120 books
—
88 voters
Malware Books
Showing 1-50 of 72

by (shelved 9 times as malware)
avg rating 4.48 — 606 ratings — published 2011

by (shelved 6 times as malware)
avg rating 4.21 — 184 ratings — published 2010

by (shelved 5 times as malware)
avg rating 4.34 — 125 ratings — published 2014

by (shelved 4 times as malware)
avg rating 4.17 — 35 ratings — published

by (shelved 4 times as malware)
avg rating 4.35 — 9,658 ratings — published 2019

by (shelved 4 times as malware)
avg rating 4.29 — 7 ratings — published 2015

by (shelved 3 times as malware)
avg rating 4.16 — 8,135 ratings — published 2014

by (shelved 2 times as malware)
avg rating 3.83 — 12 ratings — published 2012

by (shelved 2 times as malware)
avg rating 3.94 — 1,861 ratings — published 2023

by (shelved 2 times as malware)
avg rating 3.88 — 52 ratings — published

by (shelved 2 times as malware)
avg rating 4.28 — 25 ratings — published

by (shelved 2 times as malware)
avg rating 4.00 — 31 ratings — published

by (shelved 2 times as malware)
avg rating 4.33 — 112 ratings — published 2013

by (shelved 2 times as malware)
avg rating 4.15 — 330 ratings — published 2004

by (shelved 2 times as malware)
avg rating 4.03 — 550 ratings — published 2012

by (shelved 2 times as malware)
avg rating 4.29 — 176 ratings — published 2008

by (shelved 2 times as malware)
avg rating 3.90 — 58 ratings — published 2005

by (shelved 2 times as malware)
avg rating 4.09 — 546 ratings — published 2005

by (shelved 2 times as malware)
avg rating 3.63 — 41 ratings — published 2004

by (shelved 1 time as malware)
avg rating 4.40 — 5 ratings — published

by (shelved 1 time as malware)
avg rating 4.52 — 71 ratings — published

by (shelved 1 time as malware)
avg rating 4.00 — 4 ratings — published 2005

by (shelved 1 time as malware)
avg rating 3.80 — 5 ratings — published

by (shelved 1 time as malware)
avg rating 3.62 — 16 ratings — published

by (shelved 1 time as malware)
avg rating 3.43 — 21 ratings — published 2011

by (shelved 1 time as malware)
avg rating 4.56 — 32 ratings — published

by (shelved 1 time as malware)
avg rating 4.17 — 54 ratings — published 2008

by (shelved 1 time as malware)
avg rating 3.94 — 324 ratings — published 2008

by (shelved 1 time as malware)
avg rating 4.43 — 61 ratings — published

by (shelved 1 time as malware)
avg rating 3.94 — 797 ratings — published 1999

by (shelved 1 time as malware)
avg rating 3.94 — 570 ratings — published 2000

by (shelved 1 time as malware)
avg rating 3.92 — 444 ratings — published 2000

by (shelved 1 time as malware)
avg rating 3.67 — 275 ratings — published 2020

by (shelved 1 time as malware)
avg rating 3.20 — 15 ratings — published

by (shelved 1 time as malware)
avg rating 4.09 — 23,987 ratings — published 2013

by (shelved 1 time as malware)
avg rating 4.50 — 2 ratings — published 2006

by (shelved 1 time as malware)
avg rating 4.33 — 3 ratings — published 2008

by (shelved 1 time as malware)
avg rating 4.33 — 3 ratings — published 2005

by (shelved 1 time as malware)
avg rating 4.19 — 43 ratings — published

by (shelved 1 time as malware)
avg rating 3.26 — 1,006 ratings — published

by (shelved 1 time as malware)
avg rating 4.03 — 508,665 ratings — published 2008

by (shelved 1 time as malware)
avg rating 4.17 — 39,346 ratings — published 2021

by (shelved 1 time as malware)
avg rating 4.09 — 326,017 ratings — published 2022

by (shelved 1 time as malware)
avg rating 4.49 — 45 ratings — published 2019

by (shelved 1 time as malware)
avg rating 3.60 — 2,294 ratings — published 2011

by (shelved 1 time as malware)
avg rating 3.77 — 64 ratings — published

by (shelved 1 time as malware)
avg rating 3.89 — 9 ratings — published

by (shelved 1 time as malware)
avg rating 4.11 — 9 ratings — published 2010

by (shelved 1 time as malware)
avg rating 4.11 — 602 ratings — published 2014

by (shelved 1 time as malware)
avg rating 4.26 — 30,029 ratings — published 2010
Information Security, Penetration Testing, Social Engineering, Counter-Intelligence, Hacker/Hacking Culture and History.
More lists...
“Consider all tabulation systems infected by bad actors until a third party, not affiliated with the manufacturer or election officials, proves they are secure.”
―
―
“Hacking a national election is simple. Exploit a vulnerability in the manufacturer's network, poison the tabulation software update with self-deleting malware and let the manufacturer send to their field reps and election consultants who update the election systems.”
―
―