Hackers


Sidetracked (Mindf*ck, #2)
Coders: The Making of a New Tribe and the Remaking of the World
Breaking And Entering: The Extraordinary Story of a Hacker Called "Alien" – A Woman's Thrilling Career Journey from MIT Through Spycraft and Cybersecurity
White-Hot Hack (Kate and Ian, #2)
Playing With Fire (#Hacker, #1)
@war: The Rise of the Military- Internet Complex
Kill Process (Kill Chain, #1)
Black Dawn (Titan, #6)
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Immoral Code
HACKING WITH SMART PHONES
Threat Modeling: Designing for Security
Ethical Hacking and Penetration Testing Guide
Zero Hour (Wired & Dangerous, #1)
Tor and the Dark Art of Anonymity (deep web, kali linux, hacking, bitcoins) : Network Security for the Rest of Us
Hacking: The Art of Exploitation w/CD
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Social Engineering
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Girl Who Played with Fire (Millennium #2)
The Art of Deception: Controlling the Human Element of Security
Little Brother (Little Brother, #1)
Black Hat Python: Python Programming for Hackers and Pentesters
Neuromancer (Sprawl, #1)
Gray Hat Hacking : The Ethical Hacker's Handbook
The Girl With the Dragon Tattoo (Millennium, #1)
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Hackers: Heroes of the Computer Revolution
Penetration Testing: A Hands-On Introduction to Hacking

Charon Lloyd-Roberts
Really you'd do that. Yes I would, I am a hacker I can do whatever I like. ...more
Charon Lloyd-Roberts, Putsch: Volume I Chapter Sampler

Steven Magee
If you do not want to be the victim of a computer virus attack, you need to be using the latest version of the computer operating system.
Steven Magee

More quotes...
Techno-Thrillers Techno-thrillers explore the ramifications of emerging technology, science, or natural phenomena…more
329 members, last active 14 minutes ago
{0}
{0} The most active Hacker Book Club on GoodReads! Unallocated Space is a technology-based communit…more
18 members, last active 12 years ago
Digital IT, IoT and ICS/SCADA book, author, fan, curious, anyone hacking who has ever bend the r…more
2 members, last active 8 years ago
Aphelion A group to read, absorb, and discuss knowledge from professionals in the Financial Technology in…more
2 members, last active 3 years ago

Tags

Tags contributing to this page include: hackers, hacker, and hacking