Hackers


Sidetracked (Mindf*ck, #2)
Coders: The Making of a New Tribe and the Remaking of the World
Breaking And Entering: The Extraordinary Story of a Hacker Called "Alien"
White-Hot Hack (Kate and Ian, #2)
Playing With Fire (#Hacker, #1)
@War: The Rise of the Military-Internet Complex
Kill Process (Kill Chain, #1)
Black Dawn (Titan, #6)
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Immoral Code
HACKING WITH SMART PHONES
Threat Modeling: Designing for Security
Ethical Hacking and Penetration Testing Guide
Zero Hour (Wired & Dangerous, #1)
Tor and the Dark Art of Anonymity (deep web, kali linux, hacking, bitcoins) : Network Security for the Rest of Us
Hacking: The Art of Exploitation w/CD
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Social Engineering
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Art of Deception: Controlling the Human Element of Security
Little Brother (Little Brother, #1)
The Girl Who Played with Fire (Millennium #2)
The Girl With the Dragon Tattoo (Millennium, #1)
Gray Hat Hacking : The Ethical Hacker's Handbook
Hackers: Heroes of the Computer Revolution
Neuromancer (Sprawl, #1)
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Black Hat Python: Python Programming for Hackers and Pentesters
Penetration Testing: A Hands-On Introduction to Hacking
Sandworm by Andy GreenbergCountdown to Zero Day by Kim ZetterThe Perfect Weapon by David E. SangerClick Here to Kill Everybody by Bruce SchneierFuture Crimes by Marc Goodman
Modern Cybersecurity 2019
84 books — 17 voters
Cult of the Dead Cow by Joseph MennThe Cuckoo's Egg by Clifford StollHacking by Jon EricksonGhost in the Wires by Kevin D. MitnickWe Are Bellingcat by Eliot Higgins
The Best Hacking Books
74 books — 4 voters

Practical Malware Analysis by Michael SikorskiThe IDA Pro Book by Chris EaglePractical Reverse Engineering by Bruce DangIncident Response & Computer Forensics, Third Edition by Jason T. LuttgensThe Practice of Network Security Monitoring by Richard Bejtlich
Ultimate Network Defender
35 books — 3 voters
#SayHerName by Kimberlé CrenshawFracking by Kathryn   Hulick#SayHerName by Kimberlé CrenshawThe War on Poverty by Carolee LaineThe Syrian Conflict by Michael Capek
Special Reports series
44 books — 8 voters

Security Engineering by Ross J. AndersonIntroduction to Security and Applied Cryptography by Bruce SchneierPractical Malware Analysis by Michael SikorskiThe Web Application Hacker's Handbook by Dafydd StuttardSecrets and Lies by Bruce Schneier
Information Security
79 books — 39 voters
Practical Electronics for Inventors by Paul ScherzBuild Your Own Autonomous NERF Blaster by Bryce Bigger30 Arduino Projects for the Evil Genius by Simon MonkDIY RC Airplanes from Scratch by Breck BaldwinThe TAB Guide to DIY Welding by Jackson Morley
TAB Electronics
53 books — 6 voters


Shannon L. Alder
Obsession /əbˈseSHən/ (noun) 1. The act of constantly asking hackers to get the Google passwords of the person you can't ever leave alone. 2. Constantly telling every new woman that this person won't leave you alone, while you are looking them up on the computer constantly to see if they are looking you up on the computer. 3. Ruining every relationship you are in because of this other person you are obsessed over. 4. A trait of a narcissist ...more
shannon l. alder

Your present is responsible for each and every minute of your past and future
Ameer Moavia

More quotes...
This group is designed to find and meet other people within the information security community a…more
21 members, last active 11 years ago
Talking about books HN is reading. Personal additions are of course welcome.
3 members, last active 9 years ago
B&N Nook Color & Tablet Users Affinity and support group for Nook Color, Nook Tablet, Nook HD, and Nook HD+ users/supporters :…more
236 members, last active 8 years ago
Aphelion A group to read, absorb, and discuss knowledge from professionals in the Financial Technology in…more
1 member, last active 3 years ago

Tags

Tags contributing to this page include: hackers, hacker, and hacking