the backpack Rating system* Don’t put away your beach chair just yet.**. Back-to-school is in the air.***. Prepare to fire the synapses.**** No need to pull an all-nighter, but serious focus is required.*****. Read when wide awake. Have snacks nearby.thriller No Place to HideRobert O’Harrow Jr. Free Press, 2005$26 In our age of surveillance, where anyone can buy (for less than $50) enough information to steal your identity, and various private and public entities have increasing amounts of data about you, one thing is for sure: You are being watched. An unnerving look at just how that’s happening.**** memoirBlowing My Cover: My Life as a CIA SpyBy Lindsay MoranPenguin Group, 2005$22.95 One twentysomething’s adventures are recounted with wit and candor in this rare behind-the-scenes look at life in the CIA. A fascinating and lighthearted read that exposes the disparity between what you think it’s like to be a CIA agent and what it actually is like to be a CIA agent. * Infosecurity FitnessSilence on the Wire: A Field Guide to Passive Reconnaissance and Indirect AttacksBy Michal Zalewski No Starch Press, 2005$39.95Don’t be fooled by the cute coverthis book packs in tons of information about passive reconnaissance. May be a bit dense for those new to information warfare.***** Self-HelpFrom Victim to Victor: A Step-by-Step Guide for Ending the Nightmare of Identity Theft (Second Edition)Mari J. Frank, Esq.Porpoise Press, 2004, 2005$39.95This book instructs readers in the actions required to combat identity theft. Includes laws, forms and resources.*** Coffee-Table Book The Incredible World of Spy-Fi: Wild and Crazy Spy Gadgets, Props, and Artifacts from TV and the MoviesBy Danny BiedermanChronicle Books, 2004$19.95Espionage accoutrements of the hippest and most beloved fictional spies of yesteryear are presented in colorful funky layouts. A visual treat of photos, diagrams and profiles.* Travel: Global EconomyMapping Security: The Corporate Security Sourcebook for Today’s Global EconomyBy Tom Patterson with Scott Gleeson Blue Addison-Wesley Professional, 2005 $34.99This valuable guidebook explains how to implement successful security processes in a multinational business environment. Includes a metric for quantifying security risk.****Infosecurity InstructionThe Executive Guide to Information Security: Threats, Challenges, and SolutionsBy Mark Egan with Tim MatherAddison-Wesley Professional, 2005 $34.99Geared toward nontechnical executives, the people, process and technology of an effective information security system are well-presentedand with a minimum of jargon.***How-To: In-Home EspionageCyber Spying: Tracking Your Family’s (Sometimes) Secret Online LivesBy Ted Fair, Michael Nordfelt, Sandra Ring, and Dr. Eric Cole (Technical Editor)Syngress Publishing, 2005$39.95The hows and whys of cyberspying on family and friends are laid out in a step-by-step and in-depth manner. Includes a word on ethics.**** Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe