Hack Books

Showing 1-50 of 627
Hacking: The Art of Exploitation w/CD Hacking: The Art of Exploitation w/CD (Paperback)
by (shelved 13 times as hack)
avg rating 4.17 — 2,499 ratings — published 2003
Rate this book
Clear rating
.hack// Legend of the Twilight, Vol. 1 .hack// Legend of the Twilight, Vol. 1 (Paperback)
by (shelved 12 times as hack)
avg rating 3.73 — 3,173 ratings — published 2002
Rate this book
Clear rating
.hack//Legend of the Twilight, Vol. 3 (.hack//Legend of the Twilight, #3) .hack//Legend of the Twilight, Vol. 3 (.hack//Legend of the Twilight, #3)
by (shelved 11 times as hack)
avg rating 3.87 — 1,264 ratings — published 2004
Rate this book
Clear rating
.hack//AI buster (AI buster, #1) .hack//AI buster (AI buster, #1)
by (shelved 11 times as hack)
avg rating 3.98 — 712 ratings — published 2002
Rate this book
Clear rating
.hack//: Another Birth, Vol. 1 .hack//: Another Birth, Vol. 1 (Paperback)
by (shelved 11 times as hack)
avg rating 4.09 — 1,018 ratings — published 2006
Rate this book
Clear rating
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (Hardcover)
by (shelved 10 times as hack)
avg rating 3.96 — 27,138 ratings — published 2011
Rate this book
Clear rating
Hacking Exposed: Network Security Secrets & Solutions Hacking Exposed: Network Security Secrets & Solutions (Paperback)
by (shelved 10 times as hack)
avg rating 3.80 — 1,165 ratings — published 2000
Rate this book
Clear rating
.hack// Legend of the Twilight, Vol. 2 .hack// Legend of the Twilight, Vol. 2 (Paperback)
by (shelved 10 times as hack)
avg rating 3.85 — 1,599 ratings — published 2003
Rate this book
Clear rating
.hack//XXXX, Volume 1 (.hack//XXXX, #1) .hack//XXXX, Volume 1 (.hack//XXXX, #1)
by (shelved 10 times as hack)
avg rating 4.03 — 688 ratings — published 2006
Rate this book
Clear rating
.hack//AI buster 2 (AI buster, #2) .hack//AI buster 2 (AI buster, #2)
by (shelved 10 times as hack)
avg rating 4.04 — 526 ratings — published 2006
Rate this book
Clear rating
.hack//G.U.+ Vol. 1 (.hack//G.U.+, #1) .hack//G.U.+ Vol. 1 (.hack//G.U.+, #1)
by (shelved 8 times as hack)
avg rating 3.94 — 515 ratings — published 2008
Rate this book
Clear rating
Black Hat Python: Python Programming for Hackers and Pentesters Black Hat Python: Python Programming for Hackers and Pentesters (Paperback)
by (shelved 7 times as hack)
avg rating 4.11 — 605 ratings — published 2014
Rate this book
Clear rating
Hacking S3crets Hacking S3crets (Paperback)
by (shelved 7 times as hack)
avg rating 4.27 — 508 ratings — published 2012
Rate this book
Clear rating
.hack//G.U.+, Volume 2 (.hack//G.U.+, #2) .hack//G.U.+, Volume 2 (.hack//G.U.+, #2)
by (shelved 7 times as hack)
avg rating 3.92 — 251 ratings — published 2006
Rate this book
Clear rating
Hack//XXXX, Volume 2 (.hack//XXXX, #2) Hack//XXXX, Volume 2 (.hack//XXXX, #2)
by (shelved 7 times as hack)
avg rating 4.00 — 215 ratings — published 2005
Rate this book
Clear rating
Metasploit: The Penetration Tester's Guide Metasploit: The Penetration Tester's Guide (Paperback)
by (shelved 6 times as hack)
avg rating 4.07 — 866 ratings — published 2011
Rate this book
Clear rating
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback)
by (shelved 6 times as hack)
avg rating 3.91 — 3,587 ratings — published 2005
Rate this book
Clear rating
Hackers: Heroes of the Computer Revolution Hackers: Heroes of the Computer Revolution (Paperback)
by (shelved 6 times as hack)
avg rating 4.16 — 8,519 ratings — published 1984
Rate this book
Clear rating
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground (Hardcover)
by (shelved 6 times as hack)
avg rating 3.97 — 8,041 ratings — published 2011
Rate this book
Clear rating
.hack//G.U.+ Vol. 3 (.hack//G.U.+, #3) .hack//G.U.+ Vol. 3 (.hack//G.U.+, #3)
by (shelved 6 times as hack)
avg rating 3.92 — 203 ratings — published
Rate this book
Clear rating
.hack// Another Birth 4 .hack// Another Birth 4 (Paperback)
by (shelved 6 times as hack)
avg rating 4.13 — 263 ratings — published 2007
Rate this book
Clear rating
.hack// Another Birth Volume 2//Mutation_ .hack// Another Birth Volume 2//Mutation_ (Paperback)
by (shelved 6 times as hack)
avg rating 4.12 — 454 ratings — published 2006
Rate this book
Clear rating
How To Hack A Cell Phone: Remotely Control Any Cell Phone How To Hack A Cell Phone: Remotely Control Any Cell Phone (Kindle Edition)
by (shelved 5 times as hack)
avg rating 3.92 — 79 ratings — published 2015
Rate this book
Clear rating
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali (Kindle Edition)
by (shelved 5 times as hack)
avg rating 4.13 — 561 ratings — published 2018
Rate this book
Clear rating
Red Team Field Manual Red Team Field Manual (Paperback)
by (shelved 5 times as hack)
avg rating 4.23 — 993 ratings — published 2014
Rate this book
Clear rating
Social Engineering Social Engineering (Paperback)
by (shelved 5 times as hack)
avg rating 3.83 — 3,852 ratings — published 2010
Rate this book
Clear rating
.hack//G.U.+ Vol. 5 (.hack//G.U.+, #5) .hack//G.U.+ Vol. 5 (.hack//G.U.+, #5)
by (shelved 5 times as hack)
avg rating 3.96 — 143 ratings — published 2006
Rate this book
Clear rating
.hack// Another Birth Volume 3 .hack// Another Birth Volume 3 (Paperback)
by (shelved 5 times as hack)
avg rating 4.12 — 328 ratings — published 2007
Rate this book
Clear rating
Rate this book
Clear rating
Certified Ethical Hacker Ceh Cert Guide Certified Ethical Hacker Ceh Cert Guide (Hardcover)
by (shelved 4 times as hack)
avg rating 4.17 — 29 ratings — published 2013
Rate this book
Clear rating
Hacking APIs: Breaking Web Application Programming Interfaces Hacking APIs: Breaking Web Application Programming Interfaces (Paperback)
by (shelved 4 times as hack)
avg rating 4.24 — 93 ratings — published
Rate this book
Clear rating
The Hacker Playbook 3: Practical Guide To Penetration Testing The Hacker Playbook 3: Practical Guide To Penetration Testing (Kindle Edition)
by (shelved 4 times as hack)
avg rating 4.40 — 253 ratings — published
Rate this book
Clear rating
Penetration Testing: A Hands-On Introduction to Hacking Penetration Testing: A Hands-On Introduction to Hacking (Paperback)
by (shelved 4 times as hack)
avg rating 4.17 — 388 ratings — published 2014
Rate this book
Clear rating
Hacking Linux Exposed: Linux Security Secrets & Solutions Hacking Linux Exposed: Linux Security Secrets & Solutions (Paperback)
by (shelved 4 times as hack)
avg rating 3.83 — 147 ratings — published 2001
Rate this book
Clear rating
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws (Paperback)
by (shelved 4 times as hack)
avg rating 4.23 — 1,222 ratings — published 2007
Rate this book
Clear rating
The Hacker Playbook: Practical Guide to Penetration Testing The Hacker Playbook: Practical Guide to Penetration Testing (Kindle Edition)
by (shelved 4 times as hack)
avg rating 3.96 — 469 ratings — published 2014
Rate this book
Clear rating
Hacker's Delight Hacker's Delight (Hardcover)
by (shelved 4 times as hack)
avg rating 4.20 — 1,135 ratings — published 2002
Rate this book
Clear rating
The Art of Deception: Controlling the Human Element of Security The Art of Deception: Controlling the Human Element of Security (Paperback)
by (shelved 4 times as hack)
avg rating 3.77 — 7,203 ratings — published 2001
Rate this book
Clear rating
Rate this book
Clear rating
.hack//G.U.+ Volume 4 (.hack//G.U.+, #4) .hack//G.U.+ Volume 4 (.hack//G.U.+, #4)
by (shelved 4 times as hack)
avg rating 3.96 — 175 ratings — published 2006
Rate this book
Clear rating
.hack//G.U. Vol. 2: Borderline MMO .hack//G.U. Vol. 2: Borderline MMO (Paperback)
by (shelved 4 times as hack)
avg rating 3.94 — 54 ratings — published 2010
Rate this book
Clear rating
.hack//G.U. Vol. 1: The Terror of Death .hack//G.U. Vol. 1: The Terror of Death (Paperback)
by (shelved 4 times as hack)
avg rating 4.05 — 85 ratings — published 2009
Rate this book
Clear rating
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet (Hardcover)
by (shelved 3 times as hack)
avg rating 3.69 — 1,110 ratings — published 2010
Rate this book
Clear rating
The Linux Command Line: A Complete Introduction The Linux Command Line: A Complete Introduction (Paperback)
by (shelved 3 times as hack)
avg rating 4.38 — 1,693 ratings — published 2012
Rate this book
Clear rating
The Pentester BluePrint: Starting a Career as an Ethical Hacker The Pentester BluePrint: Starting a Career as an Ethical Hacker (Paperback)
by (shelved 3 times as hack)
avg rating 4.17 — 222 ratings — published 2020
Rate this book
Clear rating
Rate this book
Clear rating
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race This Is How They Tell Me the World Ends: The Cyberweapons Arms Race (Hardcover)
by (shelved 3 times as hack)
avg rating 4.32 — 10,891 ratings — published 2021
Rate this book
Clear rating
Hacking Mobile Phones Hacking Mobile Phones (Paperback)
by (shelved 3 times as hack)
avg rating 4.24 — 194 ratings — published 2005
Rate this book
Clear rating
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Kindle Edition)
by (shelved 3 times as hack)
avg rating 4.35 — 9,733 ratings — published 2019
Rate this book
Clear rating
Gray Hat Hacking : The Ethical Hacker's Handbook Gray Hat Hacking : The Ethical Hacker's Handbook (Paperback)
by (shelved 3 times as hack)
avg rating 4.10 — 536 ratings — published 2004
Rate this book
Clear rating


“When I am doing a physical security audit during a penetration test, I just carry a box toward the door of the building; invariably people will hold the door open for someone carrying something. It is just human nature and is an easy way for a hacker to bypass security measures.”
Kimberly Graves, CEH Certified Ethical Hacker Study Guide

Jennifer Lynn Barnes
“Darryl likes codes," Skylar explained. "A few weeks ago, I asked him what someone might hypothetically need to break into a supercomputer. He hypothetically made me this.”
Jennifer Lynn Barnes, Every Other Day

More quotes...