Hackers


Sidetracked (Mindf*ck, #2)
Coders: The Making of a New Tribe and the Remaking of the World
Breaking And Entering: The Extraordinary Story of a Hacker Called "Alien" – A Woman's Thrilling Career Journey from MIT Through Spycraft and Cybersecurity
White-Hot Hack (Kate and Ian, #2)
Playing With Fire (#Hacker, #1)
@war: The Rise of the Military- Internet Complex
Kill Process (Kill Chain, #1)
Black Dawn (Titan, #6)
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Immoral Code
HACKING WITH SMART PHONES
Threat Modeling: Designing for Security
Ethical Hacking and Penetration Testing Guide
Zero Hour (Wired & Dangerous, #1)
Tor and the Dark Art of Anonymity (deep web, kali linux, hacking, bitcoins) : Network Security for the Rest of Us
Hacking: The Art of Exploitation w/CD
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Social Engineering
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Girl Who Played with Fire (Millennium #2)
The Art of Deception: Controlling the Human Element of Security
Black Hat Python: Python Programming for Hackers and Pentesters
Little Brother (Little Brother, #1)
Neuromancer (Sprawl, #1)
Gray Hat Hacking : The Ethical Hacker's Handbook
The Girl With the Dragon Tattoo (Millennium, #1)
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Hackers: Heroes of the Computer Revolution
Penetration Testing: A Hands-On Introduction to Hacking
Advanced Lock Picking Secrets by Steven HamptonSurveillance Countermeasures by ACM IV Security ServicesSafecracker by Ryan WickOPEN IN THIRTY SECONDS by Marc Weber TobiasThe Art of Intrusion by Kevin D. Mitnick
How to be a criminal
130 books — 28 voters
Web Hacking Arsenal by Rafay  BalochHackers by Steven LevyThe Cuckoo's Egg by Clifford StollGhost in the Wires by Kevin D. MitnickKingpin by Kevin Poulsen
Hacker nonfiction
66 books — 140 voters

Cross My Heart and Hope to Spy by Ally CarterHeist Society by Ally CarterI'd Tell You I Love You, But Then I'd Have to Kill You by Ally CarterOnly the Good Spy Young by Ally CarterOut of Sight, Out of Time by Ally Carter
Spy / Hacker / Young Undercover
63 books — 66 voters
This Is How They Tell Me the World Ends by Nicole PerlrothDark Mirror by Barton GellmanPermanent Record by Edward SnowdenCountdown to Zero Day by Kim ZetterIk weet je wachtwoord by Daniël Verlaan
Gehackt! A Storytel Original series
96 books — 3 voters

Web Hacking Arsenal by Rafay  BalochThe Tangled Web by Michal ZalewskiA Bug Hunter's Diary by Tobias KleinPractical Malware Analysis by Michael SikorskiPenetration Testing by Georgia Weidman
Books For the Aspiring Hacker
67 books — 42 voters
#SayHerName by Kimberlé CrenshawFracking by Kathryn   Hulick#SayHerName by Kimberlé CrenshawThe War on Poverty by Carolee LaineThe Syrian Conflict by Michael Capek
Special Reports series
44 books — 8 voters


Juan  Zamora
10 97 (arrived at scene) military officer Sim here, I have a man with a cyber 10 29f (Cyber felony)." "10 26 (Clear)" "10 12 (Be discrete, visitors are present)" "10 4 (Understood) ...more
Juan Zamora, The Trillion Dollar Cow

Juan  Zamora
Wey bring the tobaccos, tonight we will feast on the souls of the dead.
Juan Zamora, The Trillion Dollar Cow

More quotes...
What do you read that helps you "hack" learning? What books make you better? What teaching and l…more
2 members, last active 10 years ago
The Hacker Book Club We meet virtually to read books written by someone in the hacker community. Authors may join onc…more
440 members, last active 3 years ago
Spy Thriller Middle East Inspired by my trilogy, this group was born with the desire to bring together readers who are pa…more
14 members, last active 3 years ago
Techno-Thrillers Techno-thrillers explore the ramifications of emerging technology, science, or natural phenomena…more
341 members, last active 2 days ago

Tags

Tags contributing to this page include: hackers, hacker, and hacking