Hackers


Sidetracked (Mindf*ck, #2)
Coders: The Making of a New Tribe and the Remaking of the World
Breaking And Entering: The Extraordinary Story of a Hacker Called "Alien" – A Woman's Thrilling Career Journey from MIT Through Spycraft and Cybersecurity
White-Hot Hack (Kate and Ian, #2)
Playing With Fire (#Hacker, #1)
@war: The Rise of the Military- Internet Complex
Kill Process (Kill Chain, #1)
Black Dawn (Titan, #6)
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Immoral Code
HACKING WITH SMART PHONES
Threat Modeling: Designing for Security
Ethical Hacking and Penetration Testing Guide
Zero Hour (Wired & Dangerous, #1)
Tor and the Dark Art of Anonymity (deep web, kali linux, hacking, bitcoins) : Network Security for the Rest of Us
Hacking: The Art of Exploitation w/CD
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Social Engineering
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Girl Who Played with Fire (Millennium #2)
The Art of Deception: Controlling the Human Element of Security
Little Brother (Little Brother, #1)
Black Hat Python: Python Programming for Hackers and Pentesters
Neuromancer (Sprawl, #1)
Gray Hat Hacking : The Ethical Hacker's Handbook
The Girl With the Dragon Tattoo (Millennium, #1)
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Hackers: Heroes of the Computer Revolution
Penetration Testing: A Hands-On Introduction to Hacking
Web Hacking Arsenal by Rafay  BalochPractical Malware Analysis by Michael SikorskiThe IDA Pro Book by Chris EaglePractical Reverse Engineering by Bruce DangIncident Response & Computer Forensics, Third Edition by Jason T. Luttgens
Ultimate Network Defender
36 books — 20 voters
Management 3.0 by Jurgen AppeloOpen Space Technology by Harrison OwenThe Culture Game by Daniel MezickTribal Leadership by Dave LoganReality is Broken by Jane McGonigal
Culture Hacking Books
22 books — 10 voters

Web Hacking Arsenal by Rafay  BalochSecurity Engineering by Ross J. AndersonIntroduction to Security and Applied Cryptography by Bruce SchneierPractical Malware Analysis by Michael SikorskiThe Web Application Hacker's Handbook by Dafydd Stuttard
Information Security
80 books — 84 voters

Ready Player One by Ernest ClineSnow Crash by Neal StephensonDaemon by Leinad ZerausNeuromancer by William GibsonCryptonomicon by Neal Stephenson
Hackers
151 books — 427 voters
Fight Club by Chuck PalahniukDaemon by Leinad ZerausThe Dark Net by Jamie BartlettNexus by Ramez NaamHacker, Hoaxer, Whistleblower, Spy by Gabriella Coleman
Mr. Robot
26 books — 18 voters


Juan  Zamora
10 97 (arrived at scene) military officer Sim here, I have a man with a cyber 10 29f (Cyber felony)." "10 26 (Clear)" "10 12 (Be discrete, visitors are present)" "10 4 (Understood) ...more
Juan Zamora, The Trillion Dollar Cow

Jean Baudrillard
And is there really any possibility of discovering something in cyberspace? The Internet merely simulates a free mental space, a space of freedom and discovery. In fact, it merely offers a multiple but conventional space, in which the operator interacts with known elements, pre-existent sites, established codes. Nothing exists beyond its search parameters. Every question has an anticipated response assigned to it. You are the questioner and, at the same time, the automatic answering device of th ...more
Jean Baudrillard, The Intelligence of Evil or the Lucidity Pact

More quotes...
A place for fans of news.ycombinator.com can discuss and share about books they like.
137 members, last active 9 years ago
Gruppo di discussione su testi concernenti hackers, sicurezza, malware, exploit, rootkit, apt, w…more
1 member, last active 7 years ago
The Cybersecurity Book Club It's Goodreads' book club to discuss – online and in person – the best books on digital security…more
189 members, last active 20 days ago
Talking about books HN is reading. Personal additions are of course welcome.
3 members, last active 9 years ago

Tags

Tags contributing to this page include: hackers, hacker, and hacking