// Alternatives

Alternatives to Foundations of Information Security

Books in our catalog with overlapping topics and a similar reading level to Foundations of Information Security. If Foundations of Information Security is the wrong fit at beginner level, start here.

  1. 01 · 2021

    How Cybersecurity Really Works

    Sam Grubb's gentle, exercise-driven introduction for non-specialists who need a working mental model of attacker behaviour and basic defence.

    Beginner
    4/5Sam Grubb
  2. 02 · 2019

    The Pragmatic Programmer

    Thomas and Hunt's career-defining set of practical heuristics for writing software professionally — orthogonality, broken-windows, DRY, tracer bullets, and the underlying argument that craftsmanship is a posture, not a process.

    Beginner
    5/5David Thomas, Andrew Hunt
  3. 03 · 2025

    Linux Basics for Hackers

    OccupyTheWeb's introduction to Linux from the angle that hackers and pentesters actually need it: shells, networking, scripting, and Kali tooling.

    Beginner
    4/5OccupyTheWeb
  4. 04 · 2020

    Alice and Bob Learn Application Security

    Tanya Janca's hands-on AppSec primer covering threat modeling, secure design, secure coding, testing, deployment, and the social side of running an AppSec program — through a friendly, narrative-driven structure.

    Beginner
    4/5Tanya Janca
  5. 05 · 2020

    Web Security for Developers

    Malcolm McDonald's developer-side primer on the OWASP-class issues, framed around real attacks and defended with code patterns rather than vendor products.

    Beginner
    4/5Malcolm McDonald
  6. 06 · 2018

    Click Here to Kill Everybody

    Bruce Schneier's policy-level argument that as everything becomes a computer (cars, medical devices, infrastructure, voting), the security failures that used to merely cost us money will start costing lives — and the regulatory shape of that future is being decided now.

    Beginner
    4/5Bruce Schneier
  7. 07 · 2017

    Practical Packet Analysis

    Chris Sanders' working manual for Wireshark, geared at troubleshooting and incident response rather than abstract protocol theory. Updated for Wireshark 2.x.

    Beginner
    4/5Chris Sanders
  8. 08 · 2002

    The Art of Deception

    Kevin Mitnick and William Simon's case-study collection of social-engineering attacks: PBX scams, helpdesk impersonation, dumpster-diving, the casual lies that sound true. The technology dates the book; the human side is timeless.

    Beginner
    4/5Kevin Mitnick, William L. Simon
  9. 09 · 2021

    Cyberjutsu

    Ben McCarty maps declassified medieval ninja scrolls onto modern adversary tradecraft. More analogy-driven than technical, useful for security-program framing.

    Beginner
    3/5Ben McCarty
  10. 10 · 2018

    Cybersécurité — Un ouvrage unique pour les managers

    French-language management-oriented cybersecurity handbook by Hennion and Makhlouf: governance, ISO 27001, risk management, GDPR, business continuity — operational panorama, no technical depth.

    Beginner
    3/5Romain Hennion, Anissa Makhlouf
Back to Foundations of Information SecurityWhat to read after Foundations of Information Security