VECTOR REPORTS, BOOKS AND REVIEWS
The Internet Con - How to Sieze the Means of Computation - Corey Doctorow
Red Team Blues - A Novel - Cory Doctorow
Chokepoint Capitalism - Cory Doctorow
Landmark 2021 Study on Worldwide Scope and Distribution of Phishing Attacks
The Coming AI Hackers by Bruce Schneier
Recent Update to:"A Wake-up Call for SATCOM Security"
How to Hack A Satellite: "A Wake-up Call for SATCOM Security"
Google SRE Secure Systems Methodology White Paper
Deep Analysis of the Cybercrime Landscape
Mitnik: A Study of Social Engineering
How the Effectiveness of Cybersecurity Policies Varies across Cybercrime Types
A Concise But Scholarly Overview of the Dark Web
Advanced Battlespace and CybermaneuverConcepts
MUST Read Kill Chain White Paper from Lockheed Martin
Expanding Combat Power Through Military Cyber Power Theory
Digital Shadows Initial Access Brokers Analysis, 2021
Definitive Guide to Cyber Threat Intelligence
Old Dogs New Tricks:Attackers Adopt Exotic Programming Languages... Report from Blackberry
DoD CyberSecurity Report Summary 2019-2020
Common Knowledge Attacks on Democracy
We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News
2017 GAO report on Nuclear Command, Control, and Communications
Department of Defense 2018 U.S. Nuclear Posture Review
Domain Monitoring: Detection, Context and Remediation
European Union's "Data Protection Act 2018" - Cybersecurity Into Law
Initial Access Broker Detailed White Paper from Digital Shadows Team
Free Computer Science E-Books and .pdf File
Super Imperialism The Economic Strategy of American Empire
2019 Summary of DoD Reports Issued
2018 Summary of DoD Reports Issued
Joint Force Theory and Transdimensional Warfare
Fifth Operational Domain USAF White Paper
Listen to Cory Doctorow's HOMELAND Audiobook
Listen to Cory Doctorow's CONTENT Audiobook
Dragos Oil and Gas Threat-Actor Assessment
CISCO's 2018 Executive Security Assessment
Book Review: Kingdom of Lies: Unnerving Adventures in the World of Cybercrime by Kate Fazzini
Check Out Internet Archive Resources
Free Information Technology Book Downloads
Invisible Women: Exposing Data Bias....
The Shadow Factory - James Bamford
NATO Cyber Defense Command (CCDOE) Full .pdf Download List
Anonymous: Survival Guide for Citizens in a Revolution
Life 3.0: Being Human in an Age of Artificial Intelligence by Max Tegmark
Free Cybersecurity Archived Collection