{"id":123530,"date":"2022-09-06T18:45:33","date_gmt":"2022-09-06T13:15:33","guid":{"rendered":"https:\/\/www.mapsofindia.com\/my-india\/?p=123530"},"modified":"2022-09-06T10:16:14","modified_gmt":"2022-09-06T04:46:14","slug":"top-10-books-on-cybercrime","status":"publish","type":"post","link":"https:\/\/www.mapsofindia.com\/my-india\/technology\/top-10-books-on-cybercrime","title":{"rendered":"Top 10 Books on Cybercrime"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Cybercrime was once as arcane as quantum physics or cryptocurrency volatility. But now, it is becoming a common theme in many works. <\/span><span data-preserver-spaces=\"true\">We&#8217;re continuously under assault, whether organized criminals are phishing to steal vital information for sale on the dark web or regular people are being persuaded to follow a link to collect a reward or confirm a payment. <\/span><span data-preserver-spaces=\"true\">Pension fraud, identity theft, strangers tracking our children on TikTok: everywhere we look, someone is attempting to use the technologies we rely on against us.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Let us dive into the world of cyber security by knowing the top 10 books on cybercrime:<\/span><\/strong><\/p>\n<ul>\n<li><strong><span data-preserver-spaces=\"true\">The Art of Deception: Controlling the Human Element of Security<\/span><\/strong><\/li>\n<\/ul>\n<p><strong><span data-preserver-spaces=\"true\">Written by:\u00a0<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Kevin Mitnick<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">It is a universal truth in information security that the human is the weakest player in a computer network.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Kevin Mitnick wrote the book on extracting such vulnerability, whether it&#8217;s through phishing emails or a phone call &#8220;from the bank&#8221; claiming to be dialling about fraudulent activity.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">He&#8217;s written several books on hacking, including the intriguing memoir Ghost in the Wires, but my favourite is this excellent guide to social engineering. Think you can&#8217;t be duped into divulging vital information? Read this and reconsider.<\/span><\/li>\n<\/ul>\n<ul>\n<li><strong><span data-preserver-spaces=\"true\">People Like Her\u00a0<\/span><\/strong><\/li>\n<\/ul>\n<p><strong><span data-preserver-spaces=\"true\">Written by:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Ellery Lloyd<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Social media spying has become commonplace in psychological thrillers over the last decade. Still, few have done it as successfully as Ellery Lloyd, the pen name of married literary duo Collette Lyons and Paul Vlitos.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">People Like Her portrays famous InstaMum Emmy and her washed-up author husband, who despises their sudden popularity. Toss in a cyber stalker, some witty writing, and a frenetic race to the end, and you&#8217;ve got yourself an excellent digital thriller.<\/span><\/li>\n<\/ul>\n<ul>\n<li><strong><span data-preserver-spaces=\"true\">Countdown to Day Zero: Stuxnet and the Launch of the World\u2019s First Digital Weapon\u00a0<\/span><\/strong><\/li>\n<\/ul>\n<p><strong><span data-preserver-spaces=\"true\">Written by:\u00a0<\/span><\/strong><span data-preserver-spaces=\"true\">Kim Zetter<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">With so many cyber thieves attempting to cheat us off with text messages to pay for more postage, it&#8217;s easy to overlook that technologies are also being used to do harmful deeds nationally.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">The centrifuges of Iran&#8217;s uranium enrichment complex were frequently breaking in 2010. What&#8217;s the reason? Stuxnet, a new virus developed by the United States and Israel, enabled them to spiral too quickly and crash.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">This compelling story of government sabotage explains machine code in simple language that every reader can understand.<\/span><\/li>\n<\/ul>\n<p><strong><span data-preserver-spaces=\"true\">Cory\u2019s little brother to the Doctors<\/span><\/strong><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Doktorov is well-known for his digital advocacy, as editor of the prominent publication Boing Boing, and his article fiction.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">The Little Brother trilogy, and the streetwise 17-year-old Marcus, who, with his crew, establishes a secret &#8220;cell network&#8221; to guard against a futuristic surveillance state, are at the centre of this canon.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Except for one, they have all been released. How can they demonstrate that their friend is still in captivity while the country slips into totalitarian martial law?<\/span><\/li>\n<\/ul>\n<ul>\n<li><strong><span data-preserver-spaces=\"true\">Digital Fortress<\/span><\/strong><\/li>\n<\/ul>\n<p><strong><span data-preserver-spaces=\"true\">Written by:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Dan Brown<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">It&#8217;s a battle against the clock to rescue the National Security Agency caught in the grasp of a strange evil code, starring badass cryptographer Susan Fletcher &#8211; at a period when most female characters were either afraid or melancholy or both.<\/span><\/li>\n<\/ul>\n<ul>\n<li><strong><span data-preserver-spaces=\"true\">Zoo City<\/span><\/strong><\/li>\n<\/ul>\n<p><strong><span data-preserver-spaces=\"true\">Written by:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Lauren Beukes<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">What better way to round up the top ten cybercrimes than with Lauren Beukes&#8217;s provocative South African genre novel?<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">It follows Zinzi, a clairvoyant who has lost items, and a 419 fraudster (imagine emails from alleged princes) who is lured into a high-profile murder case in an alternative Johannesburg wherein familiar animals are connected to offenders to brand them.<\/span><\/li>\n<\/ul>\n<ul>\n<li><strong><span data-preserver-spaces=\"true\">Imposter Syndrome<\/span><\/strong><\/li>\n<\/ul>\n<p><strong><span data-preserver-spaces=\"true\">Written by:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Katie Wang<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">If you, like me, enjoyed Dave Eggers&#8217; The Circle and thought, &#8220;Fantastic book, but where is the story?&#8221; then impostor syndrome is really for you.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">The ensuing plot climaxes when Alice, a keyboard drone for the huge software corporation Tangerine, observes odd activity on the business&#8217;s servers.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Few new novels seem as fresh and contemporary as this one, which is part espionage mystery, half spy thriller, and part Silicon Valley satire concerning the status of minority women in the development community.<\/span><\/li>\n<\/ul>\n<ul>\n<li><strong><span data-preserver-spaces=\"true\">The Blue Nowhere<\/span><\/strong><\/li>\n<\/ul>\n<p><strong><span data-preserver-spaces=\"true\">Written by:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Jeffery Deaver<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Deaver, a crime fiction pioneer, talked about hackers and Internet fraudsters before many people had a computer.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">It was set around 1999 and had dial-up connections and floppy discs. It pairs two hackers against a relentless, blood-soaked cat and mouse pursuit, one a wicked lunatic who baits his victims to their deaths, the other freed from prison to help the investigation.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">It&#8217;s out of date, yet it was way forward of its time, and very few will hold you interested like Deaver.<\/span><\/li>\n<\/ul>\n<p><strong><span data-preserver-spaces=\"true\">Manipulation<\/span><\/strong><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">How can you regulate something you don&#8217;t even know is illegal? Once upon a time, rigging the election required stealing sufficient ballots from the recently departed.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">You can now direct impact directly into people&#8217;s eyes without them noticing. Artificial intelligence viruses, spoof films, and cyber troll farms are all part of a conflict that most people, even those who safeguard us, are unaware of.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Is it possible to stop it before our political structures collapse?<\/span><\/li>\n<\/ul>\n<ul>\n<li><strong><span data-preserver-spaces=\"true\">Dark Market<\/span><\/strong><\/li>\n<\/ul>\n<p><strong><span data-preserver-spaces=\"true\">Written by:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Misha Glenny<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">If you spend 30 minutes on the black web, you&#8217;ll never similarly view the internet again.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Drugs, firearms, and stolen passports may all be delivered to your door in days. Do you require a hacker? A murderer? It&#8217;s simple to discover an onion site that meets your requirements.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">This is where your content ends after a ransomware assault steals it. After reading this, you will think more carefully about submitting your address and name on the internet.<\/span><\/li>\n<\/ul>\n<p><span data-preserver-spaces=\"true\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercrime was once as arcane as quantum physics or cryptocurrency volatility. But now, it is becoming a common theme in many works. We&#8217;re continuously under assault, whether organized criminals are phishing to steal vital information for sale on the dark web or regular people are being persuaded to follow a link to collect a reward [&hellip;]<\/p>\n","protected":false},"author":21834,"featured_media":124452,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12251,12377,12367,12279,12327,6124],"tags":[],"class_list":{"0":"post-123530","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-book","8":"category-computer","9":"category-computer-science","10":"category-popular","11":"category-smart-gadgets","12":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/posts\/123530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/users\/21834"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/comments?post=123530"}],"version-history":[{"count":3,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/posts\/123530\/revisions"}],"predecessor-version":[{"id":124433,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/posts\/123530\/revisions\/124433"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/media\/124452"}],"wp:attachment":[{"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/media?parent=123530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/categories?post=123530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/tags?post=123530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}