The Cyber Effect 

by Mary Aiken

Recommended by Justin Young, Cyber Expert


This book provides a comprehensive overview of the psychological and social impact of cyberspace on individuals and society as a whole. Aiken provides a valuable perspective on the ways in which technology is changing our world and the steps we can take to protect ourselves from its negative effects.

Select this book

Cyber Expert


Justin is a seasoned cybersecurity professional with over a decade of experience in the field. He has worked with a wide range of organisations, from small startups to Fortune 500 companies, helping them protect their critical assets from cyber threats. Justin is passionate about educating others on the importance of cybersecurity and is a frequent speaker at industry events. He is also a published author and has contributed to a number of leading cybersecurity publications. In his free time, Justin enjoys hiking, playing guitar, and spending time with his family.



Head back to our exclusive book club

Our club is designed exclusively for CIOs and IT Leaders, to help them stay on top of the latest trends and insights in the rapidly-evolving world of IT.


Discover more






Other books available this quarter



The New IT by Jill Dyché

Building strong relationships between IT and
business stakeholders is essential for IT leaders
who want to create value for their organizations.
What I appreciate about this book is how Dyché
emphasizes the importance of collaboration
and communication between IT and business

— Recommended by James Green, CIO

Doing Agile Right by Darrell K. Rigby, Sarah Elk, and Steve Berez

In “Doing Agile Right,” the authors provide a comprehensive guide to implementing agile methodologies in a way that delivers real value, without causing chaos or disruption. Drawing on their extensive experience working with organizations of all sizes, the authors outline the key principles and practices that are necessary for agile to succeed in the modern business environment.

— Recommended by Rob Davies, Managed Services and Digital Transformation

Featured resources for you

Hacking: The Art of Exploitation

by Jon Erickson

A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

Coming soon!

Practical Malware Analysis

by Michael Sikorski and Andrew Honig

For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.

Coming soon!

The Art of Invisibility: The World’s Most Famous Hacker

by Kevin Mitnick

In The Art of Invisibility Mitnick provides both online and real-life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy.

Coming soon!



Choose your book

To choose your books, simply click the select button below and make your selection. And don't forget to check out the full reviews of each book. 


Select books