| 1 |
|
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
by
3.97 avg rating — 27,259 ratings
|
|
| 2 |
|
Hackers: Heroes of the Computer Revolution
by
4.16 avg rating — 8,545 ratings
|
|
| 3 |
|
Free as in Freedom: Richard Stallman's Crusade for Free Software
by
3.83 avg rating — 1,224 ratings
|
|
| 4 |
|
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
by
4.28 avg rating — 15,712 ratings
|
|
| 5 |
|
Masters of Doom: How Two Guys Created an Empire and Transformed Pop Culture
by
4.29 avg rating — 19,970 ratings
|
|
| 6 |
|
In the Beginning...Was the Command Line
by
3.81 avg rating — 8,084 ratings
|
|
| 7 |
|
The Art of Deception: Controlling the Human Element of Security
by
3.76 avg rating — 7,226 ratings
|
|
| 8 |
|
What the Dormouse Said: How the Sixties Counterculture Shaped the Personal Computer Industry
by
3.82 avg rating — 1,147 ratings
|
|
| 9 |
|
Culture Jamming – Das Manifest der Anti-Werbung
by
3.62 avg rating — 1,808 ratings
|
|
| 10 |
|
Access All Areas: A User's Guide to the Art of Urban Exploration
by
4.17 avg rating — 335 ratings
|
|
| 10 |
|
Where Wizards Stay Up Late: The Origins of the Internet
by
3.94 avg rating — 4,903 ratings
|
|
| 12 |
|
Full Story Inside
by
really liked it 4.00 avg rating — 16 ratings
|
|
| 12 |
|
Holo.Wars: The Black Hats
by
3.50 avg rating — 6 ratings
|
|
| 12 |
|
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
by
3.94 avg rating — 323 ratings
|
|
| 15 |
|
Julian Assange - The Unauthorised Autobiography
by
3.78 avg rating — 965 ratings
|
|
| 15 |
|
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
by
4.05 avg rating — 155 ratings
|
|
| 17 |
|
The Accidental Billionaires: The Founding Of Facebook
by
3.59 avg rating — 17,170 ratings
|
|
| 17 |
|
Black Hat Python: Python Programming for Hackers and Pentesters
by
4.12 avg rating — 611 ratings
|
|
| 19 |
|
Metasploit: The Penetration Tester's Guide
by
4.07 avg rating — 867 ratings
|
|
| 20 |
|
Penetration Testing: A Hands-On Introduction to Hacking
by
4.17 avg rating — 391 ratings
|
|
| 21 |
|
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
by
4.24 avg rating — 1,228 ratings
|
|
| 22 |
|
Writing Secure Code
by
4.01 avg rating — 373 ratings
|
|
| 23 |
|
The Hacker Ethic: A Radical Approach to the Philosophy of Business
by
3.75 avg rating — 775 ratings
|
|
| 23 |
|
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
by
4.17 avg rating — 8,221 ratings
|
|
| 25 |
|
Nightwork: A History of Hacks and Pranks at Mit
by
3.73 avg rating — 181 ratings
|
|
| 25 |
|
Hacking: The Art of Exploitation w/CD
by
4.17 avg rating — 2,505 ratings
|
|
| 27 |
|
Der Phrasenprüfer: Szenen aus dem Leben von Wau Holland, Mitbegründer des Chaos Computer Clubs
by
3.23 avg rating — 13 ratings
|
|
| 27 |
|
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
by
4.28 avg rating — 15,712 ratings
|
|
| 29 |
|
iWoz - Computer Geek to Cult Icon: How I Invented the Personal Computer, Co-Founded Apple, and Had Fun Doing It
by
3.85 avg rating — 17,461 ratings
|
|
| 29 |
|
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
by
4.07 avg rating — 265 ratings
|
|
| 31 |
|
The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary
by
3.83 avg rating — 4,301 ratings
|
|
| 31 |
|
Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell
by
4.20 avg rating — 1,771 ratings
|
|
| 33 |
|
Accidental Empires: How the Boys of Silicon Valley Make Their Millions, Battle Foreign Competition, and Still Can't Get a Date
by
4.03 avg rating — 1,973 ratings
|
|
| 33 |
|
Future Crimes
by
3.92 avg rating — 4,388 ratings
|
|
| 35 |
|
Just for Fun: The Story of an Accidental Revolutionary
by
3.97 avg rating — 4,755 ratings
|
|
| 35 |
|
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
by
3.97 avg rating — 8,050 ratings
|
|
| 37 |
|
Code: And Other Laws of Cyberspace, Version 2.0
by
3.94 avg rating — 1,699 ratings
|
|
| 37 |
|
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
by
4.48 avg rating — 605 ratings
|
|
| 39 |
|
Dealers of Lightning: Xerox PARC and the Dawn of the Computer Age
by
4.13 avg rating — 2,459 ratings
|
|
| 39 |
|
Chasing Vapor: Exploring the Murky Malice of Cybercrime
by
3.67 avg rating — 3 ratings
|
|
| 41 |
|
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global
by
4.21 avg rating — 219 ratings
|
|
| 42 |
|
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
by
4.35 avg rating — 9,865 ratings
|
|
| 43 |
|
Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat
by
3.82 avg rating — 676 ratings
|
|
| 44 |
|
The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
by
4.02 avg rating — 805 ratings
|
|
| 45 |
|
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
by
3.74 avg rating — 2,372 ratings
|
|
| 46 |
|
Why CISOs Fail: The Missing Link in Security Management--and How to Fix It (Security, Audit and Leadership Series)
by
4.29 avg rating — 14 ratings
|
|
| 47 |
|
Thinking in Bets: Making Smarter Decisions When You Don't Have All the Facts
by
3.82 avg rating — 22,714 ratings
|
|
| 48 |
|
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
by
4.18 avg rating — 55 ratings
|
|
| 49 |
|
Curmudgeon: How to Succeed as an Industry Analyst
by
4.45 avg rating — 11 ratings
|
|
| 50 |
|
CISO Desk Reference Guide: A Practical Guide for CISOs
by
4.29 avg rating — 28 ratings
|
|
| 51 |
|
CISO Desk Reference Guide Volume 2: A Practical Guide for CISOs
by
4.53 avg rating — 17 ratings
|
|
| 52 |
|
Zero Day Threat: The Shocking Truth of How Banks and Credit Bureaus Help Cyber Crooks Steal Your Money and Identity
by
3.50 avg rating — 30 ratings
|
|
| 53 |
|
Understanding Cybersecurity: Emerging Governance and Strategy
by
4.25 avg rating — 4 ratings
|
|
| 54 |
|
The Internet of Risky Things: Trusting the Devices That Surround Us
by
really liked it 4.00 avg rating — 20 ratings
|
|
| 55 |
|
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
by
3.92 avg rating — 12 ratings
|
|
| 56 |
|
Defensive Security Handbook: Best Practices for Securing Infrastructure
by
3.93 avg rating — 136 ratings
|
|
| 57 |
|
Cybersecurity: A Business Solution: An executive perspective on managing cyber risk
by
really liked it 4.00 avg rating — 11 ratings
|
|
| 58 |
|
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
by
3.83 avg rating — 1,105 ratings
|
|
| 59 |
|
Cybersecurity Dilemma
by
4.21 avg rating — 53 ratings
|
|
| 60 |
|
Cybersecurity For Dummies
by
3.73 avg rating — 132 ratings
|
|