36 books like Cult of the Dead Cow

By Joseph Menn,

Here are 36 books that Cult of the Dead Cow fans have personally recommended if you like Cult of the Dead Cow. Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.

When you buy books, we may earn a commission that helps keep our lights on (or join the rebellion as a member).

Book cover of The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

George Finney Author Of Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

From my list on books on cybersecurity that anyone can understand.

Why am I passionate about this?

I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.

George's book list on books on cybersecurity that anyone can understand

George Finney Why did George love this book?

The first person to ever catch a hacker wasn’t an FBI or CIA agent. It was an astronomer, and his name was Clifford Stoll. This book is a biographical account of how he took on a German hacker who was selling secrets to the KGB in the 1980s. I love this book because it shows how anyone can play a role in cybersecurity.

As a kid, I watched the TV adaptation of the book for PBS’s NOVA program and went into cybersecurity in large part because of Stoll. Because cybersecurity wasn’t a profession at the time, Stoll created his own innovative techniques, like building the first computer honeypot to help catch the hacker in action. When his book was made into a PBS documentary, as a thank you for putting up with him and all the crazy things he had to do to track the hacker, he had all of…

By Clifford Stoll,

Why should I read it?

4 authors picked The Cuckoo's Egg as one of their favorite books, and they share why you should read it.

What is this book about?

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name…


Book cover of The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win

George Finney Author Of Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

From my list on books on cybersecurity that anyone can understand.

Why am I passionate about this?

I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.

George's book list on books on cybersecurity that anyone can understand

George Finney Why did George love this book?

This book was one of the biggest inspirations for me when I wrote my book.

Running a team of technology experts is really hard, so instead of writing a reference manual or an inspirational leadership memoir, Kim tells the story of a group of people who work together to learn the same best practices that have been in use for decades in the manufacturing and project management industries.

This hits close to home since I can recognize myself and many of my colleagues in each of the vivid characters.

By Gene Kim, Kevin Behr, George Spafford

Why should I read it?

2 authors picked The Phoenix Project as one of their favorite books, and they share why you should read it.

What is this book about?

***Over a half-million sold! And available now, the Wall Street Journal Bestselling sequel The Unicorn Project***

"Every person involved in a failed IT project should be forced to read this book."-TIM O'REILLY, Founder & CEO of O'Reilly Media

"The Phoenix Project is a must read for business and IT executives who are struggling with the growing complexity of IT."-JIM WHITEHURST, President and CEO, Red Hat, Inc.

Five years after this sleeper hit took on the world of IT and flipped it on it's head, the 5th Anniversary Edition of The Phoenix Project continues to guide IT in the DevOps revolution.…


Book cover of Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

George Finney Author Of Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

From my list on books on cybersecurity that anyone can understand.

Why am I passionate about this?

I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.

George's book list on books on cybersecurity that anyone can understand

George Finney Why did George love this book?

This isn’t just the story of the first cyberweapon ever launched by one country against another; it’s actually two detective stories woven together.

I loved how Zetter blends the stories of the cybersecurity companies trying to figure out how it was discovered and what the cyberweapon did, together with the efforts of the International Atomic Energy Agency to track down the weird anomalies popping up in Iran’s nuclear program.

This book is a lot like The Godfather in terms of storytelling. You don’t need to know what a “Zero Day” is to get something out of it.

By Kim Zetter,

Why should I read it?

1 author picked Countdown to Zero Day as one of their favorite books, and they share why you should read it.

What is this book about?

A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. 

“Immensely enjoyable . . . Zetter turns a complicated and technical cyber story into an engrossing whodunit.”—The Washington Post
 
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm…


Book cover of Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

George Finney Author Of Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

From my list on books on cybersecurity that anyone can understand.

Why am I passionate about this?

I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.

George's book list on books on cybersecurity that anyone can understand

George Finney Why did George love this book?

Ever wondered what Russian hackers have been up to over the last few years? I found this a really sobering read, but at the same time, I loved hearing the stories of the people who work so hard to keep us safe.

Hackers are usually pretty big nerds, so it’s not really surprising that the title of this book comes from how cybercriminals embedded references to Frank Herbert’s book Dune into the code they used to carry out cyberattacks against Ukraine and other countries.

By Andy Greenberg,

Why should I read it?

1 author picked Sandworm as one of their favorite books, and they share why you should read it.

What is this book about?

"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy

The true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times).

In 2014, the world witnessed the start of a…


Book cover of We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency

Jeremy N. Smith Author Of Breaking and Entering: The Extraordinary Story of a Hacker Called Alien

From my list on hackers and hacking.

Why am I passionate about this?

Jeremy N. Smith is the author of three acclaimed narrative non-fiction books, including Breaking and Entering, about a female hacker called “Alien” and the birth of our information insecurity age. He has written for The Atlantic, Discover, Slate, and the New York Times, among other outlets, and he and his work have been featured by CNN, NPR, NBC Nightly News, The Today Show, and Wired. He hosts The Hacker Next Door podcast and lives in Missoula, Montana.

Jeremy's book list on hackers and hacking

Jeremy N. Smith Why did Jeremy love this book?

We Are Anonymous, along with Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous by Gabriella Coleman, explores the politics and personalities of the best-known real-world hacktivist group, Anonymous, how it rose to prominence and power, its impact and influence, and the government machinations that ultimately turned members against each other. Its pages reveal hackers at their most human—brilliant, idealistic, vulnerable, and conflicted.

By Parmy Olson,

Why should I read it?

1 author picked We Are Anonymous as one of their favorite books, and they share why you should read it.

What is this book about?

A thrilling, exclusive exposè of the hacker collectives Anonymous and LulzSec.

We Are Anonymous is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds -- and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec.

In late 2010, thousands of hacktivists joined a mass digital…


Book cover of Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous

Gareth Southwell Author Of MUNKi

From my list on why we should rise up against our robot overlords.

Why am I passionate about this?

I’m a philosopher, writer, and illustrator from Wales, UK. I grew up on ’70s sci-fi—Star Wars (the original trilogy!), Battlestar Galactica (the original series!), The Black Hole (Remember that?! No? Oh well…). Space travel, flying cars, sassy computers you could banter with, cute robots who would be your best friend—it was a time when the future seemed just around the corner. But now, as these things finally start to arrive, I feel I’ve been mis-sold. Data theft? Mass surveillance? Killer drones? Election manipulation? Social media bot farms? This isn’t the future I signed up for! Or maybe I should have read the terms and conditions…

Gareth's book list on why we should rise up against our robot overlords

Gareth Southwell Why did Gareth love this book?

The Luddites supposedly got their name from their shadowy founder, a certain Ned Ludd, who was apparently the first to take a hammer to the instruments of industrial progress. As such, his name became a sort of protective disguise for the purposes of anonymous protest: Who smashed the loom? “Ned Ludd did it!” In a similar way, computer hackers such as Anonymous have adopted the Guy Fawkes mask as an emblem of disruption, pranking, and activism. In this fascinating study, anthropologist Gabriella Coleman investigates Anonymous, tracing its origins from the message boards of 4chan, through the Occupy movement and the Wikileaks controversy, revealing firsthand through her interaction with the community the diversity and complexity of the hacking world, and the varying motives of its actors.

By Gabriella Coleman,

Why should I read it?

1 author picked Hacker, Hoaxer, Whistleblower, Spy as one of their favorite books, and they share why you should read it.

What is this book about?

Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name Anonymous, by the writer the Huffington Post says "knows all of Anonymous' deepest, darkest secrets." Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely connected to Anonymous that the tricky story…


Book cover of The Code

William Fietzer Author Of Metadata Murders

From my list on technothrillers with a cyber-security protagonist.

Why am I passionate about this?

I’ve been fascinated by the potential of the Internet ever since I chaired the Metadata subcommittee for the American Library Association. Here was a device capable of benefiting lives or destroying mankind simultaneously. Particularly intriguing was its almost supernatural ability to accomplish these ends as if we were gods beyond the realms of morality or accountability. I’m not a very spiritual person, but such potential calls out for revising our old worldviews and/or exploring new ways of coping with our burgeoning technical prowess and moral responsibilities. Dealing with these conflicts is what I write about and what stories from other authors I recommend to readers.

William's book list on technothrillers with a cyber-security protagonist

William Fietzer Why did William love this book?

The plot twist at the beginning delighted me. Anti-heroine and computer hacker Nina Walker plays Robin Hood on behalf of her grandmother and pays the price—a mysterious man named Carter kidnaps and forces her to return the money she stole to the other unpaid claimants. But Carter, too, has been blackmailed by the gangster Dante to retrieve the funds and has other personal motivations for dealing with him.

This twist sets up unique moral dilemmas for both characters. Though needing each other to survive, each must decide whether their growing attraction for each other outweighs their family bonds. It is a fine thriller that operates on several levels; my sole reservation is how the book’s character descriptions provide only shadowy outlines instead of fully-fleshed individuals.

By Brooke Sivendra,

Why should I read it?

1 author picked The Code as one of their favorite books, and they share why you should read it.

What is this book about?

Look over your shoulder, you’re not alone…

When Nina's disabled grandmother’s insurance company refuses to pay for a recent hospital admission, the determined IT assistant decides she’ll teach them a lesson. Nina hacks their system, steals their data, and demands a ransom. Upon payment, she distributes the money to their customers—people like her grandmother who need it to survive. But not everyone sees her as a modern-day Robin Hood. Despite good intentions, her actions are...well, illegal.

Carter’s life—and career—is built on secrets that haunt him while he sleeps. Carter wants to leave it all behind him, but when his brother…


Book cover of Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Jeremy N. Smith Author Of Breaking and Entering: The Extraordinary Story of a Hacker Called Alien

From my list on hackers and hacking.

Why am I passionate about this?

Jeremy N. Smith is the author of three acclaimed narrative non-fiction books, including Breaking and Entering, about a female hacker called “Alien” and the birth of our information insecurity age. He has written for The Atlantic, Discover, Slate, and the New York Times, among other outlets, and he and his work have been featured by CNN, NPR, NBC Nightly News, The Today Show, and Wired. He hosts The Hacker Next Door podcast and lives in Missoula, Montana.

Jeremy's book list on hackers and hacking

Jeremy N. Smith Why did Jeremy love this book?

A famous hacker’s real-life story, told from his own perspective, Ghost in the Wires explains how criminal hackers think and act and the diverse techniques they use, no keyboard necessary—all, in this case, with little motive beyond a compulsion to explore and exploit. The hacking community has no bigger characters than Kevin Mitnick and no better first-person accounts of the art of “social engineering,” or human hacking—manipulating people (including, in Mitnick’s case, the FBI and other would-be pursuers) to your own advantage.

By Kevin Mitnick, William L. Simon,

Why should I read it?

1 author picked Ghost in the Wires as one of their favorite books, and they share why you should read it.

What is this book about?

In this "intriguing, insightful and extremely educational" novel, the world's most famous hacker teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data (Frank W. Abagnale).

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies -- and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI's net finally began to tighten, Mitnick went on the run, engaging in an increasingly sophisticated game of hide-and-seek that escalated…


Book cover of Software Security: Building Security in

Nancy R. Mead Author Of Cyber Security Engineering: A Practical Approach for Systems and Software Assurance

From my list on software security engineering.

Why am I passionate about this?

As a kid, I used to do all the math problems in my textbooks just for fun, even if they weren’t part of a homework assignment. My grandchildren cringe when I tell them this. I am a researcher and educator in secure software engineering and have enjoyed a productive career in software development and management, software engineering and software security research, and software and secure software engineering education.  

Nancy's book list on software security engineering

Nancy R. Mead Why did Nancy love this book?

Gary McGraw has been an advocate for the importance of developing secure software during the more than 15 years that I have known him, and before that! He has written a number of books, but this one captures his philosophy on how to develop secure software. It’s an excellent resource for practitioners and management.

By Gary McGraw,

Why should I read it?

1 author picked Software Security as one of their favorite books, and they share why you should read it.

What is this book about?

"When it comes to software security, the devil is in the details. This book tackles the details."
--Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies



"McGraw's book shows you how to make the 'culture of security' part of your development lifecycle."
--Howard A. Schmidt, Former White House Cyber Security Advisor



"McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn't), buy this book and post it up on the lunchroom wall."
--Avi Rubin, Director of the NSF…


Book cover of Cybersecurity Is Everybody's Business: Solve the Security Puzzle for Your Small Business and Home

Eric J. Rzeszut Author Of 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

From my list on to help you protect your personal information.

Why am I passionate about this?

I have been an information technology and cybersecurity professional for over two decades. I’ve learned over and over again that “people are the weakest link.” You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via “social engineering” – to trick a human being into giving you the access you need, rather than trying to hack the system itself. The books on this list will help the reader lower their chances of being exploited like this.

Eric's book list on to help you protect your personal information

Eric J. Rzeszut Why did Eric love this book?

Cybersecurity is Everybody’s Business is a great book that focuses not only on the how to keep your data safe, but on the very critical why this is important. Author Scott Schober suffered a grievous cyberattack in a previous business, and he brings his experience to the forefront in this guide. Joined by his brother as co-author, they focus on cybersecurity for the home and small business – environments that are unlikely to employ full-time cybersecurity professionals. (That’s why these places are often targets for the bad guys!)

By Scott N. Schober, Craig W. Schober,

Why should I read it?

1 author picked Cybersecurity Is Everybody's Business as one of their favorite books, and they share why you should read it.

What is this book about?

Since publication of his first book, HACKED AGAIN, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes. Now joined by his brother Craig, the two have set their sights on the biggest target of all, small businesses.

There are 30 million small businesses currently operating in the United States. Some of them are single owner/operated while others collectively employ hundreds of millions. This book is for all of them and anyone who makes it their business to stay safe…


Book cover of The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Book cover of The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win
Book cover of Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

Share your top 3 reads of 2024!

And get a beautiful page showing off your 3 favorite reads.

1,187

readers submitted
so far, will you?

5 book lists we think you will like!

Interested in computer security, cyber crimes, and hackers?

Cyber Crimes 14 books
Hackers 15 books