Here are 57 books that Click Here to Kill Everybody fans have personally recommended if you like
Click Here to Kill Everybody.
Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.
Researching DevilsGame, about an Internet meltdown caused by an unknown evil, I exposed myself to some harrowing truths. I learned how astonishingly frail our internet ecosystem is and how imperiled it is by bad actors who have burrowed deeply and often invisibly into its infrastructure. So, beyond writing a fictional thriller, I was moved to ring a warning bell! And I hope by formatting DevilsGame as âhyperlinked fiction,â mixing real news sites with fictional sites created for the novel, readers will experience the story in a way that parallels and parodies the way we experience real, live crises these days: navigating from fact to fiction, often without observing the boundaries.
The most philosophical of my recommendations, I found this book wonderfully heartening because it places the responsibility for understanding and responding to the negative impacts of our internet-driven era firmly in our own hands.
Ward made me realize that I am (along with the multitudes!) a victim of âthe Loop, â which is when our unconscious tendencies feed into the business and cultural forces working hard and happily âto convince us weâre making independent choices when weâre doing the opposite.â
I was grateful for Ward's suggestions for becoming self-aware and freeing ourselvesâand our futuresâfrom the âshrinking choicesâ imposed by the Loop.
"The best book I have ever read about AI." -Roger McNamee, New York Times bestselling author of Zucked Artificial intelligence is going to change the world as we know it. But the real danger isn't some robot that's going to enslave us: It's our own brain. Our brains are constantly making decisions using shortcuts, biases, and hidden processes-and we're using those same techniques to create technology that makes choices for us. In The Loop, award-winning science journalist Jacob Ward reveals how we are poised to build all of our worst instincts into our AIs, creating a narrow loop where eachâŚ
Researching DevilsGame, about an Internet meltdown caused by an unknown evil, I exposed myself to some harrowing truths. I learned how astonishingly frail our internet ecosystem is and how imperiled it is by bad actors who have burrowed deeply and often invisibly into its infrastructure. So, beyond writing a fictional thriller, I was moved to ring a warning bell! And I hope by formatting DevilsGame as âhyperlinked fiction,â mixing real news sites with fictional sites created for the novel, readers will experience the story in a way that parallels and parodies the way we experience real, live crises these days: navigating from fact to fiction, often without observing the boundaries.
I found myself catching my breath as I read this riveting nonfiction tale chronicling "perhaps the first true, wide-scale cyberwar in history,â launched by the hacker group now known as Sandworm.
I was thrilled to be swept along on the high-stakes hunt for an âinvisible forceâŚ.striking out from an unknown origin to sabotage, on a massive scale, the technologies that underpin civilization,â and I was gratified by the meticulous tracing, tracking, and revelation of the Russian villains of Sandworm.
"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." âAnne Applebaum, bestselling author of Twilight of Democracy
The true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times).
Researching DevilsGame, about an Internet meltdown caused by an unknown evil, I exposed myself to some harrowing truths. I learned how astonishingly frail our internet ecosystem is and how imperiled it is by bad actors who have burrowed deeply and often invisibly into its infrastructure. So, beyond writing a fictional thriller, I was moved to ring a warning bell! And I hope by formatting DevilsGame as âhyperlinked fiction,â mixing real news sites with fictional sites created for the novel, readers will experience the story in a way that parallels and parodies the way we experience real, live crises these days: navigating from fact to fiction, often without observing the boundaries.
I was impressed by the way author Auerbach distills what has changed in our relationship with the internet over the past 20 years: there has been a gradual but momentous shift from âsearchâ on the webâ to ârecommendationsâ offered by the web. Initially, we searched for what we were interested inâbut now, networks tell us what we are interested in!
Auerbach defines the meganet as that ânew creatureâŚborn [to] manage the data boom and absorb, filter, and recommend it,â and I was sobered by his graphic warning of the dangers that emerge from âoff-loading our decision-makingâ to the internet.
How the autonomous digital forces jolting our lives - as uncontrollable as the weather and plate tectonics - are transforming life, society, culture, and politics.
David Auerbach's exploration of the phenomenon he has identified as the meganet begins with a simple, startling revelation: There is no hand on the tiller of some of the largest global digital forces that influence our daily lives: from corporate sites such as Facebook, Amazon, Google, YouTube, Instagram, and Reddit to the burgeoning metaverse encompassing cryptocurrencies and online gaming to government systems such as China's Social Credit System and India's Aadhaar.
Tap Dancing on Everest, part coming-of-age memoir, part true-survival adventure story, is about a young medical student, the daughter of a Holocaust survivor raised in N.Y.C., who battles self-doubt to serve as the doctorâand only womanâon a remote Everest climb in Tibet.
Researching DevilsGame, about an Internet meltdown caused by an unknown evil, I exposed myself to some harrowing truths. I learned how astonishingly frail our internet ecosystem is and how imperiled it is by bad actors who have burrowed deeply and often invisibly into its infrastructure. So, beyond writing a fictional thriller, I was moved to ring a warning bell! And I hope by formatting DevilsGame as âhyperlinked fiction,â mixing real news sites with fictional sites created for the novel, readers will experience the story in a way that parallels and parodies the way we experience real, live crises these days: navigating from fact to fiction, often without observing the boundaries.
I was stunned by the authors' dire and dramatic warning that the interests and methods of two mighty authoritarian regimesâChina and Russiaâare increasingly coming into alignment, and this alignment is spawning increasingly deadly threats to, and attacks on, the very foundations of our democracy and national security.
I found myself agreeing as the authors demonstrate how the United States government is failing to fully acknowledge and effectively respond to these massive threatsâbut I was also somewhat encouraged, as they do offer solutions and provide a ray of hope that we can restructure our approach to Chinese and Russian threats by streamlining our bureaucratic agencies and purpose-building them to directly confront them.
The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain and corporate email servers, malicious cyber activities have reached an all-time high. Russia attracts the most attention, but China is vastly more sophisticated. They have a common interest in exploiting the openness of the Internet and social mediaâand our democracyâto erode confidence in our institutions and to exacerbate our societal rifts to prevent us from mounting an effective response. Halting this digital aggression will require Americans to undertake sweeping changes in how we educate, organizeâŚ
I have been an information technology and cybersecurity professional for over two decades. Iâve learned over and over again that âpeople are the weakest link.â You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via âsocial engineeringâ â to trick a human being into giving you the access you need, rather than trying to hack the systemitself. The books on this list will help the reader lower their chances of being exploited like this.
Kevin Mitnick is often called the âworldâs most famous hacker,â and he spent years in prison for his crimes. However, heâs since reformed, and now advises individuals and corporations on how to protect their data. In this book, he talks about strategies that we can all use to better protect our data from exploitation by corporations and governments. Although itâs never possible to be truly âinvisibleâ (despite the title of his book) he presents some great strategies to lower your risk profile.
Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, andâŚ
As a kid, I used to do all the math problems in my textbooks just for fun, even if they werenât part of a homework assignment. My grandchildren cringe when I tell them this. I am a researcher and educator in secure software engineering and have enjoyed a productive career in software development and management, software engineering and software security research, and software and secure software engineering education.
This book is a âhow-toâ guide for teams developing secure software. Written by a team of experts, it covers the important issues in developing software that is better able to prevent successful attacks. The book contains many references, a strategy, and an implementation guide with cross-references. For each topic, the maturity of practice at the time of writing is provided, as well as an indication of the audience.
"This book's broad overview can help an organization choose a set of processes, policies, and techniques that are appropriate for its security maturity, risk tolerance, and development style. This book will help you understand how to incorporate practical security techniques into all phases of the development lifecycle."
-Steve Riley, senior security strategist, Microsoft Corporation
"There are books written on some of the topics addressed in this book, and there are other books on secure systems engineering. Few address the entire life cycle with a comprehensive overview and discussion of emerging trends and topics as well as this one."
I canât explain my lifelong fascination with the strange dance between culture, power, and technology. Maybe itâs because I grew up as a math whiz with a deep love of music or because I read too much sci-fi under my blanket by flashlight when I should have been getting my beauty sleep. I was lucky to become friends with Jesse Gilbert at the age of 14 - we goaded each other into spending our lives researching, writing about, and playing with tech in a cultural context. We wrote this book together as a way to bring our decades-long dialogue into the public eye and invite a wider range of people to participate in the conversation.
Full disclosure: Laura DeNardis is a good friend and former colleague of mine. But I was a fan before I was a friend, and thus far, The Internet In Everything is her crowning achievement, so I feel very comfortable listing it here as an absolute must-read.
When Laura told me she was going to write this book, my first thought was, âI wish Iâd thought of that!â and my second thought, a nanosecond later, was, âThank goodness I didnât because sheâll do it a million times better.â
DeNardis is the reigning monarch of Internet Governance Studies, meaning she researches all the weird laws, policies, technologies, businesses, agencies, and practices that have built the internet and keep it ticking. Youâd think the subject would be boring or impenetrable to us mere mortals, but her genius is in making it not only understandable but downright fascinating.
A compelling argument that the Internet of things threatens human rights and security
"Sobering and important."-Financial Times, "Best Books of 2020: Technology"
The Internet has leapt from human-facing display screens into the material objects all around us. In this so-called Internet of things-connecting everything from cars to cardiac monitors to home appliances-there is no longer a meaningful distinction between physical and virtual worlds. Everything is connected. The social and economic benefits are tremendous, but there is a downside: an outage in cyberspace can result not only in loss of communication but also potentially in loss of life.
Being able to understand and change reality through our knowledge and skill is literal magic. Weâre building systems with so many exciting and unexpected properties that can be exploited and repurposed for both good and evil. I want to keep some of that magic and help people engineer â build great systems that make peopleâs lives better. Iâve been securing (and breaking) systems, from operating rooms to spaceships, from banks to self-driving cars for over 25 years. The biggest lesson Iâve learned is that if security is not infused from the start, weâre forced to rely on what ought to be our last lines of defense. This list helps you infuse security into your systems.
When I worked in application security at Microsoft, we still had products that shipped every few years. I learned to scale application security in that world, but many people live in a different world now. AAS helped me understand which of our approaches translated well, which had to be transformed, and which needed to be discarded or replaced. I regularly refer back to it, even a few years later.
Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of agile development. To help bridge the divide between these two worlds, this practical guide introduces several security tools and techniques adapted specifically to integrate with agile development.
Written by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences withâŚ
Iâve been playing with computers and electronics since childhood. I even supported the people in my village with their computer issues back then. During my studies in electrical engineering, I learned how to solve technical challenges with structured approaches. At this time, I became fascinated by topics like cryptography and embedded system security. The books on this list helped me understand important concepts and practical real-world obstacles. I hope they are also of value to you!
I love thinking about potential vulnerabilities and threat scenarios in IoT devices, because they are everywhere and they have already gained a significant amount of power.
Practical IoT Hacking is a wonderful read that stimulates my imagination about how to tackle devices and systems, but it doesnât stop there: it even addresses the practical security analysis needs of my students and me.
Geared towards security researchers, IT teams, and penetration testers, application testers, developers, and IT administrators, this book teaches readers how to get started with hacking Internet connected devices. Readers dig deep into technical (and related legal) issues, as they learn what kinds of devices to use as hacking tools and which make the best targets. The authors, all experts in the field, cover the kinds of vulnerabilities found in IoT devices, explain how to exploit their network protocols, and how to leverage security flaws and certain hardware interfaces found in the physical devices themselves.
With Franklin Rooseveltâs death in April 1945, Vice President Harry Truman and Senator Arthur Vandenberg, the Republican leader on foreign policy, inherited a world in turmoil. With Europe flattened and the Soviets emerging as Americaâs new adversary, Truman and Vandenberg built a tight, bipartisan partnership at a bitterly partisan timeâŚ
I love a good, clean mystery/suspense story that's light enough to be escape fiction but has enough heart that I engage with the characters. Let me root for them and watch them grow. Give me hope and a happy ending. Bonus if there are some quirky ones who make me smile or some snappy dialogue. Double bonus if it's Christian fiction with an organic, non-preachy faith element and characters who grow spiritually. Why leave faith out of our fiction if it's part of our lives? I hope you'll make some new imaginary friends in the books I've listed!
I held my breath for some of Desiree's daring cat-burglar-type acts. I found this one a fun, fast ride, but again, the character makes it work for me. I love how, in the middle of her drive to do the right thing, Desiree is real enough to have self-doubts and struggle with applying faith to life.
Her sense of humor adds that little extra to satisfy me, and I like the attraction that grows between her and the FBI agent who appears at the most inconvenient times.
Surrounded by no good options, much less safe ones, Desiree Jacobs knows that no matter what she must protect her father's reputation and his legacy.
If Desiree Jacobs knows anything, itâs art. Her father, whose security company is internationally renowned, taught her everything he knew. Most of all, he taught her about honor. Integrity. Faith. So surely God will forgive her for despising the one man--Special Agent Tony Lucano, who's determined to destroy her fatherâs good name?
Agent Lucano knows that Hiram Jacobs is an art thief. But what he canât figure out is Desiree. Is she an innocent victimâŚorâŚ