// By year

Best cybersecurity books from 2020

7 cybersecurity books published in 2020, ranked by rating. Each entry is an opinionated review with who the book is for.

  1. 01 · 2020

    Building Secure and Reliable Systems

    Best Practices for Designing, Implementing, and Maintaining Systems

    Google's site-reliability and security teams jointly write down what it actually takes to build systems that are both safe and dependable, from threat models and design reviews to rollback culture and crisis response.

    Advanced
    5/5Heather Adkins, Betsy Beyer, Paul Blankinship, Piotr Lewandowski, Ana Oprea, Adam Stubblefield
  2. 02 · 2020

    Security Engineering

    A Guide to Building Dependable Distributed Systems

    Ross Anderson's comprehensive textbook on the design of secure systems, covering protocols, access control, side channels, economics of security, and policy.

    Advanced
    5/5Ross Anderson
  3. 03 · 2020

    The Hacker and the State

    Cyber Attacks and the New Normal of Geopolitics

    Ben Buchanan's argument that state-on-state cyber operations are not deterrence-shaped (like nuclear) but signaling-shaped: countries use cyber to shape the environment, not to threaten escalation. Builds the case from declassified incidents.

    Beginner
    5/5Ben Buchanan
  4. 04 · 2020

    Alice and Bob Learn Application Security

    Tanya Janca's hands-on AppSec primer covering threat modeling, secure design, secure coding, testing, deployment, and the social side of running an AppSec program — through a friendly, narrative-driven structure.

    Beginner
    4/5Tanya Janca
  5. 05 · 2020

    Black Hat Go

    Go Programming For Hackers and Pentesters

    Tom Steele, Chris Patten, and Dan Kottmann show how to use Go's networking primitives, concurrency model, and cross-compilation to write offensive tooling that runs almost anywhere.

    Intermediate
    4/5Tom Steele, Chris Patten, Dan Kottmann
  6. 06 · 2020

    Container Security

    Fundamentals for Securing Containerized Applications

    Liz Rice's first-principles introduction to how Linux containers actually work — namespaces, cgroups, capabilities, seccomp, image layering — and the security implications that fall out of those mechanics.

    Intermediate
    4/5Liz Rice
  7. 07 · 2020

    Web Security for Developers

    Real Threats, Practical Defense

    Malcolm McDonald's developer-side primer on the OWASP-class issues, framed around real attacks and defended with code patterns rather than vendor products.

    Beginner
    4/5Malcolm McDonald

Other years

Related topics