100 Best Hacking Books of All Time

We've researched and ranked the best hacking books in the world, based on recommendations from world experts, sales data, and millions of reader ratings. Learn more

Featuring recommendations from Reid Hoffman, Stephen King, Larry Page, and 71 other experts.
1

Hacking

The Art of Exploitation

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C...
more

See more recommendations for this book...

2

Ghost in the Wires

My Adventures as the World's Most Wanted Hacker

If they were a hall of fame or shame for computer hackers, a Kevin Mitnick plaque would be mounted the near the entrance. While other nerds were fumbling with password possibilities, this adept break-artist was penetrating the digital secrets of Sun Microsystems, Digital Equipment Corporation, Nokia, Motorola, Pacific Bell, and other mammoth enterprises. His Ghost in the Wires memoir paints an action portrait of a plucky loner motivated by a passion for trickery, not material game. (P.S. Mitnick's capers have already been the subject of two books and a movie. This first-person account is...

more

Richard BejtlichIn 2002 I reviewed Kevin Mitnick's first book, The Art of Deception. In 2005 I reviewed his second book, The Art of Intrusion. I gave both books four stars. Mitnick's newest book, however, with long-time co-author Bill Simon, is a cut above their previous collaborations and earns five stars. As far as I can tell (and I am no Mitnick expert, despite reading almost all previous texts mentioning... (Source)

Antonio EramThis book was recommended by Antonio when asked for titles he would recommend to young people interested in his career path. (Source)

Nick JanetakisI'm going to start reading Ghost in the Wires by Kevin Mitnick this week. I used to go to 2600 meetings back when he was arrested for wire fraud and other hacking related shenanigans in the mid 1990s. I'm fascinated by things like social engineering and language in general. In the end, I just want to be entertained by his stories. For someone who is into computer programming, a book like this... (Source)

See more recommendations for this book...

3

The Cuckoo's Egg

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error...
more
Recommended by Rick Klau, James Stanley, and 2 others.

Rick Klau@AtulAcharya @stevesi Same. Read it in college, realized I was more excited about the tech than what I was studying -- and Cliff did such a great job helping you understand what was going on. Such a great book. (Source)

James Stanley"The Cuckoo's Egg" by Clifford Stoll is another great book. I believe it's the first documented account of a computer being misused by a remote attacker. It talks about how Clifford attached physical teleprinters to the incoming phone lines so that he could see what the attacker was actually doing on the computer, and how he traced the attacker across several countries. (Source)

See more recommendations for this book...

4

Gray Hat Hacking

The Ethical Hacker's Handbook

Up-to-date strategies for thwarting the latest, most insidious network attacks

This fully updated, industry-standard security resource shows how to fortify computer networks by learning and effectively applying ethical hacking techniques. Based on critical topics that the authors teach at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks.

Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition,...
more

See more recommendations for this book...

5
A mere fifteen years ago, computer nerds were seen as marginal weirdos, outsiders whose world would never resonate with the mainstream. That was before one pioneering work documented the underground computer revolution that was about to change our world forever. With groundbreaking profiles of Bill Gates, Steve Wozniak, MIT's Tech Model Railroad Club, and more, Steven Levy's Hackers brilliantly captured a seminal moment when the risk-takers and explorers were poised to conquer twentieth-century America's last great frontier. And in the Internet age, the hacker ethic-first espoused... more
Recommended by Ev Williams, and 1 others.

See more recommendations for this book...

6

Permanent Record

Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.

In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with...
more
Recommended by John Sargent, Kara Swisher, and 2 others.

John SargentEdward Snowden decided at the age of 29 to give up his entire future for the good of his country. He displayed enormous courage in doing so, and like him or not, his is an incredible American story. There is no doubt that the world is a better and more private place for his actions. Macmillan is enormously proud to publish Permanent Record. (Source)

Kara SwisherBtw @Snowden new book “Permanent Record” is quite good and surprisingly a love letter to the Internet as it was. (Source)

See more recommendations for this book...

7

Snow Crash

In the near future, Americans excel at only two things: writing software and delivering pizza in less than 30 minutes.

Franchises line the Los Angeles freeway as far as the eye can see: Reverend Wayne's Pearly Gates, Mr. Lee's Greater Hong Kong, Uncle Enzo's CosaNostra Pizza, Incorporated. The only relief from the sea of logos is within the well-guarded borders of the autonomous city-states that law-abiding citizens are afraid to leave. Is it any wonder that most sane folks have chosen to live in a computer-generated universe? Here in virtual reality is a domain of pleasures...
more

Sergey BrinBrin said he is a big sci-fi fan, and Stephenson's acclaimed 1992 novel "Snow Crash" is one of his favorites. The book "was really 10 years ahead of its time," Brin said. "It kind of anticipated what's going to happen, and I find that really interesting." (Source)

Adam SavageIt's a tough call because I prefer other books of [this author]. But [this book] is so important within the history of science fiction. (Source)

Marvin LiaoMy list would be (besides the ones I mentioned in answer to the previous question) both business & Fiction/Sci-Fi and ones I personally found helpful to myself. The business books explain just exactly how business, work & investing are in reality & how to think properly & differentiate yourself. On the non-business side, a mix of History & classic fiction to understand people, philosophy to make... (Source)

See more recommendations for this book...

8
The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network.

The word spread through the hacking underground like some unstoppable new virus: an audacious crook had staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy.

The culprit was a brilliant programmer with a hippie ethic and a supervillain's double identity. Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As...
more
Recommended by Vinod Khosla, Vinod Khosla, and 2 others.

See more recommendations for this book...

9
In Penetration Testing, security researcher and trainer Georgia Weidman provides you with a survey of important skills that any aspiring pentester needs. This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device... more

Alex Caceres/hacker Frmrly Known As Dotslashpunk@gvgm3 @SecurityTube For networks i'd have to say hands down the OSCP is likely one of the best you're going to find. Fuck the cert, take the course, get down and dirty in the labs and break everything. I hear @georgiaweidman's book is good (Pen testing with Metasploit) but have not read it myself (Source)

See more recommendations for this book...

10
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack... more

See more recommendations for this book...

Don't have time to read the top Hacking books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
11
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:


Create a trojan command-and-control using GitHub
Detect sandboxing and automate common malware tasks,...
more

See more recommendations for this book...

12
Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the "game" of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style "plays," this straightforward guide gets to the root of many of the roadblocks people may face while penetration...
more

See more recommendations for this book...

13
Harden the human firewall against the most current threats

Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we...
more

See more recommendations for this book...

14
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a...
more

See more recommendations for this book...

15
The computer and the internet are among the most important innovations of our era, but few people know who created them. They were not conjured up in a garret or garage by solo inventors suitable to be singled out on magazine covers or put into a pantheon with Edison, Bell, and Morse. Instead, most of the innovations of the digital age were done collaboratively. There were a lot of fascinating people involved, some ingenious and a few even geniuses. This is the story of these pioneers, hackers, inventors, and entrepreneurs—who they were, how their minds worked, and what made them so creative.... more

Chris FussellThe history of how great ideas evolve. (Source)

Brian BurkhartThis book is essentially a biography of all the people who’ve led to the technology of today—it’s fascinating. The most important point of the book is everything is one long, connected chain. There isn’t just one person or one industry that makes anything happen—it all goes way back. For example, the communication theory I have espoused and taught throughout my career is from Aristotle, Socrates,... (Source)

Sean Gardner@semayuce @MicrosoftUK @HelenSharmanUK @astro_timpeake @WalterIsaacson Yes, I agree: "The Innovators" is a great book. I loved it too. (Source)

See more recommendations for this book...

17

Neuromancer

A deluxe hardcover edition of the pioneering cyberpunk novel that predicted our obsession with the Internet—part of Penguin Galaxy, a collectible series of six sci-fi/fantasy classics, featuring a series introduction by Neil Gaiman.

Before the Internet was commonplace, William Gibson showed us the Matrix—a world within the world, the representation of every byte of data in cyberspace. Henry Dorsett Case was the sharpest data-thief in the Matrix, until an ex-employer crippled his nervous system. Now a new employer has recruited him for a last-chance run against an unthinkably...
more

Adam Savage[This series] changed my life. (Source)

Mark Pitcavage@jamesjhare Neuromancer is a fascinating book--but it was especially fascinating when it was first published; it was mind-blowing. (Source)

Pia Mancini@Fede_Bada amazing book (Source)

See more recommendations for this book...

18
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering...
more

See more recommendations for this book...

19
"The Basics of Hacking and Penetration Testing "serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow youa to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and... more

See more recommendations for this book...

20
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data.

Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he...
more

See more recommendations for this book...

Don't have time to read the top Hacking books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
21

Ready Player One

The bestselling cult classic--soon to be a major motion picture directed by Steven Spielberg.



At once wildly original and stuffed with irresistible nostalgia, READY PLAYER ONE is a spectacularly genre-busting, ambitious, and charming debut--part quest novel, part love story, and part virtual space opera set in a universe where spell-slinging mages battle giant Japanese robots, entire planets are inspired by Blade Runner, and flying DeLoreans achieve light speed.

It's the year 2045, and the real world is an ugly place.

Like most of...
more

Steve JurvetsonA gift to all of my Apple II programming buddies from high school and Dungeons & Dragons comrades. (Source)

Fabrice GrindaI have lots of books to recommend, but they are not related to my career path. The only one that is remotely related is Peter Thiel’s Zero to One. That said here are books I would recommend. (Source)

Dominic Steil[One of the books that had the biggest impact on .] (Source)

See more recommendations for this book...

22
The stunning third and final novel in Stieg Larsson's internationally best-selling trilogy.

Lisbeth Salander - the heart of Larsson's two previous novels - lies in critical condition, a bullet wound to her head, in the intensive care unit of a Swedish city hospital. She's fighting for her life in more ways than one: if and when she recovers, she'll be taken back to Stockholm to stand trial for three murders. With the help of her friend, journalist Mikael Blomkvist, she will not only have to prove her innocence, but also identify and denounce those in authority who have allowed the...
more

See more recommendations for this book...

23

The Girl with the Dragon Tattoo (Millennium, #1)

Harriet Vanger, a scion of one of Sweden’s wealthiest families disappeared over forty years ago. All these years later, her aged uncle continues to seek the truth. He hires Mikael Blomkvist, a crusading journalist recently trapped by a libel conviction, to investigate. He is aided by the pierced and tattooed punk prodigy Lisbeth Salander. Together they tap into a vein of unfathomable iniquity and astonishing corruption.

An international publishing sensation, Stieg Larsson’s The Girl with the Dragon Tattoo combines murder mystery, family saga, love story, and financial intrigue into...
more

See more recommendations for this book...

24
“The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you’re willing to risk the consequences.” —from Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham

We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care?

Consider these facts: Everything around us is turning into computers. Your typewriter is...
more

Evan WilliamsI want everybody I know to read "How to Make Wealth" and "Mind the Gap" (chapters 6 and 7), which brilliantly articulate the most commonly, and frustratingly, misunderstood core economic principles of everyday life. (Source)

Yukihiro MatsumotoSince programmers create programs out of nothing, imagination is our only limitation. Thus, in the world of programming, the hero is the one who has great vision. Paul Graham is one of our contemporary heroes. He has the ability to embrace the vision, and to express it plainly. His works are my favorites, especially the ones describing language design. He explains secrets of programming,... (Source)

Chris AndersonA delightful ping-pong around the brain of a really smart guy. The chapter that answers the key question of our age-- why are nerds unpopular?-- is worth the price of admission alone. (Source)

See more recommendations for this book...

25

Metasploit

The Penetration Tester's Guide

"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit ProjectThe Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.

Once you've built your foundation for penetration testing, you'll learn the...
more

See more recommendations for this book...

26

The Girl Who Played with Fire (Millennium, #2)

Part blistering espionage thriller, part riveting police procedural, and part piercing exposé on social injustice, The Girl Who Played with Fire is a masterful, endlessly satisfying novel.
 
Mikael Blomkvist, crusading publisher of the magazine Millennium, has decided to run a story that will expose an extensive sex trafficking operation. On the eve of its publication, the two reporters responsible for the article are murdered, and the fingerprints found on the murder weapon belong to his friend, the troubled genius hacker Lisbeth Salander. Blomkvist, convinced of...
more

See more recommendations for this book...

27
The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page. The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations... more

See more recommendations for this book...

28
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.
 
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
more
Recommended by Josephine Wolff, and 1 others.

Josephine WolffAs a book, Countdown to Day Zero is a stunning example of a case study, of really diving into a cyber security incident. She takes on the very technical material—getting into the malware and the question of how do these SCADA machines work and how does this piece of software compromise them—but then also brings in this really rich and complicated geopolitical conflict that this is happening as a... (Source)

See more recommendations for this book...

29
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logistical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.

Throughout the text are clear...
more
Recommended by Stephen Kinsella, and 1 others.

Stephen Kinsella@gavreilly @SLSingh Love that book (Source)

See more recommendations for this book...

30
A thrilling, exclusive expose of the hacker collectives Anonymous and LulzSec.

WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of...
more

See more recommendations for this book...

Don't have time to read the top Hacking books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
31

Hacking Exposed 7

Network Security Secrets and Solutions

A fully updated edition of the world's bestselling computer security book "Hacking Exposed 7: Network Security Secrets and Solutions" is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more The 7th Edition also features a new "5 Deployments" approach for the first time that provides five key actions... more

See more recommendations for this book...

32
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.

For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.

You'll learn how to:


Set up a safe virtual environment to analyze...
more

See more recommendations for this book...

33
She is the girl with the dragon tattoo—a genius hacker and uncompromising misfit. He is a crusading journalist whose championing of the truth often brings him to the brink of prosecution.

Late one night, Blomkvist receives a phone call from a source claiming to have information vital to the United States. The source has been in contact with a young female superhacker—a hacker resembling someone Blomkvist knows all too well. The implications are staggering. Blomkvist, in desperate need of a scoop for Millennium, turns to Salander for help. She, as usual, has her own agenda. The...
more

See more recommendations for this book...

34

Cryptonomicon

With this extraordinary first volume in an epoch-making masterpiece, Neal Stephenson hacks into the secret histories of nations and the private obsessions of men, decrypting with dazzling virtuosity the forces that shaped this century.

In 1942, Lawrence Pritchard Waterhouse—mathematical genius and young Captain in the U.S. Navy—is assigned to detachment 2702. It is an outfit so secret that only a handful of people know it exists, and some of those people have names like Churchill and Roosevelt. The mission of Waterhouse and Detachment 2702—commanded by Marine...
more

Marc AndreessenThe Sovereign Individual—written 20 years ago, this is the most thought provoking book on the unfolding nature of the 21st Century that I’ve yet read. It’s packed with ideas on every page, many that are now fast becoming conventional wisdom, and many that are still heretical. Two related books to read are The Twilight of Sovereignty and Cryptonomicon. (Source)

Risto SiilasmaaThe one book on Siilasmaa's list is this fantasy offering from Neal Stephenson. The novel relates two parallel stories, one about an elite group of code-breakers in World War II, and another set in the present day, about two grandchildren of members of the group trying to track down a previously unknown – and rumored to be unbreakable – Nazi code. The book's subject matter resonates with current... (Source)

Nick HarkawayCryptonomicon is a real humdinger of a novel. Stephenson is a hugely enjoyable writer of action and comedy, I find him a joy to read. (Source)

See more recommendations for this book...

36
Before smartphones, back even before the Internet and personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world's largest machine: the telephone system. Starting with Alexander Graham Bell's revolutionary "harmonic telegraph," by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. But the network had a billion-dollar flaw, and once people discovered it, things would... more

See more recommendations for this book...

37
Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual... more

See more recommendations for this book...

38
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse...
more

See more recommendations for this book...

39
From Wired senior writer Andy Greenberg comes the true story of the desperate hunt to identify and track an elite team of Russian agents bent on digital sabotage

In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers. The attacks culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's...
more

Ben LoricaI am in the middle of Sandworm by @a_greenberg and it is great read. I have a feeling that recent events in the Middle East will result in cyberattacks similar to those in this book https://t.co/qLM5Z7YAdl (Source)

Laurence TribeVote augmentation looks like the newest form of election manipulation. It was a favorite Putin/GRU technique in Estonia, Georgia, and Ukraine. See Andy Greenberg’s book “Sandworm.” https://t.co/0i9NSdUvzs (Source)

Jack Rhysider@selenalarson @a_greenberg wrote a great book (Source)

See more recommendations for this book...

40

Hacker's Delight

Aiming to tell the dark secrets of computer arithmetic, this title is suitable for library developers, compiler writers, and lovers of elegant hacks. less

See more recommendations for this book...

Don't have time to read the top Hacking books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
41

Daemon (Daemon, #1)

A high-tech thriller for the wireless age that explores the unthinkable consequences of a computer program running without human control—a daemon—designed to dismantle society and bring about a new world order

Technology controls almost everything in our modern-day world, from remote entry on our cars to access to our homes, from the flight controls of our airplanes to the movements of the entire world economy. Thousands of autonomous computer programs, or daemons, make our networked world possible, running constantly in the background of our lives, trafficking e-mail,...
more
Recommended by Elon Musk, Eric Weinstein, and 2 others.

Elon MuskA great read. (Source)

Eric Weinstein[Eric Weinstein recommended this book on Twitter.] (Source)

See more recommendations for this book...

42

The Shellcoder's Handbook

Discovering and Exploiting Security Holes

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site features downloadable... more

See more recommendations for this book...

43
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to... more

See more recommendations for this book...

44
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.

If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the...
more

See more recommendations for this book...

45
There is a Threat Lurking Online with the Power to Destroy Your Finances, Steal Your Personal Data, and Endanger Your Life.

In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies-and countless viruses, phishing, and spyware attacks-he delivers the first definitive narrative of the global spam problem and its threat to...
more
Recommended by Josephine Wolff, and 1 others.

Josephine WolffBrian Krebs is really more deeply reported on financial cyber criminals than almost anybody in the world.He’s really smart about the ways in which money drives a lot of these cyber crimes. (Source)

See more recommendations for this book...

46
A journalist investigates the past, present, and future of computer crimes, as he attends a hacker convention, documents the extent of the computer crimes, and presents intriguing facts about hackers and their misdoings. less

See more recommendations for this book...

47
For the millions who log in every day, Warcross isn’t just a game—it’s a way of life. The obsession started ten years ago and its fan base now spans the globe, some eager to escape from reality and others hoping to make a profit. Struggling to make ends meet, teenage hacker Emika Chen works as a bounty hunter, tracking down players who bet on the game illegally. But the bounty hunting world is a competitive one, and survival has not been easy. Needing to make some quick cash, Emika takes a risk and hacks into the opening game of the international Warcross Championships—only to accidentally... more

See more recommendations for this book...

48
"…the best introduction to cryptography I've ever seen. … The book the National Security Agency wanted never to be published." –Wired Magazine

"…monumental… fascinating… comprehensive… the definitive work on cryptography for computer programmers…" –Dr. Dobb's Journal

"…easily ranks as one of the most authoritative in its field." —PC Magazine

"…the bible of code hackers." –The Millennium Whole Earth Catalog

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers...
more
Recommended by Dominic Steil, and 1 others.

Dominic Steil[One of the five books recommends to young people interested in his career path.] (Source)

See more recommendations for this book...

49

Hacking for Dummies

Stop hackers before they hack you!

In order to outsmart a would-be hacker, you need to get into the hacker's mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks.

Whether you're worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn...
more

See more recommendations for this book...

50

Illuminae (The Illuminae Files, #1)

Kady thought breaking up with Ezra was the worst thing she'd ever been through. That was before her planet was invaded. Now, with enemy fire raining down on them, Kady and Ezra are forced to fight their way onto one of the evacuating craft, with an enemy warship in hot pursuit.
But the warship could be the least of their problems. A deadly plague has broken out and is mutating, with terrifying results; the fleet's AI, which should be protecting them, may actually be their biggest threat; and nobody in charge will say what's really going on. As Kady plunges into a web of data hacking to...
more

See more recommendations for this book...

Don't have time to read the top Hacking books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
51
“An important, disturbing, and gripping history” (Kirkus Reviews, starred review), the never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invent and employ cyber wars—where every country can be a major power player and every hacker a mass destroyer.

In June 1983, President Reagan watched the movie War Games, in which a teenager unwittingly hacks the Pentagon, and asked his top general if the scenario was plausible. The general said it was. This set in motion the first presidential directive on computer...
more
Recommended by Josephine Wolff, and 1 others.

Josephine WolffThis book is by Fred Kaplan and it’s a historical study of the ways that governments—and in particular the US government—have tried to think about and use cyberpower for state-to-state conflict. He looks at what the origins of that were in the 1980s and how it has evolved over the past 30 or so years. (Source)

See more recommendations for this book...

52
For over a decade, Andrew "bunnie" Huang, one of the world's most esteemed hackers, has shaped the fields of hacking and hardware, from his cult-classic book Hacking the Xbox to the open-source laptop Novena and his mentorship of various hardware startups and developers. In The Hardware Hacker, Huang shares his experiences in manufacturing and open hardware, creating an illuminating and compelling career retrospective.

Huang's journey starts with his first visit to the staggering electronics markets in Shenzhen, with booths overflowing with capacitors, memory chips,...
more

See more recommendations for this book...

53
The bestselling account of a band of kids from New York who fought an electronic turf war that ranged across some of the nation's most powerful computer systems. "An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour less

See more recommendations for this book...

54
This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. Hacking the Xbox includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide.

Hacking the...
more

See more recommendations for this book...

55
The unbelievable true story of the man who built a billion-dollar online drug empire from his bedroom—and almost got away with it.

In 2011, a twenty-six-year-old libertarian programmer named Ross Ulbricht launched the ultimate free market: the Silk Road, a clandestine Web site hosted on the Dark Web where anyone could trade anything—drugs, hacking software, forged passports, counterfeit cash, poisons—free of the government’s watchful eye.

It wasn’t long before the media got wind of the new Web site where anyone—not just teenagers and weed dealers but terrorists...
more
Recommended by Casey Neistat, and 1 others.

Casey NeistatIt is unbelievably riveting. It does that thing where at the end of every chapter it leaves you just enough we're like "aah!" and you have to read the first paragraph of the next chapter and then before you know it is a downward spiral and you end up finishing this book. Took me four days to get through this. (Source)

See more recommendations for this book...

57
At last, the first full account of the cypherpunks who aim to free the world’s institutional secrets, by Forbes journalist Andy Greenberg who has traced their shadowy history from the cryptography revolution of the 1970s to Wikileaks founding hacker Julian Assange, Anonymous, and beyond.

WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers’ identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical...
more

See more recommendations for this book...

58

Homeland (Little Brother, #2)

In Cory Doctorow's wildly successful Little Brother, young Marcus Yallow was arbitrarily detained and brutalized by the government in the wake of a terrorist attack on San Francisco―an experience that led him to become a leader of the whole movement of technologically clued-in teenagers, fighting back against the tyrannical security state.

A few years later, California's economy collapses, but Marcus's hacktivist past lands him a job as webmaster for a crusading politician who promises reform. Soon his former nemesis Masha emerges from the political underground to gift him with a...
more

See more recommendations for this book...

59
Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name Anonymous, by the writer the Huffington Post says “knows all of Anonymous’ deepest, darkest secrets.”

Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely...
more

See more recommendations for this book...

60
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through... more

See more recommendations for this book...

Don't have time to read the top Hacking books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
61
Author of the #1 New York Times bestseller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files... more

Joseph NyeThis is intriguing, because when you look at the enormous opportunities that the Internet has presented – economic efficiency, great communication – we generally think of the positive side. But what Clarke and Knake point out is that as we open these opportunities we also make ourselves vulnerable to their disruption. For example, you have the capacity to do damage in the physical world just by... (Source)

See more recommendations for this book...

62
There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.

Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an...
more

See more recommendations for this book...

63
By Glenn Greenwald, star of Citizenfour, the Academy Award-winning documentary on Edward Snowden

In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the twenty-nine-year-old NSA contractor Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a...
more
Recommended by Gilbert Rwabigwi, and 1 others.

Gilbert RwabigwiYour book, “No Place To Hide”, was a thrilling/insightful read. Can’t wait to flip through @Snowden’s memoir. 🙏🏾 https://t.co/pZPLxDpNcM (Source)

See more recommendations for this book...

64
Teru, siswi SMA miskin yang harus menjalani hari-harinya sebagai pembantu Kurosaki, pengurus sekolah yang agak preman. Tapi sebenarnya Kurosaki adalah Daisy, sosok misterius yang telah menjadi penopang hidup Teru yang sebatang kara. Teru yang tidak mengetahui kebenaran itu, perlahan mulai menyukai Kurosaki. less

See more recommendations for this book...

65
From the premiere New York Times Washington correspondent, a stunning and incisive look into how cyberwarfare is influencing elections, threatening national security, and bringing us to the brink of global war.

Behind the Russian cyberattacks that may have thrown the 2016 election; behind the Sony hack; behind mysterious power outages around the world and the disappearance of thousands of personnel records from poorly guarded government servers are the traces of a new and powerful weapon, one that has the potential to remake global conflict like nothing...
more
Recommended by Bill Gates, and 1 others.

Bill Gates[On Bill Gates's reading list in 2018.] (Source)

See more recommendations for this book...

66
Viruses. Identity Theft. Corporate Espionage. National secrets compromised. Can anyone promise security in our digital world?

The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.

This edition updated with new information about post-9/11 security.
less

See more recommendations for this book...

67

Digital Fortress

When the National Security Agency's invincible code-breaking machine encounters a mysterious code it cannot break, the agency calls its head cryptographer, Susan Fletcher, a brilliant and beautiful mathematician. What she uncovers sends shock waves through the corridors of power. The NSA is being held hostage... not by guns or bombs, but by a code so ingeniously complex that if released it would cripple U.S. intelligence.

Caught in an accelerating tempest of secrecy and lies, Susan Fletcher battles to save the agency she believes in. Betrayed on all sides, she finds herself...
more

See more recommendations for this book...

68
"This is one of the most interesting infosec books to come out in the last several years."
–Dino Dai Zovi, Information Security Professional

"Give a man an exploit and you make him a hacker for a day; teach a man to exploit bugs and you make him a hacker for a lifetime."
–Felix 'FX' Lindner

Seemingly simple bugs can have drastic consequences, allowing attackers to compromise systems, escalate local privileges, and otherwise wreak havoc on a system.

A Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and...
more

See more recommendations for this book...

69
The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom -- even democracy itself

Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They...
more

See more recommendations for this book...

Don't have time to read the top Hacking books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
71
Analyzing how hacks are done, so as to stop them in the future

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. "Practical Reverse Engineering" goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in...
more

See more recommendations for this book...

72
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more. less
Recommended by Ben Goldacre, and 1 others.

Ben Goldacre@szbalint it's such a great book, i've always said @rossjanderson should release it in chunks as pop science books. the massive textbook shape doesn't do its accessibility, readability and content justice! (Source)

See more recommendations for this book...

73

The Best of 2600

A Hacker Odyssey

Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker's perspective. Included are stories about the creation of the infamous tone dialer "red box" that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks. less

See more recommendations for this book...

74

The Browser Hacker's Handbook

Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods.

The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any...
more

See more recommendations for this book...

75

The Art of Memory Forensics

Detecting Malware and Threats in Windows, Linux, and Mac Memory

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields.

Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows,...
more

See more recommendations for this book...

76
"Apapun yang terjadi, aku akan selalu melindungimu."

Itu bunyi email yang dikirimkan sosok misterius bernama Daisy untuk Teru. Setelah kematian kakaknya, hanya email dari Daisy-lah yang menjadi pelipur hati Teru. Karena suatu kejadian, ia terpaksa harus bekerja dengan Kurosaki, pengurus sekolah yang agak preman. Siapa sih sebenarnya Kurosaki ini ?!
less

See more recommendations for this book...

78
I am not a recruiter. I am a software engineer. And as such, I know what it's like to be asked to whip up brilliant algorithms on the spot and then write flawless code on a whiteboard. I've been through this as a candidate and as an interviewer.

Cracking the Coding Interview, 6th Edition is here to help you through this process, teaching you what you need to know and enabling you to perform at your very best. I've coached and interviewed hundreds of software engineers. The result is this book.

Learn how to uncover the hints and hidden details in a question,...
more

See more recommendations for this book...

79

Obsidio (The Illuminae Files, #3)

From bestselling author duo Amie Kaufman and Jay Kristoff comes the exciting finale in the trilogy that broke the mold and has been called "stylistically mesmerizing" and "out-of-this-world-awesome."

Kady, Ezra, Hanna, and Nik narrowly escaped with their lives from the attacks on Heimdall station and now find themselves crammed with 2,000 refugees on the container ship, Mao. With the jump station destroyed and their resources scarce, the only option is to return to Kerenza--but who knows what they'll find seven months after the invasion? Meanwhile, Kady's cousin,...
more

See more recommendations for this book...

80
Open source provides the competitive advantage in the Internet Age. According to the August Forrester Report, 56 percent of IT managers interviewed at Global 2,500 companies are already using some type of open source software in their infrastructure and another 6 percent will install it in the next two years. This revolutionary model for collaborative software development is being embraced and studied by many of the biggest players in the high-tech industry, from Sun Microsystems to IBM to Intel.

The Cathedral & the Bazaar is a must for anyone who cares about the future...
more

See more recommendations for this book...

Don't have time to read the top Hacking books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
81
The definitive insider's guide to auditing software security is penned by leading security consultants who have personally uncovered vulnerabilities in applications ranging from "sendmail" to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for "ripping apart" applications to reveal even the most subtle and well-hidden security flaws. less

See more recommendations for this book...

82
Hubungan Teru dan Kurosaki belakangan ini semakin dekat. Saat pergi liburan, Teru membelikan Daisy sebuah kotak musik sebagai oleh-oleh. Dan kotak musik itu akhirnya sampai ke tangan Daisy... alias Kurosaki. Tidak disangka kotak musik itulah yang membongkar semuanya. less

See more recommendations for this book...

83
The ultimate gift for any Minecraft fan--a box set featuring definitive guides to four different aspects of the blockbuster videogame, packed with insider info and tips from the experts at Mojang.

- The world of Minecraft is waiting to be explored, but danger lurks around every corner. The official Minecraft: Guide to Exploration will help you survive. Learn how to find resources, craft equipment, and protect yourself from hostile mobs.

- Minecraft is so varied and limitless that incredible creations can often be daunting to think about,...
more

See more recommendations for this book...

84

Malware Analyst's Cookbook and DVD

Tools and Techniques for Fighting Malicious Code

A computer forensics "how-to" for fighting malicious code and analyzing incidentsWith our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.Security professionals face a constant battle against malicious... more

See more recommendations for this book...

85

No Tech Hacking

A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.

As the clich� goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been...
more

See more recommendations for this book...

86

Gemina (The Illuminae Files, #2)

Moving to a space station at the edge of the galaxy was always going to be the death of Hanna’s social life. Nobody said it might actually get her killed.

The sci-fi saga that began with the breakout bestseller Illuminae continues on board the Jump Station Heimdall, where two new characters will confront the next wave of the BeiTech assault.

Hanna is the station captain’s pampered daughter; Nik the reluctant member of a notorious crime family. But while the pair are struggling with the realities of life aboard the galaxy’s most boring space station, little...
more

See more recommendations for this book...

88
No source code? No problem. With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.

Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other...
more

See more recommendations for this book...

89

Missing You

It's a profile, like all the others on the online dating site. But as NYPD Detective Kat Donovan focuses on the accompanying picture, she feels her whole world explode, as emotions she’s ignored for decades come crashing down on her. Staring back at her is her ex-fiancé Jeff, the man who shattered her heart—and who she hasn’t seen in 18 years.

Kat feels a spark, wondering if this might be the moment when past tragedies recede and a new world opens up to her. But when she reaches out to the man in the profile, her reawakened hope quickly darkens into suspicion and then terror as an...
more
Recommended by Stephen King, and 1 others.

Stephen KingThe new Harlan Coben is twisty and terrific. The stuff about the cops' wives is especially good. Beautiful observation. I'm jealous. (Source)

See more recommendations for this book...

90

Find Me (Find Me, #1)

“FIND ME."

These are the words written on Tessa Waye’s diary. The diary that ends up with Wick Tate. But Tessa’s just been found . . . dead.

Wick has the right computer-hacking skills for the job but little interest in this perverse game of hide-and-seek. Until her sister Lily is the next target.

Then Griff, trailer-park boy next door and fellow hacker, shows up, intent on helping Wick. Is a happy ending possible with the threat of Wick’s deadbeat dad returning, the detective hunting him sniffing around Wick instead, and a killer taunting her at every...
more

See more recommendations for this book...

Don't have time to read the top Hacking books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
93

The Blue Nowhere

His code name is Phate -- a sadistic computer hacker who infiltrates people's computers, invades their lives, and with chilling precision lures them to their deaths.

To stop him, the authorities free imprisoned former hacker Wyatt Gillette to aid the investigation. Teamed with old-school homicide detective Frank Bishop, Gillette must combine their disparate talents to catch a brilliant and merciless killer.
less

See more recommendations for this book...

94

Programming Pearls

The first edition of Programming Pearls was one of the most influential books I read early in my career, and many of the insights I first encountered in that book stayed with me long after I read it. Jon has done a wonderful job of updating the material. I am very impressed at how fresh the new examples seem. - Steve McConnell When programmers list their favorite books, Jon Bentley's collection of programming pearls is commonly included among the classics. Just as natural pearls grow from grains of sand that irritate oysters, programming pearls have grown from real problems that have... more
Recommended by Jeff Atwood, James Stanley, and 2 others.

James StanleyI very much enjoyed reading "Programming Pearls" by John Bentley. Most of the software we write is trying to solve fairly large and ill-defined problems in a way that minimises development cost, but Programming Pearls presents a lot of small, well-defined problems, and talks through their solutions in ways that minimise machine resource usage. There are lots of good "a-ha" moments when reading... (Source)

See more recommendations for this book...

95
For the first time, the Cambridge Analytica whistleblower tells the inside story of the data mining and psychological manipulation behind the election of Donald Trump and the Brexit referendum, connecting Facebook, WikiLeaks, Russian intelligence, and international hackers.

Mindf*ck goes deep inside Cambridge Analytica's "American operations," which were driven by Steve Bannon's vision to remake America and fueled by mysterious billionaire Robert Mercer's money, as it weaponized and wielded the massive store of data it had harvested on individuals in--excess of 87 million--to...
more

See more recommendations for this book...

96
The world of Minecraft is so varied and limitless that incredible creations can often be daunting to think about, never mind build.

The official Minecraft: Guide to Creative will teach you all you need to know to create builds more impressive than you could've dreamed of.

With insider info and tips from the experts at Mojang, this is the definitive guide to creation in Minecraft.
less

See more recommendations for this book...

97
By New York Times bestselling author and Minecraft expert, Megan Miller, a full-color book full of practical advice that boys and girls will refer to again and again!

Minecraft is the one game that children, parents, and teaches all agree on. It’s great fun and a wonderful teaching tool. The Ultimate Unofficial Encyclopedia for Minecrafters reveals expert tricks of the trade for gamers. This exciting book will cover everything players need to know about mining, farming, building, villagers, the Nether, and more! Young gamers will be surprised...
more

See more recommendations for this book...

98

The Book of PoC||GTFO

This highly anticipated print collection gathers articles published in the much-loved International Journal of Proof-of-Concept or Get The Fuck Out.

PoC||GTFO follows in the tradition of Phrack and Uninformed by publishing on the subjects of offensive security research, reverse engineering, and file format internals. Until now, the journal has only been available online or printed and distributed for free at hacker conferences worldwide.

Consistent with the journal's quirky, biblical style, this book comes with all the trimmings: a leatherette cover, ribbon bookmark,...
more

See more recommendations for this book...

99
There are already hundreds of thousands of cybersecurity professionals and according to some sources, there is a shortage of several more hundreds of thousands. Tribe of Hackers wants to change that. We asked for industry, career, and personal advice from 70 cybersecurity luminaries who are ready to break down barriers and shatter ceilings. It's about time.
This book can be a catalyst for change for anyone, from beginners trying to enter the industry, to practitioners looking to start their own firms.

What tips do the founders of Dragos, Inc. and Duo Security have on starting...
more

See more recommendations for this book...

100
In this disquieting cyber thriller, Joseph Menn takes readers into the murky hacker underground, traveling the globe from San Francisco to Costa Rica and London to Russia. His guides are California surfer and computer whiz Barrett Lyon and a fearless British high-tech agent. Through these heroes, Menn shows the evolution of cyber-crime from small-time thieving to sophisticated, organized gangs, who began by attacking corporate websites but increasingly steal financial data from consumers and defense secrets from governments. Using unprecedented access to Mob businesses and Russian officials,... more

See more recommendations for this book...

Don't have time to read the top Hacking books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.