Cybersecurity Canon - Hall of Fame Winners

Source: https://cybercanon.org/category/hall-of-fame/

image by Gemini

CyberCanon Hall of Fame (Chronological by Publication)

  1. ✅ 1989: “The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage” by Clifford Stoll (page)

  2. 📌 1992: “Snow Crash” by Neal Stephenson

  3. 1999: “The Cathedral & the Bazaar” by Eric S. Raymond

  4. 1999: “Hacking Exposed Series” by McClure, et al.

  5. 2000: “Secrets and Lies” by Bruce Schneier

  6. 2001: “Security Engineering” by Ross Anderson

  7. 2001: “Crypto” by Steven Levy

  8. 2010: “Cyber War” by Clarke and Knake

  9. 2011: “Security Metrics: A Beginner’s Guide” by Caroline Wong

  10. 2011: “Winning As a CISO” by Rich Baich

  11. 2011: “Worm: The First Digital World War” by Mark Bowden

  12. 2011: “Zero Day” by Mark Russinovich

  13. 2011: “Metasploit: The Penetration Tester’s Guide” by Kennedy, et al.

  14. 2011: “Kingpin” by Kevin Poulsen

  15. 2011: “Reamde” by Neal Stephenson

  16. 2012: “The CERT Guide To Insider Threats” by Capelli, Moore, and Trzeciak

  17. 2012: “Practical Malware Analysis” by Sikorski and Honig

  18. 2012: “We Are Anonymous” by Parmy Olson

  19. 2013: “The Practice of Network Security Monitoring” by Richard Bejtlich

  20. 2013: “The Phoenix Project” by Gene Kim, et al.

  21. 2013: “Tallinn Manual on the International Law Applicable to Cyber Warfare” by Michael N. Schmitt

  22. 2014: “Measuring and Managing Information Risk” by Freund and Jones

  23. 2014: “@War: The Rise of the Military-Internet Complex” by Shane Harris

  24. 2014: “Countdown to Zero Day” by Kim Zetter

  25. 2014: “Spam Nation” by Brian Krebs

  26. 2015: “Superforecasting” by Tetlock and Gardner

  27. 2015: “Data and Goliath” by Bruce Schneier

  28. 2015: “Future Crimes” by Marc Goodman

  29. 2016: “CISO Desk Reference Guide Vol 1” by Bonney, et al.

  30. 2016: “Site Reliability Engineering” by Betsy Beyer, et al.

  31. 2016: “How to Measure Anything in Cybersecurity Risk” by Hubbard and Seiersen

  32. 2017: “Code Girls” by Liza Mundy

  33. 2017: “Zero Trust Networks” by Evan Gilman and Doug Barth

  34. 2017: “American Spies” by Jennifer Stisa Granick

  35. 2017: “A Vulnerable System” by Andrew J. Stewart

  36. 2018: “The Perfect Weapon” by David Sanger

  37. 2018: “CISO Compass” by Todd Fitzgerald

  38. 2018: “Click Here to Kill Everybody” by Bruce Schneier

  39. 2018: “LikeWar: The Weaponization of Social Media” by P.W. Singer and Emerson T. Brooking

  40. 2018: “CISO Desk Reference Guide Vol 2” by Bonney, et al.

  41. 2019: “Sandworm” by Andy Greenberg

  42. 2019: “Transformational Security Awareness” by Perry Carpenter

  43. 2019: “The Fifth Domain” by Richard A Clarke and Robert Knake

  44. 2019: “Cult of the Dead Cow” by Joseph Menn

  45. 2020: “Cyber Warfare – Truth, Tactics and Strategies” by Dr. Chase Cunningham

  46. 2020: “The Hacker and the State” by Ben Buchanan

  47. 2021: “This Is How They Tell Me The World Ends” by Nicole Perlroth

  48. 2022: “Project Zero Trust” by George Finney

  49. 2022: “Cybersecurity Myths and Misconceptions” by Spafford, et al.

  50. 2022: “Tracers in the Dark” by Andy Greenberg

  51. 2022: “Navigating the Cybersecurity Career Path” by Helen Patton