100 Best Hacking Books of All Time
We've researched and ranked the best hacking books in the world, based on recommendations from world experts, sales data, and millions of reader ratings. Learn more
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C... more
If they were a hall of fame or shame for computer hackers, a Kevin Mitnick plaque would be mounted the near the entrance. While other nerds were fumbling with password possibilities, this adept break-artist was penetrating the digital secrets of Sun Microsystems, Digital Equipment Corporation, Nokia, Motorola, Pacific Bell, and other mammoth enterprises. His Ghost in the Wires memoir paints an action portrait of a plucky loner motivated by a passion for trickery, not material game. (P.S. Mitnick's capers have already been the subject of two books and a movie. This first-person account is...
moreRichard BejtlichIn 2002 I reviewed Kevin Mitnick's first book, The Art of Deception. In 2005 I reviewed his second book, The Art of Intrusion. I gave both books four stars. Mitnick's newest book, however, with long-time co-author Bill Simon, is a cut above their previous collaborations and earns five stars. As far as I can tell (and I am no Mitnick expert, despite reading almost all previous texts mentioning... (Source)
Antonio EramThis book was recommended by Antonio when asked for titles he would recommend to young people interested in his career path. (Source)
Nick JanetakisI'm going to start reading Ghost in the Wires by Kevin Mitnick this week. I used to go to 2600 meetings back when he was arrested for wire fraud and other hacking related shenanigans in the mid 1990s. I'm fascinated by things like social engineering and language in general. In the end, I just want to be entertained by his stories. For someone who is into computer programming, a book like this... (Source)
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error... more
James Stanley"The Cuckoo's Egg" by Clifford Stoll is another great book. I believe it's the first documented account of a computer being misused by a remote attacker. It talks about how Clifford attached physical teleprinters to the incoming phone lines so that he could see what the attacker was actually doing on the computer, and how he traced the attacker across several countries. (Source)
This fully updated, industry-standard security resource shows how to fortify computer networks by learning and effectively applying ethical hacking techniques. Based on critical topics that the authors teach at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks.
Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition,... more
In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with... more
John SargentEdward Snowden decided at the age of 29 to give up his entire future for the good of his country. He displayed enormous courage in doing so, and like him or not, his is an incredible American story. There is no doubt that the world is a better and more private place for his actions. Macmillan is enormously proud to publish Permanent Record. (Source)
Kara SwisherBtw @Snowden new book “Permanent Record” is quite good and surprisingly a love letter to the Internet as it was. (Source)
Franchises line the Los Angeles freeway as far as the eye can see: Reverend Wayne's Pearly Gates, Mr. Lee's Greater Hong Kong, Uncle Enzo's CosaNostra Pizza, Incorporated. The only relief from the sea of logos is within the well-guarded borders of the autonomous city-states that law-abiding citizens are afraid to leave. Is it any wonder that most sane folks have chosen to live in a computer-generated universe? Here in virtual reality is a domain of pleasures... more
Sergey BrinBrin said he is a big sci-fi fan, and Stephenson's acclaimed 1992 novel "Snow Crash" is one of his favorites. The book "was really 10 years ahead of its time," Brin said. "It kind of anticipated what's going to happen, and I find that really interesting." (Source)
Adam SavageIt's a tough call because I prefer other books of [this author]. But [this book] is so important within the history of science fiction. (Source)
Marvin LiaoMy list would be (besides the ones I mentioned in answer to the previous question) both business & Fiction/Sci-Fi and ones I personally found helpful to myself. The business books explain just exactly how business, work & investing are in reality & how to think properly & differentiate yourself. On the non-business side, a mix of History & classic fiction to understand people, philosophy to make... (Source)
The word spread through the hacking underground like some unstoppable new virus: an audacious crook had staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy.
The culprit was a brilliant programmer with a hippie ethic and a supervillain's double identity. Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As... more
Alex Caceres/hacker Frmrly Known As Dotslashpunk@gvgm3 @SecurityTube For networks i'd have to say hands down the OSCP is likely one of the best you're going to find. Fuck the cert, take the course, get down and dirty in the labs and break everything. I hear @georgiaweidman's book is good (Pen testing with Metasploit) but have not read it myself (Source)
Don't have time to read the top Hacking books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:
Create a trojan command-and-control using GitHub
Detect sandboxing and automate common malware tasks,... more
Through a series of football-style "plays," this straightforward guide gets to the root of many of the roadblocks people may face while penetration... more
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we... more
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a... more
Chris FussellThe history of how great ideas evolve. (Source)
Brian BurkhartThis book is essentially a biography of all the people who’ve led to the technology of today—it’s fascinating. The most important point of the book is everything is one long, connected chain. There isn’t just one person or one industry that makes anything happen—it all goes way back. For example, the communication theory I have espoused and taught throughout my career is from Aristotle, Socrates,... (Source)
Sean Gardner@semayuce @MicrosoftUK @HelenSharmanUK @astro_timpeake @WalterIsaacson Yes, I agree: "The Innovators" is a great book. I loved it too. (Source)
Before the Internet was commonplace, William Gibson showed us the Matrix—a world within the world, the representation of every byte of data in cyberspace. Henry Dorsett Case was the sharpest data-thief in the Matrix, until an ex-employer crippled his nervous system. Now a new employer has recruited him for a last-chance run against an unthinkably... more
Adam Savage[This series] changed my life. (Source)
Mark Pitcavage@jamesjhare Neuromancer is a fascinating book--but it was especially fascinating when it was first published; it was mind-blowing. (Source)
Pia Mancini@Fede_Bada amazing book (Source)
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering... more
Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he... more
Don't have time to read the top Hacking books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
At once wildly original and stuffed with irresistible nostalgia, READY PLAYER ONE is a spectacularly genre-busting, ambitious, and charming debut--part quest novel, part love story, and part virtual space opera set in a universe where spell-slinging mages battle giant Japanese robots, entire planets are inspired by Blade Runner, and flying DeLoreans achieve light speed.
It's the year 2045, and the real world is an ugly place.
Like most of... more
Steve JurvetsonA gift to all of my Apple II programming buddies from high school and Dungeons & Dragons comrades. (Source)
Fabrice GrindaI have lots of books to recommend, but they are not related to my career path. The only one that is remotely related is Peter Thiel’s Zero to One. That said here are books I would recommend. (Source)
Dominic Steil[One of the books that had the biggest impact on .] (Source)
Lisbeth Salander - the heart of Larsson's two previous novels - lies in critical condition, a bullet wound to her head, in the intensive care unit of a Swedish city hospital. She's fighting for her life in more ways than one: if and when she recovers, she'll be taken back to Stockholm to stand trial for three murders. With the help of her friend, journalist Mikael Blomkvist, she will not only have to prove her innocence, but also identify and denounce those in authority who have allowed the... more
An international publishing sensation, Stieg Larsson’s The Girl with the Dragon Tattoo combines murder mystery, family saga, love story, and financial intrigue into... more
We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care?
Consider these facts: Everything around us is turning into computers. Your typewriter is... more
Evan WilliamsI want everybody I know to read "How to Make Wealth" and "Mind the Gap" (chapters 6 and 7), which brilliantly articulate the most commonly, and frustratingly, misunderstood core economic principles of everyday life. (Source)
Yukihiro MatsumotoSince programmers create programs out of nothing, imagination is our only limitation. Thus, in the world of programming, the hero is the one who has great vision. Paul Graham is one of our contemporary heroes. He has the ability to embrace the vision, and to express it plainly. His works are my favorites, especially the ones describing language design. He explains secrets of programming,... (Source)
Chris AndersonA delightful ping-pong around the brain of a really smart guy. The chapter that answers the key question of our age-- why are nerds unpopular?-- is worth the price of admission alone. (Source)
Once you've built your foundation for penetration testing, you'll learn the... more
Mikael Blomkvist, crusading publisher of the magazine Millennium, has decided to run a story that will expose an extensive sex trafficking operation. On the eve of its publication, the two reporters responsible for the article are murdered, and the fingerprints found on the murder weapon belong to his friend, the troubled genius hacker Lisbeth Salander. Blomkvist, convinced of... more
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. more
Josephine WolffAs a book, Countdown to Day Zero is a stunning example of a case study, of really diving into a cyber security incident. She takes on the very technical material—getting into the malware and the question of how do these SCADA machines work and how does this piece of software compromise them—but then also brings in this really rich and complicated geopolitical conflict that this is happening as a... (Source)
Throughout the text are clear... more
Stephen Kinsella@gavreilly @SLSingh Love that book (Source)
WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of... more
Don't have time to read the top Hacking books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.
You'll learn how to:
Set up a safe virtual environment to analyze... more
Late one night, Blomkvist receives a phone call from a source claiming to have information vital to the United States. The source has been in contact with a young female superhacker—a hacker resembling someone Blomkvist knows all too well. The implications are staggering. Blomkvist, in desperate need of a scoop for Millennium, turns to Salander for help. She, as usual, has her own agenda. The... more
In 1942, Lawrence Pritchard Waterhouse—mathematical genius and young Captain in the U.S. Navy—is assigned to detachment 2702. It is an outfit so secret that only a handful of people know it exists, and some of those people have names like Churchill and Roosevelt. The mission of Waterhouse and Detachment 2702—commanded by Marine... more
Marc AndreessenThe Sovereign Individual—written 20 years ago, this is the most thought provoking book on the unfolding nature of the 21st Century that I’ve yet read. It’s packed with ideas on every page, many that are now fast becoming conventional wisdom, and many that are still heretical. Two related books to read are The Twilight of Sovereignty and Cryptonomicon. (Source)
Risto SiilasmaaThe one book on Siilasmaa's list is this fantasy offering from Neal Stephenson. The novel relates two parallel stories, one about an elite group of code-breakers in World War II, and another set in the present day, about two grandchildren of members of the group trying to track down a previously unknown – and rumored to be unbreakable – Nazi code. The book's subject matter resonates with current... (Source)
Nick HarkawayCryptonomicon is a real humdinger of a novel. Stephenson is a hugely enjoyable writer of action and comedy, I find him a joy to read. (Source)
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse... more
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers. The attacks culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's... more
Ben LoricaI am in the middle of Sandworm by @a_greenberg and it is great read. I have a feeling that recent events in the Middle East will result in cyberattacks similar to those in this book https://t.co/qLM5Z7YAdl (Source)
Laurence TribeVote augmentation looks like the newest form of election manipulation. It was a favorite Putin/GRU technique in Estonia, Georgia, and Ukraine. See Andy Greenberg’s book “Sandworm.” https://t.co/0i9NSdUvzs (Source)
Jack Rhysider@selenalarson @a_greenberg wrote a great book (Source)
Don't have time to read the top Hacking books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
Technology controls almost everything in our modern-day world, from remote entry on our cars to access to our homes, from the flight controls of our airplanes to the movements of the entire world economy. Thousands of autonomous computer programs, or daemons, make our networked world possible, running constantly in the background of our lives, trafficking e-mail,... more
Eric Weinstein[Eric Weinstein recommended this book on Twitter.] (Source)
If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the... more
In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies-and countless viruses, phishing, and spyware attacks-he delivers the first definitive narrative of the global spam problem and its threat to... more
Josephine WolffBrian Krebs is really more deeply reported on financial cyber criminals than almost anybody in the world.He’s really smart about the ways in which money drives a lot of these cyber crimes. (Source)
"…monumental… fascinating… comprehensive… the definitive work on cryptography for computer programmers…" –Dr. Dobb's Journal
"…easily ranks as one of the most authoritative in its field." —PC Magazine
"…the bible of code hackers." –The Millennium Whole Earth Catalog
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers... more
Dominic Steil[One of the five books recommends to young people interested in his career path.] (Source)
In order to outsmart a would-be hacker, you need to get into the hacker's mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks.
Whether you're worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn... more
But the warship could be the least of their problems. A deadly plague has broken out and is mutating, with terrifying results; the fleet's AI, which should be protecting them, may actually be their biggest threat; and nobody in charge will say what's really going on. As Kady plunges into a web of data hacking to... more
Don't have time to read the top Hacking books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
In June 1983, President Reagan watched the movie War Games, in which a teenager unwittingly hacks the Pentagon, and asked his top general if the scenario was plausible. The general said it was. This set in motion the first presidential directive on computer... more
Josephine WolffThis book is by Fred Kaplan and it’s a historical study of the ways that governments—and in particular the US government—have tried to think about and use cyberpower for state-to-state conflict. He looks at what the origins of that were in the 1980s and how it has evolved over the past 30 or so years. (Source)
Huang's journey starts with his first visit to the staggering electronics markets in Shenzhen, with booths overflowing with capacitors, memory chips,... more
Hacking the... more
In 2011, a twenty-six-year-old libertarian programmer named Ross Ulbricht launched the ultimate free market: the Silk Road, a clandestine Web site hosted on the Dark Web where anyone could trade anything—drugs, hacking software, forged passports, counterfeit cash, poisons—free of the government’s watchful eye.
It wasn’t long before the media got wind of the new Web site where anyone—not just teenagers and weed dealers but terrorists... more
Casey NeistatIt is unbelievably riveting. It does that thing where at the end of every chapter it leaves you just enough we're like "aah!" and you have to read the first paragraph of the next chapter and then before you know it is a downward spiral and you end up finishing this book. Took me four days to get through this. (Source)
WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers’ identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical... more
A few years later, California's economy collapses, but Marcus's hacktivist past lands him a job as webmaster for a crusading politician who promises reform. Soon his former nemesis Masha emerges from the political underground to gift him with a... more
Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely... more
Don't have time to read the top Hacking books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
Joseph NyeThis is intriguing, because when you look at the enormous opportunities that the Internet has presented – economic efficiency, great communication – we generally think of the positive side. But what Clarke and Knake point out is that as we open these opportunities we also make ourselves vulnerable to their disruption. For example, you have the capacity to do damage in the physical world just by... (Source)
Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an... more
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the twenty-nine-year-old NSA contractor Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a... more
Gilbert RwabigwiYour book, “No Place To Hide”, was a thrilling/insightful read. Can’t wait to flip through @Snowden’s memoir. 🙏🏾 https://t.co/pZPLxDpNcM (Source)
Behind the Russian cyberattacks that may have thrown the 2016 election; behind the Sony hack; behind mysterious power outages around the world and the disappearance of thousands of personnel records from poorly guarded government servers are the traces of a new and powerful weapon, one that has the potential to remake global conflict like nothing... more
Bill Gates[On Bill Gates's reading list in 2018.] (Source)
The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.
This edition updated with new information about post-9/11 security. less
Caught in an accelerating tempest of secrecy and lies, Susan Fletcher battles to save the agency she believes in. Betrayed on all sides, she finds herself... more
–Dino Dai Zovi, Information Security Professional
"Give a man an exploit and you make him a hacker for a day; teach a man to exploit bugs and you make him a hacker for a lifetime."
–Felix 'FX' Lindner
Seemingly simple bugs can have drastic consequences, allowing attackers to compromise systems, escalate local privileges, and otherwise wreak havoc on a system.
A Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and... more
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They... more
Don't have time to read the top Hacking books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. "Practical Reverse Engineering" goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in... more
Ben Goldacre@szbalint it's such a great book, i've always said @rossjanderson should release it in chunks as pop science books. the massive textbook shape doesn't do its accessibility, readability and content justice! (Source)
The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any... more
Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows,... more
Itu bunyi email yang dikirimkan sosok misterius bernama Daisy untuk Teru. Setelah kematian kakaknya, hanya email dari Daisy-lah yang menjadi pelipur hati Teru. Karena suatu kejadian, ia terpaksa harus bekerja dengan Kurosaki, pengurus sekolah yang agak preman. Siapa sih sebenarnya Kurosaki ini ?! less
Cracking the Coding Interview, 6th Edition is here to help you through this process, teaching you what you need to know and enabling you to perform at your very best. I've coached and interviewed hundreds of software engineers. The result is this book.
Learn how to uncover the hints and hidden details in a question,... more
Kady, Ezra, Hanna, and Nik narrowly escaped with their lives from the attacks on Heimdall station and now find themselves crammed with 2,000 refugees on the container ship, Mao. With the jump station destroyed and their resources scarce, the only option is to return to Kerenza--but who knows what they'll find seven months after the invasion? Meanwhile, Kady's cousin,... more
The Cathedral & the Bazaar is a must for anyone who cares about the future... more
Don't have time to read the top Hacking books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
- The world of Minecraft is waiting to be explored, but danger lurks around every corner. The official Minecraft: Guide to Exploration will help you survive. Learn how to find resources, craft equipment, and protect yourself from hostile mobs.
- Minecraft is so varied and limitless that incredible creations can often be daunting to think about,... more
As the clich� goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been... more
The sci-fi saga that began with the breakout bestseller Illuminae continues on board the Jump Station Heimdall, where two new characters will confront the next wave of the BeiTech assault.
Hanna is the station captain’s pampered daughter; Nik the reluctant member of a notorious crime family. But while the pair are struggling with the realities of life aboard the galaxy’s most boring space station, little... more
Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other... more
Kat feels a spark, wondering if this might be the moment when past tragedies recede and a new world opens up to her. But when she reaches out to the man in the profile, her reawakened hope quickly darkens into suspicion and then terror as an... more
Stephen KingThe new Harlan Coben is twisty and terrific. The stuff about the cops' wives is especially good. Beautiful observation. I'm jealous. (Source)
These are the words written on Tessa Waye’s diary. The diary that ends up with Wick Tate. But Tessa’s just been found . . . dead.
Wick has the right computer-hacking skills for the job but little interest in this perverse game of hide-and-seek. Until her sister Lily is the next target.
Then Griff, trailer-park boy next door and fellow hacker, shows up, intent on helping Wick. Is a happy ending possible with the threat of Wick’s deadbeat dad returning, the detective hunting him sniffing around Wick instead, and a killer taunting her at every... more
Don't have time to read the top Hacking books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
To stop him, the authorities free imprisoned former hacker Wyatt Gillette to aid the investigation. Teamed with old-school homicide detective Frank Bishop, Gillette must combine their disparate talents to catch a brilliant and merciless killer. less
James StanleyI very much enjoyed reading "Programming Pearls" by John Bentley. Most of the software we write is trying to solve fairly large and ill-defined problems in a way that minimises development cost, but Programming Pearls presents a lot of small, well-defined problems, and talks through their solutions in ways that minimise machine resource usage. There are lots of good "a-ha" moments when reading... (Source)
Mindf*ck goes deep inside Cambridge Analytica's "American operations," which were driven by Steve Bannon's vision to remake America and fueled by mysterious billionaire Robert Mercer's money, as it weaponized and wielded the massive store of data it had harvested on individuals in--excess of 87 million--to... more
The official Minecraft: Guide to Creative will teach you all you need to know to create builds more impressive than you could've dreamed of.
With insider info and tips from the experts at Mojang, this is the definitive guide to creation in Minecraft. less
Minecraft is the one game that children, parents, and teaches all agree on. It’s great fun and a wonderful teaching tool. The Ultimate Unofficial Encyclopedia for Minecrafters reveals expert tricks of the trade for gamers. This exciting book will cover everything players need to know about mining, farming, building, villagers, the Nether, and more! Young gamers will be surprised... more
PoC||GTFO follows in the tradition of Phrack and Uninformed by publishing on the subjects of offensive security research, reverse engineering, and file format internals. Until now, the journal has only been available online or printed and distributed for free at hacker conferences worldwide.
Consistent with the journal's quirky, biblical style, this book comes with all the trimmings: a leatherette cover, ribbon bookmark,... more
This book can be a catalyst for change for anyone, from beginners trying to enter the industry, to practitioners looking to start their own firms.
What tips do the founders of Dragos, Inc. and Duo Security have on starting... more
Don't have time to read the top Hacking books of all time? Read Shortform summaries.
Shortform summaries help you learn 10x faster by:
- Being comprehensive: you learn the most important points in the book
- Cutting out the fluff: you focus your time on what's important to know
- Interactive exercises: apply the book's ideas to your own life with our educators' guidance.