Popular Hackers Books

28+ [Hand Picked] Popular Books On Hackers

Discover the list of some best books written on Hackers by popular award winning authors. These book on topic Hackers highly popular among the readers worldwide.

3.6/5

The Kill List by Frederick Forsyth

In Virginia, there is an agency bearing the bland name of Technical Operations Support Activity, or TOSA. Its one mission is to track, find, and kill those so dangerous to the United States that they are on a short document known as the Kill List. TOSA actually exists. So does the Kill List. Added to it is a new name: a terrorist of frightening effectiveness called the Prea In Virginia, there is an agency bearing the bland name of Technical Operations Support Activity, or TOSA. Its one mission is to track, find, and kill those so dangerous to the United States that they are on a short document known as the Kill List. TOSA actually exists. So does the Kill List. Added to it is a new name: a terrorist of frightening effectiveness called the Preacher, who radicalizes young Muslims abroad to carry out assassinations. Unfortunately for him, one of the kills is a retired Marine general, whose son is TOSA’s top hunter of men. He has spent the last six years at his job. He knows nothing about his target’s name, face, or location. He realizes his search will take him to places where few could survive. But the Preacher has made it personal now. The hunt is on. An extraordinary cutting-edge suspense novel from the master of international intrigue and #1 New York Times–bestselling author.

I WANT TO READ THIS
4.7/5

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data by Kevin D. Mitnick , Robert Vamosi (Co-author)

Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data. Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data. Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.

I WANT TO READ THIS
5/5

Kill Process by William Hertling

By day, Angie, a twenty-year veteran of the tech industry, is a data analyst at Tomo, the world's largest social networking company; by night, she exploits her database access to profile domestic abusers and kill the worst of them. She can't change her own traumatic past, but she can save other women. When Tomo introduces a deceptive new product that preys on users' fears By day, Angie, a twenty-year veteran of the tech industry, is a data analyst at Tomo, the world's largest social networking company; by night, she exploits her database access to profile domestic abusers and kill the worst of them. She can't change her own traumatic past, but she can save other women. When Tomo introduces a deceptive new product that preys on users' fears to drive up its own revenue, Angie sees Tomo for what it really is--another evil abuser. Using her coding and hacking expertise, she decides to destroy Tomo by building a new social network that is completely distributed, compartmentalized, and unstoppable. If she succeeds, it will be the end of all centralized power in the Internet. But how can an anti-social, one-armed programmer with too many dark secrets succeed when the world's largest tech company is out to crush her and a no-name government black ops agency sets a psychopath to look into her growing digital footprint?"

I WANT TO READ THIS
4.7/5

Echoes by Laura Tisdall

“There is truth to be shared. Let us begin…” Volatile genius Mallory Park is living two lives. In one, she is trying to survive senior year, balancing OCD and social anxiety with looking after her troubled family. In the other, she spends her nights glued to her laptop, breaking into some of the world's most secure systems as the hacker Echo Six. As part of a corruption-expo “There is truth to be shared. Let us begin…” Volatile genius Mallory Park is living two lives. In one, she is trying to survive senior year, balancing OCD and social anxiety with looking after her troubled family. In the other, she spends her nights glued to her laptop, breaking into some of the world's most secure systems as the hacker Echo Six. As part of a corruption-exposing network called The Forum, Mallory is far more at ease among the codes and hidden identities of her online world than she has ever been in the real one - but when other hackers suddenly begin to go missing, she finds herself caught up in a web of secrets that could have repercussions far beyond both... When anyone can be a name on a screen, how do you know who to trust?

I WANT TO READ THIS
3.4/5

Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtu When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to: Create a trojan command-and-control using GitHub Detect sandboxing and automate common malware tasks, like keylogging and screenshotting Escalate Windows privileges with creative process control Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine Extend the popular Burp Suite web-hacking tool Abuse Windows COM automation to perform a man-in-the-browser attack Exfiltrate data from a network most sneakily Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python. "

I WANT TO READ THIS
4.6/5

The Coming Swarm: DDOS Actions, Hacktivism, and Civil Disobedience on the Internet by Molly Sauter

What is Hacktivism? In The Coming Swarm, rising star Molly Sauter examines the history, development, theory, and practice of distributed denial of service actions as a tactic of political activism. The internet is a vital arena of communication, self expression, and interpersonal organizing. When there is a message to convey, words to get out, or people to unify, many will What is Hacktivism? In The Coming Swarm, rising star Molly Sauter examines the history, development, theory, and practice of distributed denial of service actions as a tactic of political activism. The internet is a vital arena of communication, self expression, and interpersonal organizing. When there is a message to convey, words to get out, or people to unify, many will turn to the internet as a theater for that activity. As familiar and widely accepted activist tools-petitions, fundraisers, mass letter-writing, call-in campaigns and others-find equivalent practices in the online space, is there also room for the tactics of disruption and civil disobedience that are equally familiar from the realm of street marches, occupations, and sit-ins? With a historically grounded analysis, and a focus on early deployments of activist DDOS as well as modern instances to trace its development over time, The Coming Swarm uses activist DDOS actions as the foundation of a larger analysis of the practice of disruptive civil disobedience on the internet.

I WANT TO READ THIS
3.3/5

Ones and Zeroes by Dan Wells

From Dan Wells, author of the New York Times bestselling Partials Sequence and the John Cleaver series, comes the second book in a dark, pulse-pounding sci-fi-noir series set in 2050 Los Angeles. Overworld. It’s more than just the world’s most popular e-sport—for thousands of VR teams around the globe, Overworld is life. It means fame and fortune, or maybe it’s a ticket out From Dan Wells, author of the New York Times bestselling Partials Sequence and the John Cleaver series, comes the second book in a dark, pulse-pounding sci-fi-noir series set in 2050 Los Angeles. Overworld. It’s more than just the world’s most popular e-sport—for thousands of VR teams around the globe, Overworld is life. It means fame and fortune, or maybe it’s a ticket out of obscurity or poverty. If you have a connection to the internet and four friends you trust with your life, anything is possible. Marisa Carneseca is on the hunt for a mysterious hacker named Grendel when she receives word that her amateur Overworld team has been invited to Forward Motion, one of the most exclusive tournaments of the year. For Marisa, this could mean anything—a chance to finally go pro and to help her family, stuck in an LA neighborhood on the wrong side of the growing divide between the rich and the poor. But Forward Motion turns out to be more than it seems—rife with corruption, infighting, and danger—and Marisa runs headlong into Alain Bensoussan, a beautiful, dangerous underground freedom fighter who reveals to her the darker side of the forces behind the tournament. It soon becomes clear that, in this game, winning might be the only way to get out alive.

I WANT TO READ THIS
4.3/5

Find Me by Romily Bernard

“Find Me.” These are the words written on Tessa Waye’s diary. The diary that ends up with Wick Tate. But Tessa’s just been found . . . dead. Wick has the right computer-hacking skills for the job, but little interest in this perverse game of hide-and-seek. Until her sister Lily is the next target. Then Griff, trailer-park boy next door and fellow hacker, shows up, intent on h “Find Me.” These are the words written on Tessa Waye’s diary. The diary that ends up with Wick Tate. But Tessa’s just been found . . . dead. Wick has the right computer-hacking skills for the job, but little interest in this perverse game of hide-and-seek. Until her sister Lily is the next target. Then Griff, trailer-park boy next door and fellow hacker, shows up, intent on helping Wick. Is a happy ending possible with the threat of Wick’s deadbeat dad returning, the detective hunting him sniffing around Wick instead, and a killer taunting her at every step? Foster child. Daughter of a felon. Loner hacker girl. Wick has a bad attitude and sarcasm to spare. But she’s going to find this killer no matter what. Because it just got personal.

I WANT TO READ THIS
3.2/5

Dark Territory: The Secret History of Cyber War by Fred Kaplan

The never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invented and employ the wars of the present and future - the cyber wars where every country can be a major power player and every hacker a mass destroyer, as reported by a Pulitzer Prize-winning security and defense journalist. In June 1983, President Reagan watche The never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invented and employ the wars of the present and future - the cyber wars where every country can be a major power player and every hacker a mass destroyer, as reported by a Pulitzer Prize-winning security and defense journalist. In June 1983, President Reagan watched the movie War Games, in which a kid unwittingly hacks the Pentagon, and asked his top general if the scenario was plausible. The general said it was. This set in motion the first presidential directive on computer security. The first use of cyber techniques in battle occurred in George H.W. Bush's Kuwait invasion in 1991 to disable Saddam's military communications. One year later, the NSA Director watched Sneakers, in which one of the characters says wars will soon be decided not by bullets or bombs but by information. The NSA and the Pentagon have been rowing over control of cyber weapons ever since. From the 1994 (aborted) US invasion of Haiti, when the plan was to neutralize Haitian air-defenses by making all the telephones in Haiti busy at the same time, to Obama's Defense Department 2015 report on cyber policy that spells out the lead role played by our offensive operation, Fred Kaplan tells the story of the NSA and the Pentagon as they explore, exploit, fight, and defend the US. Dark Territory reveals all the details, including the 1998 incident when someone hacked into major US military commands and it wasn't Iraq, but two teenagers from California; how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air-defense radar system; the time in 2014 when North Korea hacks Sony's networks to pressure the studio to cancel a major Hollywood blockbuster; and many more. Dark Territory is the most urgent and controversial topic in national defense policy.

I WANT TO READ THIS
3.9/5

Black Dawn by Cristin Harber

Parker Black wants the one woman he shouldn’t have—his buddy’s girl. She's sweet and smart, but clueless about how deep Parker lives in Titan’s virtual world. Everything is controlled. Chaos is mastered. Black and white data and risk analysis. That is the way he understands his world, how he plays his role to keep Titan teams alive. But he’s wrong. About everything. Lexi Dare Parker Black wants the one woman he shouldn’t have—his buddy’s girl. She's sweet and smart, but clueless about how deep Parker lives in Titan’s virtual world. Everything is controlled. Chaos is mastered. Black and white data and risk analysis. That is the way he understands his world, how he plays his role to keep Titan teams alive. But he’s wrong. About everything. Lexi Dare lives two lives. She’s an unhappy fiancée stuck in a spiraling relationship, unsure how she ended up with a ring on her finger and an abuser in her bed. But she’s also elusive. Elite. A master hacker playing deadly stakes. When the lines blur and the truth comes out, Lexi’s only shot at survival is the trust of her rival—her equal—before it’s too late.

I WANT TO READ THIS
4.7/5

White-Hot Hack by Tracey Garvis Graves

Their love story began in Heart-Shaped Hack. Join Kate and Ian for the thrilling conclusion in White-Hot Hack. When cybercriminals doxed undercover hacker Ian Bradshaw and forced him to flee, he begged Kate Watts for forgiveness and vowed never to hurt her again. He also convinced her to marry him, and when their idyllic summer on Roanoke Island comes to an end, the newlywe Their love story began in Heart-Shaped Hack. Join Kate and Ian for the thrilling conclusion in White-Hot Hack. When cybercriminals doxed undercover hacker Ian Bradshaw and forced him to flee, he begged Kate Watts for forgiveness and vowed never to hurt her again. He also convinced her to marry him, and when their idyllic summer on Roanoke Island comes to an end, the newlyweds relocate to their new home deep in the heart of Virginia’s horse and wine country. Ian still struggles with boundaries, but he keeps Kate’s lingerie drawer filled with surprises, and there’s no shortage of number-six kisses. There’s even a fast, new car to replace his beloved Shelby. Ian promised Kate that life with him would never be boring, but spending her days picking out paint colors and going to Pilates isn’t going to cut it. Meanwhile, Ian discovers that building a white-hat security firm from the ground up seems harder the second time around, and he might have underestimated how much he’d miss the undercover work he walked away from. To make matters worse, the hacktivists are threatening national security, and the task force could really use Ian’s help. Kate and Ian have always worried that their past would catch up to them, and when faced with the biggest showdown of their lives, they must capitalize on the one thing they excel at most: teamwork. Ian claims no one is a better hacker than him, but in order to triumph, he’ll have to prove it. And if he can’t, he risks losing the woman whose heart he worked so hard to hack. This is the second and final book in the Kate and Ian series. The first book, Heart-Shaped Hack, can be read as a standalone.

I WANT TO READ THIS
3.1/5

Don't Let Go by Michelle Gagnon

In this pulse-pounding final installment of the Don’t Turn Around trilogy, Noa and Peter race across the country in their search to destroy Project Persephone before time runs out. After a devastating loss, Noa Torson is out of options. On the run with the three remaining teens of Persephone’s Army, she is up against immeasurable odds. The group is outnumbered, outsmarted, In this pulse-pounding final installment of the Don’t Turn Around trilogy, Noa and Peter race across the country in their search to destroy Project Persephone before time runs out. After a devastating loss, Noa Torson is out of options. On the run with the three remaining teens of Persephone’s Army, she is up against immeasurable odds. The group is outnumbered, outsmarted, and outrun. But they are not giving up. When Noa and Peter realize they can’t run anymore, and that Noa’s health is failing, they know they must go back to where this began. But when they come face-to-face with the man who started it all, the question becomes, can they win? This riveting final book in the Don’t Turn Around trilogy ratchets up the action as Noa and Peter confront the evil that has chased them and won’t let them go.

I WANT TO READ THIS
3.8/5

Zero Hour by Megan Erickson

The Fast and the Furious meets Mr. Robot in USA Today bestselling author Megan Erickson's thrilling new romantic suspense series. Hacker extraordinaire Roarke Brennan lives each hour - each breath - to avenge his brother's murder. His first move: put together a team of the best coders he knows. They're all brilliant, specialized, and every one an epic pain in his ass. Only The Fast and the Furious meets Mr. Robot in USA Today bestselling author Megan Erickson's thrilling new romantic suspense series. Hacker extraordinaire Roarke Brennan lives each hour - each breath - to avenge his brother's murder. His first move: put together a team of the best coders he knows. They're all brilliant, specialized, and every one an epic pain in his ass. Only now Wren Lee wants in too, threatening to upset their delicate balance. The girl Roarke never allowed himself to want is all grown up with sexy confidence and a dark past ... and she's the wild card he can't control. Roarke might still think she's a kid, but Wren's been to hell and back. Nothing and nobody can stop her - especially the tatted-up, cocky-as-all-hell hacker. But when years of longing and chemistry collide, Wren and Roarke discover that revenge may be a dish best served blazing hot.

I WANT TO READ THIS
4/5

How to Hack: Hacking Secrets Exposed: A Beginner's Guide by Srikanth Ramesh

Want to Learn Hacking... But Don't Know Where to Start..? If so, this book is specially designed for you. Hacking Secrets Exposed is an easy-to-follow, complete course on ethical hacking that takes readers right from the basics to some of the highly advanced concepts. The book starts with basic concepts like footprinting, scanning, network reconnaissance, OS fingerprintin Want to Learn Hacking... But Don't Know Where to Start..? If so, this book is specially designed for you. Hacking Secrets Exposed is an easy-to-follow, complete course on ethical hacking that takes readers right from the basics to some of the highly advanced concepts. The book starts with basic concepts like footprinting, scanning, network reconnaissance, OS fingerprinting etc. and advances to higher level concepts like password cracking, Windows hacking, network sniffing, wireless hacking, steganography, DoS, XSS, SQL injection, buffer overflow, session hijacking, email hacking and much more. Most of the popular books that are currently available in the market are suitable only for those who have a considerable amount of background knowledge in the field. Also, these books may dive too much into the theoretical part and use a lot technical jargon making it hard for beginners to follow and comprehend. However, this book will take you through the concepts of computer hacking in a very simple and easy to follow manner so that even the readers with no prior knowledge of hacking should be able to easily understand the concept. To start off, all you need is a little working knowledge of computers, operating system (Windows) and an Internet connection. Each topic in the book is presented in an extremely simple manner by including bullet points, illustrations and practical examples. The following are some of the highlighting features of the book: Learn Hacking from the Basics. Extremely Easy to Follow. No Prior Knowledge of Hacking is Required. Get Latest Hacking Techniques and Practical Examples. So, if you are a beginner with a little or no prior background of hacking but looking to take off, Hacking Secrets Exposed is for you! We promise that you will never be disappointed by opting for this book.

I WANT TO READ THIS
3.8/5

Exploited by A. Meredith Walters

In this pulse-pounding novel from the bestselling author of Butterfly Dreams, a vigilante hacker plays a seductive game with the agent who’s chasing her online—and sharing her bed in real life. At first glance, I’m nothing out of the ordinary. I am a daughter. A sister. A friend. When you look at me you won’t see anything that warrants suspicion. I don’t look like a crimina In this pulse-pounding novel from the bestselling author of Butterfly Dreams, a vigilante hacker plays a seductive game with the agent who’s chasing her online—and sharing her bed in real life. At first glance, I’m nothing out of the ordinary. I am a daughter. A sister. A friend. When you look at me you won’t see anything that warrants suspicion. I don’t look like a criminal. My name is Hannah Whalen, but most people know me as freed0mov3rdr1v3, or “Freedom Overdrive”—one of the world’s most prolific and notorious hacktivists. My goal—my purpose—is to shed light on the evil that lurks behind the corporate and government lies we have been force-fed for too long. My story begins with the best possible intention. Devoting my life to exposing the corrupt. The dishonest. The unethical. For that, they label me a cyber-terrorist. Wanted by the FBI, I’ve always been one step ahead. Until I fell in love. Because I’m sleeping with the man who’s hunting me. And he has no idea that I am his prey. Now I have to decide what’s more important: my freedom or my heart. Note: Exploited ends on a cliffhanger. Hannah’s story continues in Aftermath.

I WANT TO READ THIS
5/5

The Girl Who Played with Fire by Stieg Larsson , Reg Keeland (Translator)

Part blistering espionage thriller, part riveting police procedural, and part piercing exposé on social injustice, The Girl Who Played with Fire is a masterful, endlessly satisfying novel.   Mikael Blomkvist, crusading publisher of the magazine Millennium, has decided to run a story that will expose an extensive sex trafficking operation. On the eve of its publication, the Part blistering espionage thriller, part riveting police procedural, and part piercing exposé on social injustice, The Girl Who Played with Fire is a masterful, endlessly satisfying novel.   Mikael Blomkvist, crusading publisher of the magazine Millennium, has decided to run a story that will expose an extensive sex trafficking operation. On the eve of its publication, the two reporters responsible for the article are murdered, and the fingerprints found on the murder weapon belong to his friend, the troubled genius hacker Lisbeth Salander. Blomkvist, convinced of Salander’s innocence, plunges into an investigation. Meanwhile, Salander herself is drawn into a murderous game of cat and mouse, which forces her to face her dark past. From the Trade Paperback edition.

I WANT TO READ THIS
5/5

The Girl with the Dragon Tattoo by Stieg Larsson , Reg Keeland (Translator)

Alternate Cover Edition ISBN 0307269752 (ISBN13: 9780307269751) An international publishing sensation, Stieg Larsson’s The Girl with the Dragon Tattoo combines murder mystery, family saga, love story, and financial intrigue into one satisfyingly complex and entertainingly atmospheric novel. Harriet Vanger, a scion of one of Sweden’s wealthiest families disappeared over forty Alternate Cover Edition ISBN 0307269752 (ISBN13: 9780307269751) An international publishing sensation, Stieg Larsson’s The Girl with the Dragon Tattoo combines murder mystery, family saga, love story, and financial intrigue into one satisfyingly complex and entertainingly atmospheric novel. Harriet Vanger, a scion of one of Sweden’s wealthiest families disappeared over forty years ago. All these years later, her aged uncle continues to seek the truth. He hires Mikael Blomkvist, a crusading journalist recently trapped by a libel conviction, to investigate. He is aided by the pierced and tattooed punk prodigy Lisbeth Salander. Together they tap into a vein of unfathomable iniquity and astonishing corruption.

I WANT TO READ THIS
5/5

Little Brother by Cory Doctorow

Marcus aka “w1n5t0n,” is only seventeen years old, but he figures he already knows how the system works–and how to work the system. Smart, fast, and wise to the ways of the networked world, he has no trouble outwitting his high school’s intrusive but clumsy surveillance systems. But his whole world changes when he and his friends find themselves caught in the aftermath of a Marcus aka “w1n5t0n,” is only seventeen years old, but he figures he already knows how the system works–and how to work the system. Smart, fast, and wise to the ways of the networked world, he has no trouble outwitting his high school’s intrusive but clumsy surveillance systems. But his whole world changes when he and his friends find themselves caught in the aftermath of a major terrorist attack on San Francisco. In the wrong place at the wrong time, Marcus and his crew are apprehended by the Department of Homeland Security and whisked away to a secret prison where they’re mercilessly interrogated for days. When the DHS finally releases them, his injured best friend Darryl does not come out. The city has become a police state where every citizen is treated like a potential terrorist. He knows that no one will believe his story, which leaves him only one option: "M1k3y" will take down the DHS himself.

I WANT TO READ THIS
3.9/5

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker by Kevin D. Mitnick , William L. Simon , Steve Wozniak

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies, and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. For Mi Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies, and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. For Mitnick, hacking wasn't just about technological feats; it was an old-fashioned confidence game that required guile and deception to trick the unwitting out of valuable information. Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. As the FBI's net began to tighten, Mitnick went on the run, engaging in an increasingly sophisticated cat-and-mouse game that led through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down. Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information.

I WANT TO READ THIS
4.2/5

Hacking: The Art of Exploitation by Jon Erickson

A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, retur A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

I WANT TO READ THIS
3.8/5

Neuromancer by William Gibson , Jack Womack (Afterword)

Winner of the Hugo, Nebula, and Philip K. Dick Awards Case was the sharpest data thief in the Matrix, until an ex-employer crippled his nervous system. Now a new employer has recruited him for a last-chance run against an unthinkably powerful artificial intelligence. With a mirror-eyed girl street-samurai riding shotgun, he's ready for the silicon-quick, bleakly prophetic a Winner of the Hugo, Nebula, and Philip K. Dick Awards Case was the sharpest data thief in the Matrix, until an ex-employer crippled his nervous system. Now a new employer has recruited him for a last-chance run against an unthinkably powerful artificial intelligence. With a mirror-eyed girl street-samurai riding shotgun, he's ready for the silicon-quick, bleakly prophetic adventure that upped the ante on an entire genre of fiction.

I WANT TO READ THIS
3.6/5

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage by Clifford Stoll

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a c Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" -- a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases -- a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.

I WANT TO READ THIS
3.2/5

Hardwired by Meredith Wild

Devour the addictive #1 NYT series that's sold over a million copies worldwide about a bad boy hacker billionaire and the whip-smart woman he can't resist. Determined to overcome a difficult past, Erica Hathaway learns early on how to make it on her own. Days after her college graduation she finds herself face to face with a panel of investors who will make or break her f Devour the addictive #1 NYT series that's sold over a million copies worldwide about a bad boy hacker billionaire and the whip-smart woman he can't resist. Determined to overcome a difficult past, Erica Hathaway learns early on how to make it on her own. Days after her college graduation she finds herself face to face with a panel of investors who will make or break her fledgling startup. The only thing she didn't prepare for was going weak in the knees over an arrogant and gorgeous investor who's seemingly determined to derail her presentation. Billionaire and rumored hacker Blake Landon has already made his fortune in software, and he's used to getting what he wants with very little resistance. Captivated by Erica's drive and unassuming beauty, he's wanted nothing more since she stepped into his boardroom. Determined to win her over, he breaks down her defenses and fights for her trust, even if that means sacrificing a level of control he's grown accustomed to. But when Blake uncovers a dark secret from Erica's past, he threatens not just her trust, but the life she's fought so hard to create.

I WANT TO READ THIS
4.1/5

Hackers: Heroes of the Computer Revolution by Steven Levy

A mere fifteen years ago, computer nerds were seen as marginal weirdos, outsiders whose world would never resonate with the mainstream. That was before one pioneering work documented the underground computer revolution that was about to change our world forever. With groundbreaking profiles of Bill Gates, Steve Wozniak, MIT's Tech Model Railroad Club, and more, Steven Levy A mere fifteen years ago, computer nerds were seen as marginal weirdos, outsiders whose world would never resonate with the mainstream. That was before one pioneering work documented the underground computer revolution that was about to change our world forever. With groundbreaking profiles of Bill Gates, Steve Wozniak, MIT's Tech Model Railroad Club, and more, Steven Levy's Hackers brilliantly captured a seminal moment when the risk-takers and explorers were poised to conquer twentieth-century America's last great frontier. And in the Internet age, the hacker ethic-first espoused here-is alive and well.

I WANT TO READ THIS
4.4/5

The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick , William L. Simon , Steve Wozniak (Foreword)

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief." Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

I WANT TO READ THIS
4.8/5

Hardpressed by Meredith Wild

In HARDPRESSED, the highly anticipated second book of the Hacker Series that began with Hardwired, Blake and Erica face threats that put both their love and their lives on the line. Despite Blake Landon's controlling ways, the young and wealthy hacker finally won the trust of the woman he loves. Internet entrepreneur Erica Hathaway broke down the walls that kept her from o In HARDPRESSED, the highly anticipated second book of the Hacker Series that began with Hardwired, Blake and Erica face threats that put both their love and their lives on the line. Despite Blake Landon's controlling ways, the young and wealthy hacker finally won the trust of the woman he loves. Internet entrepreneur Erica Hathaway broke down the walls that kept her from opening her heart and her business to Blake. Ready to start this new chapter in her life, Erica is determined not to let anything come between them, even if that means giving Blake back some of the control he craves in and out of the bedroom. But when demons from her past threaten their future, Erica makes a decision that could change their lives forever.

I WANT TO READ THIS
4.8/5

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers by Kevin D. Mitnick , William L. Simon

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studie Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

I WANT TO READ THIS
4.6/5

Hardline by Meredith Wild

Software mogul Blake Landon has met his match in headstrong Erica Hathaway. While his controlling nature and her independent spirit continue to battle, Blake has no intention of letting her out of his life again. Erica has given Blake her trust and her love, determined that they will conquer any challenges together. But when he demands more and tests the boundaries of her Software mogul Blake Landon has met his match in headstrong Erica Hathaway. While his controlling nature and her independent spirit continue to battle, Blake has no intention of letting her out of his life again. Erica has given Blake her trust and her love, determined that they will conquer any challenges together. But when he demands more and tests the boundaries of her commitment, she is forced to face the dark desires he's kept hidden. As their bonds grow tighter, their enemies close in. With Erica's start-up in danger, Blake's frustration grows as he tries to protect her from those who would ruin her only to get to him. Can their relationship survive when Blake's enemies cross the line and threaten more than her livelihood?

I WANT TO READ THIS