BOOKS FOR CONSIDERATION 20
20 BOOKS FOR CONSIDERATION Technical 21
20 BOOKS FOR CONSIDERATION Non-fiction 22
20 BOOKS FOR CONSIDERATION Fiction 23
20 BOOKS FOR CONSIDERATION Wider Audience Fiction 24
20 BOOKS FOR CONSIDERATION Technical 25
Cyber Security Canon Candidates 26
Cyber Security Canon Candidates Not Comprehensive 27
Culture and Hactivism 28
Culture and Hactivism 2010-2011 29
Culture and Hactivism Technology 2010-2011 30
Culture and Hactivism Technology Disenfranchisement 2010-2011 31
Culture and Hactivism Technology Disenfranchisement 2010-2011 Pranks 32
Culture and Hactivism Technology Disenfranchisement 2010-2011 Pranks Empowerment 33
Culture and Hactivism Technology Disenfranchisement 2010-2011 Pranks Empowerment Hacking Culture 34
Culture and Hactivism Technology Disenfranchisement 2010-2011 Pranks Empowerment Hacking Culture 35
Culture and Hactivism 36
Culture and Hactivism Essence 37
Culture and Hactivism Essence Drama 38
Culture and Hactivism Essence Drama Franchise Operations 39
Culture and Hactivism Feb 2011 40
Culture and Hactivism Apr 2011 41
Culture and Hactivism Apr 2011 50 Days 25+ Companies Ravaged 42
Culture and Hactivism 43
Culture and Hactivism 44
Culture and Hactivism 50 Days 15+ Companies Ransacked 45
Culture and Hactivism Over 100 other Anonymous Members Arrested 46
Culture and Hactivism You Should Have Read this by Now 47
History and Cyber Warfare 48
History and Cyber Warfare 49
History and Cyber Warfare 50
History and Cyber Warfare Natanz Nuclear site 51
History and Cyber Warfare Natanz Nuclear site 52
History and Cyber Warfare Natanz Nuclear site 53
History and Cyber Warfare Natanz Nuclear site 54
History and Cyber Warfare Natanz Nuclear site 55
History and Cyber Warfare 56
History and Cyber Warfare We Have Crossed the Rubicon 57
History and Cyber Warfare You Should Have Read this by Now 58
Operation Olympic Games Is the Tom Clancy Spy Story that Changed Everything 0900 Friday 59
Culture and Cyber Crime 60
Culture and Cyber Crime Max Butler 61
Culture and Cyber Crime Max Butler 62
Culture and Cyber Crime Dark Market Max 63 TalkCash ScandinavianCarding TheVouched Butler
Culture and Cyber Crime Dark Market Max 64 TalkCash ScandinavianCarding TheVouched Butler
Culture and Cyber Crime Dark Market Max Butler Keith Mularski: FBI Senior Cyber Crime Agent AKA Master Splyntr 65
Culture and Cyber Crime Max Butler
Culture and Cyber Crime You Should Have Read this by Now 67
Culture, History and Espionage 68
Culture, History and Espionage 1989 69
Culture, History and Espionage 1989 70
Culture, History and Espionage Information Sharing 1989 71
Culture, History and Espionage Information Sharing Privacy vs Security (R) Liberty vs Control (D) 1989 72
Culture, History and Espionage Information Sharing Privacy vs Security (R) Liberty vs Control (D) 1989 Cyber Espionage 73
Culture, History and Espionage Information Sharing Privacy vs Security (R) Liberty vs Control (D) 1989 Cyber Espionage Intelligence Dilemma 74
Culture, History and Espionage You Should Have Read this by Now 75
History 76
History Quintessential 77
History Quintessential 78
History Quintessential 79
History Quintessential 80
History Quintessential 81
History Quintessential 82
History Cyber Security History Quintessential 83
History Cyber Security History Tragedy Quintessential 84
History Cyber Security History Tragedy Adventure Quintessential 85
History Cyber Security History Tragedy Geek Love Stories Adventure Quintessential 86
History You Should Have Read this by Now 87
20 BOOKS FOR CONSIDERATION 88
20 BOOKS FOR CONSIDERATION Most Entertaining 89
20 BOOKS FOR CONSIDERATION Cyber Space, Hactivism, Google 90
20 BOOKS FOR CONSIDERATION Metaverse, Avatars, Time Magazine 91
20 BOOKS FOR CONSIDERATION Most Entertaining 92
20 BOOKS FOR CONSIDERATION Most Entertaining 93
20 BOOKS FOR CONSIDERATION Most Thought Provoking 94
20 BOOKS FOR CONSIDERATION Biggest Surprise 95
20 BOOKS FOR CONSIDERATION Repeat Authors 96
20 BOOKS FOR CONSIDERATION Repeat Authors 97
20 BOOKS FOR CONSIDERATION Repeat Authors 98
20 BOOKS FOR CONSIDERATION Repeat Authors 99
To Participate For Further Discussion twitter: @racebannon99 email: rhoward@paloaltonetworks.com
To Participate For Further Discussion twitter: @racebannon99 email: rhoward@paloaltonetworks.com http://researchcenter.paloaltonetworks.com/ Reviews of the Books on My List http://terebrate.blogspot.com/ 101
To Participate For Further Discussion twitter: @racebannon99 email: rhoward@paloaltonetworks.com To Vote Reviews of the Books on My List http://researchcenter.paloaltonetworks.com/ http://terebrate.blogspot.com/ https://www.surveymonkey.com/s/2014_cyber_security_canon_survey 102
To Participate For Further Discussion twitter: @racebannon99 email: rhoward@paloaltonetworks.com To Vote Reviews of the Books on My List http://researchcenter.paloaltonetworks.com/ http://terebrate.blogspot.com/ https://www.surveymonkey.com/s/2014_cyber_security_canon_survey 103
20 BOOKS FOR CONSIDERATION Book Reviews: http://bit.ly/1fwatgc Book Reviews: http://bit.ly/1fhr0us/ Vote: http://svy.mk/omdneg 104 twitter: @racebannon99