Hackers


Sidetracked (Mindf*ck, #2)
Coders: The Making of a New Tribe and the Remaking of the World
Breaking And Entering: The Extraordinary Story of a Hacker Called "Alien"
White-Hot Hack (Kate and Ian, #2)
Playing With Fire (#Hacker, #1)
@war: The Rise of the Military- Internet Complex
Kill Process (Kill Chain, #1)
Black Dawn (Titan, #6)
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Immoral Code
HACKING WITH SMART PHONES
Threat Modeling: Designing for Security
Ethical Hacking and Penetration Testing Guide
Zero Hour (Wired & Dangerous, #1)
Tor and the Dark Art of Anonymity (deep web, kali linux, hacking, bitcoins) : Network Security for the Rest of Us
Hacking: The Art of Exploitation w/CD
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Social Engineering
The Girl Who Played with Fire (Millennium #2)
Black Hat Python: Python Programming for Hackers and Pentesters
The Art of Deception: Controlling the Human Element of Security
Little Brother (Little Brother, #1)
Neuromancer (Sprawl, #1)
Gray Hat Hacking : The Ethical Hacker's Handbook
The Girl With the Dragon Tattoo (Millennium, #1)
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Hackers: Heroes of the Computer Revolution
Penetration Testing: A Hands-On Introduction to Hacking
Management 3.0 by Jurgen AppeloOpen Space Technology by Harrison OwenThe Culture Game by Daniel MezickTribal Leadership by Dave LoganReality is Broken by Jane McGonigal
Culture Hacking Books
22 books — 10 voters
Web Hacking Arsenal by Rafay  BalochPractical Malware Analysis by Michael SikorskiThe IDA Pro Book by Chris EaglePractical Reverse Engineering by Bruce DangIncident Response & Computer Forensics, Third Edition by Jason T. Luttgens
Ultimate Network Defender
36 books — 20 voters

The Hacker Ethic by Pekka HimanenThe Art of Invisibility by Kevin D. MitnickThe Hacker Crackdown by Bruce SterlingSteal This Computer Book 4.0 by Wallace WangCult of the Dead Cow by Joseph Menn
What is hacker culture?
12 books — 1 voter
Angelo by Silvia VioletLove the Sinner by Avril AshtonLucien by Silvia VioletLove of the Egoist by Nero SealA Sinner Born by Avril Ashton
Mafia / Gay / Romance
101 books — 37 voters

Web Hacking Arsenal by Rafay  BalochSecurity Engineering by Ross J. AndersonIntroduction to Security and Applied Cryptography by Bruce SchneierPractical Malware Analysis by Michael SikorskiThe Web Application Hacker's Handbook by Dafydd Stuttard
Information Security
80 books — 79 voters
Web Hacking Arsenal by Rafay  BalochSandworm by Andy GreenbergCountdown to Zero Day by Kim ZetterThe Perfect Weapon by David E. SangerClick Here to Kill Everybody by Bruce Schneier
Modern Cybersecurity 2019
98 books — 35 voters


Juan  Zamora
10 97 (arrived at scene) military officer Sim here, I have a man with a cyber 10 29f (Cyber felony)." "10 26 (Clear)" "10 12 (Be discrete, visitors are present)" "10 4 (Understood) ...more
Juan Zamora, The Trillion Dollar Cow

Jean Baudrillard
And is there really any possibility of discovering something in cyberspace? The Internet merely simulates a free mental space, a space of freedom and discovery. In fact, it merely offers a multiple but conventional space, in which the operator interacts with known elements, pre-existent sites, established codes. Nothing exists beyond its search parameters. Every question has an anticipated response assigned to it. You are the questioner and, at the same time, the automatic answering device of th ...more
Jean Baudrillard, The Intelligence of Evil or the Lucidity Pact

More quotes...
Welcome to the Cyber Security Book Club — a community for infosec professionals, ethical hackers…more
2 members, last active 7 months ago
Dev.F books Foro de discusión de la comunidad de Dev.f para hacer recomendaciones y discusiones de libros y …more
43 members, last active 10 years ago
Aphelion A group to read, absorb, and discuss knowledge from professionals in the Financial Technology in…more
2 members, last active 3 years ago
This group is designed to find and meet other people within the information security community a…more
21 members, last active 11 years ago

Tags

Tags contributing to this page include: hackers, hacker, and hacking