Hackers


Sidetracked (Mindf*ck, #2)
Coders: The Making of a New Tribe and the Remaking of the World
Breaking And Entering: The Extraordinary Story of a Hacker Called "Alien"
White-Hot Hack (Kate and Ian, #2)
Playing With Fire (#Hacker, #1)
@War: The Rise of the Military-Internet Complex
Kill Process (Kill Chain, #1)
Black Dawn (Titan, #6)
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Immoral Code
HACKING WITH SMART PHONES
Threat Modeling: Designing for Security
Ethical Hacking and Penetration Testing Guide
Zero Hour (Wired & Dangerous, #1)
Tor and the Dark Art of Anonymity (deep web, kali linux, hacking, bitcoins) : Network Security for the Rest of Us
Hacking: The Art of Exploitation w/CD
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Social Engineering
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Art of Deception: Controlling the Human Element of Security
Little Brother (Little Brother, #1)
The Girl Who Played with Fire (Millennium #2)
The Girl With the Dragon Tattoo (Millennium, #1)
Gray Hat Hacking : The Ethical Hacker's Handbook
Black Hat Python: Python Programming for Hackers and Pentesters
Hackers: Heroes of the Computer Revolution
Neuromancer (Sprawl, #1)
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Management 3.0 by Jurgen AppeloOpen Space Technology by Harrison OwenThe Culture Game by Daniel MezickTribal Leadership by Dave LoganReality is Broken by Jane McGonigal
Culture Hacking Books
22 books — 10 voters
The Volunteer by Michael RossSpies Against Armageddon by Dan RavivThe Mission, the Men, and Me by Pete BlaberInside Delta Force by Eric L. HaneyRed Teams and Counterterrorism Training (Volume 7) by Stephen Sloan
Red Teams Bookshelf
23 books — 4 voters

Web Hacking Arsenal by Rafay BalochHackers by Steven LevyThe Cuckoo's Egg by Clifford StollGhost in the Wires by Kevin D. MitnickWe Are Anonymous by Parmy Olson
Hacker nonfiction
66 books — 128 voters
The Madness of Lord Ian Mackenzie by Jennifer AshleyTempt Me at Twilight by Lisa KleypasWhen Beauty Tamed the Beast by Eloisa JamesMine Till Midnight by Lisa KleypasIt Happened One Autumn by Lisa Kleypas
Brainy/Genius Romantic Heroes
548 books — 604 voters

Web Hacking Arsenal by Rafay BalochSecurity Engineering by Ross J. AndersonIntroduction to Security and Applied Cryptography by Bruce SchneierPractical Malware Analysis by Michael SikorskiThe Web Application Hacker's Handbook by Dafydd Stuttard
Information Security
80 books — 72 voters
Advanced Lock Picking Secrets by Steven HamptonSurveillance Countermeasures by ACM IV Security ServicesSafecracker by Ryan WickOPEN IN THIRTY SECONDS by Marc Weber TobiasThe Art of Intrusion by Kevin D. Mitnick
How to be a criminal
130 books — 28 voters


Juan  Zamora
I didn't know that, but don't you think you are speculating too much? In today's era, women have responded to men to survive." "IT HAS ALWAYS BEEN ABOUT SURVIVAL. ...more
Juan Zamora, The Trillion Dollar Cow

Shannon L. Alder
Evil never dies in abusive people. It only changes to obsession.
Shannon L. Alder, The Narcissistic Abuse Recovery Bible: Spiritual Recovery from Narcissistic and Emotional Abuse

More quotes...
Digital IT, IoT and ICS/SCADA book, author, fan, curious, anyone hacking who has ever bend the r…more
2 members, last active 7 years ago
A place for fans of news.ycombinator.com can discuss and share about books they like.
138 members, last active 9 years ago
The former intern trying to find friends in the office :) Feel free to add books, discuss, and d…more
1 member, last active 8 months ago
Aphelion A group to read, absorb, and discuss knowledge from professionals in the Financial Technology in…more
1 member, last active 3 years ago

Tags

Tags contributing to this page include: hackers, hacker, and hacking