Most Read This Week In Hackers


Most Read This Week Tagged "Hackers"

Sidetracked (Mindf*ck, #2)
Coders: The Making of a New Tribe and the Remaking of the World
Breaking And Entering: The Extraordinary Story of a Hacker Called "Alien" – A Woman's Thrilling Career Journey from MIT Through Spycraft and Cybersecurity
White-Hot Hack (Kate and Ian, #2)
Playing With Fire (#Hacker, #1)
@war: The Rise of the Military- Internet Complex
Kill Process (Kill Chain, #1)
Black Dawn (Titan, #6)
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Immoral Code
HACKING WITH SMART PHONES
Threat Modeling: Designing for Security
Ethical Hacking and Penetration Testing Guide
Zero Hour (Wired & Dangerous, #1)
Tor and the Dark Art of Anonymity (deep web, kali linux, hacking, bitcoins) : Network Security for the Rest of Us
The Hardware Hacker: Adventures in Making and Breaking Hardware
The Browser Hacker's Handbook
Penetration Testing: A Hands-On Introduction to Hacking
Exploited (Zero Day, #1)
In Too Deep (#Hacker, #2)
The Book of PoC||GTFO
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Kali Linux Wireless Penetration Testing: Beginner's Guide: Learn to penetrate Wi-Fi and wireless networks to secure your system from vulnerabilities
Ones and Zeroes (Mirador, #2)
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
How to Hack: Hacking Secrets Exposed: A Beginner's Guide
Digital Horizon (#Hacker, #3)
Darkest Night (Wired & Dangerous, #2)
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
A Geek Girl's Guide to Murder (Geek Girl Mysteries, #1)
dotwav
Sweetest Surrender (The Serafina: Sin City, #3)
Dangerous Surrender (The Serafina: Sin City, #4)
The Hacker Playbook 2: Practical Guide To Penetration Testing
Echoes
The Maker's Guide to the Zombie Apocalypse: Defend Your Base with Simple Circuits, Arduino, and Raspberry Pi
Trust Me (Find Me, #3)
Don't Let Go (PERSEFoNE, #3)
Red Team Field Manual
The Coming Swarm: DDOS Actions, Hacktivism, and Civil Disobedience on the Internet
Unmasking the Social Engineer: The Human Element of Security
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
The Hacker Playbook: Practical Guide to Penetration Testing
The Perfect Weapon: How the Cyber Arms Race Set the World Afire
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Remember Me (Find Me, #2)
Black Hat Python: Python Programming for Hackers and Pentesters
Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance

Tamara Kučan
Shvatio sam… Da nema čoveka, kompjuter ne bi postojao. Da nema kompjutera, mnogi ljudi ne bi naučili šta znači biti čovek.
Tamara Kučan, Profajler

Amanda-Jane Turner
Anyone can fall victim to cybercrime and any computing device can be infected with malware. Nobody is immune to cybercrime
Amanda-Jane Turner, Unmasking the hacker: demystifying cybercrime

More quotes...
Techno-Thrillers Techno-thrillers explore the ramifications of emerging technology, science, or natural phenomena…more
341 members, last active 3 days ago
This group is designed to find and meet other people within the information security community a…more
21 members, last active 11 years ago
The Cybersecurity Book Club It's Goodreads' book club to discuss – online and in person – the best books on digital security…more
189 members, last active 2 months ago
Welcome to the Cyber Security Book Club — a community for infosec professionals, ethical hackers…more
2 members, last active 6 months ago

Tags

Tags contributing to this page include: hackers, hacker, and hacking