1 |
|
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
by
3.97 avg rating — 27,151 ratings
|
|
2 |
|
Hackers: Heroes of the Computer Revolution
by
4.16 avg rating — 8,519 ratings
|
|
3 |
|
Free as in Freedom: Richard Stallman's Crusade for Free Software
by
3.83 avg rating — 1,222 ratings
|
|
4 |
|
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
by
4.28 avg rating — 15,545 ratings
|
|
5 |
|
Masters of Doom: How Two Guys Created an Empire and Transformed Pop Culture
by
4.29 avg rating — 19,895 ratings
|
|
6 |
|
In the Beginning...Was the Command Line
by
3.81 avg rating — 8,080 ratings
|
|
7 |
|
The Art of Deception: Controlling the Human Element of Security
by
3.77 avg rating — 7,204 ratings
|
|
8 |
|
What the Dormouse Said: How the Sixties Counterculture Shaped the Personal Computer Industry
by
3.82 avg rating — 1,145 ratings
|
|
9 |
|
Culture Jamming – Das Manifest der Anti-Werbung
by
3.62 avg rating — 1,809 ratings
|
|
10 |
|
Access All Areas: A User's Guide to the Art of Urban Exploration
by
4.17 avg rating — 335 ratings
|
|
10 |
|
Where Wizards Stay Up Late: The Origins of the Internet
by
3.94 avg rating — 4,882 ratings
|
|
12 |
|
Full Story Inside
by
really liked it 4.00 avg rating — 16 ratings
|
|
12 |
|
Holo.Wars: The Black Hats
by
3.50 avg rating — 6 ratings
|
|
12 |
|
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
by
3.94 avg rating — 323 ratings
|
|
15 |
|
Julian Assange - The Unauthorised Autobiography
by
3.78 avg rating — 962 ratings
|
|
15 |
|
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
by
4.05 avg rating — 154 ratings
|
|
17 |
|
The Accidental Billionaires: The Founding Of Facebook
by
3.59 avg rating — 17,112 ratings
|
|
17 |
|
Black Hat Python: Python Programming for Hackers and Pentesters
by
4.12 avg rating — 605 ratings
|
|
19 |
|
Metasploit: The Penetration Tester's Guide
by
4.07 avg rating — 865 ratings
|
|
20 |
|
Penetration Testing: A Hands-On Introduction to Hacking
by
4.17 avg rating — 388 ratings
|
|
21 |
|
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
by
4.23 avg rating — 1,221 ratings
|
|
22 |
|
Writing Secure Code
by
4.01 avg rating — 373 ratings
|
|
23 |
|
The Hacker Ethic: A Radical Approach to the Philosophy of Business
by
3.75 avg rating — 773 ratings
|
|
23 |
|
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
by
4.17 avg rating — 8,174 ratings
|
|
25 |
|
Nightwork: A History of Hacks and Pranks at Mit
by
3.73 avg rating — 179 ratings
|
|
25 |
|
Hacking: The Art of Exploitation w/CD
by
4.17 avg rating — 2,499 ratings
|
|
27 |
|
Der Phrasenprüfer: Szenen aus dem Leben von Wau Holland, Mitbegründer des Chaos Computer Clubs
by
3.23 avg rating — 13 ratings
|
|
27 |
|
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
by
4.28 avg rating — 15,545 ratings
|
|
29 |
|
iWoz - Computer Geek to Cult Icon: How I Invented the Personal Computer, Co-Founded Apple, and Had Fun Doing It
by
3.85 avg rating — 17,437 ratings
|
|
29 |
|
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
by
4.06 avg rating — 262 ratings
|
|
31 |
|
The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary
by
3.83 avg rating — 4,288 ratings
|
|
31 |
|
Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell
by
4.20 avg rating — 1,759 ratings
|
|
33 |
|
Accidental Empires: How the Boys of Silicon Valley Make Their Millions, Battle Foreign Competition, and Still Can't Get a Date
by
4.03 avg rating — 1,970 ratings
|
|
33 |
|
Future Crimes
by
3.93 avg rating — 4,381 ratings
|
|
35 |
|
Just for Fun: The Story of an Accidental Revolutionary
by
3.97 avg rating — 4,734 ratings
|
|
35 |
|
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
by
3.97 avg rating — 8,043 ratings
|
|
37 |
|
Code: And Other Laws of Cyberspace, Version 2.0
by
3.95 avg rating — 1,700 ratings
|
|
37 |
|
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
by
4.48 avg rating — 606 ratings
|
|
39 |
|
Dealers of Lightning: Xerox PARC and the Dawn of the Computer Age
by
4.13 avg rating — 2,443 ratings
|
|
39 |
|
Chasing Vapor: Exploring the Murky Malice of Cybercrime
by
3.67 avg rating — 3 ratings
|
|
41 |
|
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global
by
4.21 avg rating — 215 ratings
|
|
42 |
|
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
by
4.35 avg rating — 9,749 ratings
|
|
43 |
|
Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat
by
3.82 avg rating — 673 ratings
|
|
44 |
|
The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
by
4.03 avg rating — 801 ratings
|
|
45 |
|
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
by
3.75 avg rating — 2,350 ratings
|
|
46 |
|
Why CISOs Fail: The Missing Link in Security Management--and How to Fix It (Security, Audit and Leadership Series)
by
4.29 avg rating — 14 ratings
|
|
47 |
|
Thinking in Bets: Making Smarter Decisions When You Don't Have All the Facts
by
3.82 avg rating — 22,399 ratings
|
|
48 |
|
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
by
4.19 avg rating — 54 ratings
|
|
49 |
|
Curmudgeon: How to Succeed as an Industry Analyst
by
4.45 avg rating — 11 ratings
|
|
50 |
|
CISO Desk Reference Guide: A Practical Guide for CISOs
by
4.29 avg rating — 28 ratings
|
|
51 |
|
CISO Desk Reference Guide Volume 2: A Practical Guide for CISOs
by
4.53 avg rating — 17 ratings
|
|
52 |
|
Zero Day Threat: The Shocking Truth of How Banks and Credit Bureaus Help Cyber Crooks Steal Your Money and Identity
by
3.50 avg rating — 30 ratings
|
|
53 |
|
Understanding Cybersecurity: Emerging Governance and Strategy
by
4.25 avg rating — 4 ratings
|
|
54 |
|
The Internet of Risky Things: Trusting the Devices That Surround Us
by
really liked it 4.00 avg rating — 20 ratings
|
|
55 |
|
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
by
3.92 avg rating — 12 ratings
|
|
56 |
|
Defensive Security Handbook: Best Practices for Securing Infrastructure
by
3.93 avg rating — 136 ratings
|
|
57 |
|
Cybersecurity: A Business Solution: An executive perspective on managing cyber risk
by
really liked it 4.00 avg rating — 11 ratings
|
|
58 |
|
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
by
3.83 avg rating — 1,096 ratings
|
|
59 |
|
Cybersecurity Dilemma
by
4.21 avg rating — 52 ratings
|
|
60 |
|
Cybersecurity For Dummies
by
3.73 avg rating — 128 ratings
|
|