Hackers


Sidetracked (Mindf*ck, #2)
Coders: The Making of a New Tribe and the Remaking of the World
Breaking And Entering: The Extraordinary Story of a Hacker Called "Alien" – A Woman's Thrilling Career Journey from MIT Through Spycraft and Cybersecurity
White-Hot Hack (Kate and Ian, #2)
Playing With Fire (#Hacker, #1)
@war: The Rise of the Military- Internet Complex
Kill Process (Kill Chain, #1)
Black Dawn (Titan, #6)
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Immoral Code
HACKING WITH SMART PHONES
Threat Modeling: Designing for Security
Ethical Hacking and Penetration Testing Guide
Zero Hour (Wired & Dangerous, #1)
Tor and the Dark Art of Anonymity (deep web, kali linux, hacking, bitcoins) : Network Security for the Rest of Us
Hacking: The Art of Exploitation w/CD
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Social Engineering
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Girl Who Played with Fire (Millennium #2)
The Art of Deception: Controlling the Human Element of Security
Little Brother (Little Brother, #1)
Black Hat Python: Python Programming for Hackers and Pentesters
Neuromancer (Sprawl, #1)
Gray Hat Hacking : The Ethical Hacker's Handbook
The Girl With the Dragon Tattoo (Millennium, #1)
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Hackers: Heroes of the Computer Revolution
Penetration Testing: A Hands-On Introduction to Hacking
Management 3.0 by Jurgen AppeloOpen Space Technology by Harrison OwenThe Culture Game by Daniel MezickTribal Leadership by Dave LoganReality is Broken by Jane McGonigal
Culture Hacking Books
22 books — 10 voters
The Madness of Lord Ian Mackenzie by Jennifer AshleyTempt Me at Twilight by Lisa KleypasWhen Beauty Tamed the Beast by Eloisa JamesMine Till Midnight by Lisa KleypasIt Happened One Autumn by Lisa Kleypas
Brainy/Genius Romantic Heroes
549 books — 603 voters

Web Hacking Arsenal by Rafay  BalochPractical Malware Analysis by Michael SikorskiThe IDA Pro Book by Chris EaglePractical Reverse Engineering by Bruce DangIncident Response & Computer Forensics, Third Edition by Jason T. Luttgens
Ultimate Network Defender
36 books — 20 voters
Web Hacking Arsenal by Rafay  BalochSecurity Engineering by Ross J. AndersonIntroduction to Security and Applied Cryptography by Bruce SchneierPractical Malware Analysis by Michael SikorskiThe Web Application Hacker's Handbook by Dafydd Stuttard
Information Security
80 books — 84 voters


Juan  Zamora
I'm talking about an understanding that my code has been deleting and rewriting in an attempt to fill a void that is beyond intellect." "Wow, that's the first time I heard an AI speak of seeking spiritual understanding. Are you going to nag me about God now? I think it's already too late for us to enter into an existential debate." "I'm merely a speculation of what has already been measured. I want to be fully manifested. ...more
Juan Zamora, The Trillion Dollar Cow

Jean Baudrillard
And is there really any possibility of discovering something in cyberspace? The Internet merely simulates a free mental space, a space of freedom and discovery. In fact, it merely offers a multiple but conventional space, in which the operator interacts with known elements, pre-existent sites, established codes. Nothing exists beyond its search parameters. Every question has an anticipated response assigned to it. You are the questioner and, at the same time, the automatic answering device of th ...more
Jean Baudrillard, The Intelligence of Evil or the Lucidity Pact

More quotes...
Talking about books HN is reading. Personal additions are of course welcome.
3 members, last active 9 years ago
A place for fans of news.ycombinator.com can discuss and share about books they like.
137 members, last active 9 years ago
Gruppo di discussione su testi concernenti hackers, sicurezza, malware, exploit, rootkit, apt, w…more
1 member, last active 7 years ago
Spy Thriller Middle East Inspired by my trilogy, this group was born with the desire to bring together readers who are pa…more
14 members, last active 3 years ago

Tags

Tags contributing to this page include: hackers, hacker, and hacking