52 books like Cyber Attacks

By Edward Amoroso,

Here are 52 books that Cyber Attacks fans have personally recommended if you like Cyber Attacks. Shepherd is a community of 9,000+ authors and super readers sharing their favorite books with the world.

Shepherd is reader supported. When you buy books, we may earn an affiliate commission.

Book cover of The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

Rebecca Cantrell Author Of The Girl Who Would Live Forever

From my list on nerds getting into trouble.

Who am I?

I love nerds. I’ve always identified as one and years working in the high-tech world of Silicon Valley made me appreciate their passion, dedication to optimization, and wonderful senses of humor. I once scheduled a meeting with a programmer and afterwards he said “this meeting wasn’t the complete waste of time I expected,” and I took that as a compliment. A lot of books and movies make nerds pretty and shiny and one note. The nerds in these books all rang true to me—they approach difficult situations with logic and humor. They’re complex and compassionate and the kind of people I want to know more about.

Rebecca's book list on nerds getting into trouble

Rebecca Cantrell Why did Rebecca love this book?

A nonfiction book about an actual nerd who stubbornly investigated a 75 cent accounting error and ended up uncovering an international espionage ring during the Cold War. As nerds do. Along the way, he invented many techniques still used in cybersecurity. It ought to be dry, but it’s funny and charming and it perfectly evokes Berkeley in the 1980s. I was a computer operator at Carnegie Mellon and my workday was very similar to Stoll’s. For me this book was a time machine to my early 20s. I could see, hear, and feel every scene. If you ever think that your nerdy obsessions don’t matterthis shows that they do.

By Clifford Stoll,

Why should I read it?

3 authors picked The Cuckoo's Egg as one of their favorite books, and they share why you should read it.

What is this book about?

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name…


Book cover of This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

Jennifer L. Bayuk Author Of Enterprise Security for the Executive: Setting the Tone from the Top

From my list on cybersecurity for every type of reader.

Who am I?

I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.

Jennifer's book list on cybersecurity for every type of reader

Jennifer L. Bayuk Why did Jennifer love this book?

A reporter’s account of nation-states' relentless pursuit of superior offensive capability. Although former NSA officials may not agree with every word, it is generally acknowledged to be a true trail of facts available to reporters. Most cybersecurity staff are routinely muzzled by legal confidentiality agreements in the same manner as staff who have access to business trade secrets. There are few reporters who have had as much access as Perlroth to those individuals. 

By Nicole Perlroth,

Why should I read it?

1 author picked This Is How They Tell Me the World Ends as one of their favorite books, and they share why you should read it.

What is this book about?

THE NEW YORK TIMES BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations)

"Written in the hot, propulsive prose of a spy thriller" (The New York Times), the untold story of the cyberweapons market-the most secretive, government-backed market on earth-and a terrifying first look at a new kind of global warfare.

Zero-day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero-day has the power…


Book cover of Ghost Fleet: A Novel of the Next World War

Jennifer L. Bayuk Author Of Enterprise Security for the Executive: Setting the Tone from the Top

From my list on cybersecurity for every type of reader.

Who am I?

I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.

Jennifer's book list on cybersecurity for every type of reader

Jennifer L. Bayuk Why did Jennifer love this book?

The book portrays a scenario in which nation-state adversaries launch a sophisticated cyberattack against the United States. Though it is science fiction, the political scenario it depicts is a realistic description of how today’s nation-states consider technology options when they are engaged in traditional war. For people interested in cybersecurity and attracted to that genre, it will be an eye-opening experience because the basic scenarios it describes are very easy to project into the near future. It is also a tale of adventure.

By P.W. Singer, August Cole,

Why should I read it?

1 author picked Ghost Fleet as one of their favorite books, and they share why you should read it.

What is this book about?

Ghost Fleet is a page-turning imagining of a war set in the not-too-distant future. Navy captains battle through a modern-day Pearl Harbour; fighter pilots duel with stealthy drones; teenage hackers fight in digital playgrounds; Silicon Valley billionaires mobilise for cyber-war; and a serial killer carries out her own vendetta. Ultimately, victory will depend on who can best blend the lessons of the past with the weapons of the future. But what makes the story even more notable is that every trend and technology in book - no matter how sci-fi it may seem - is real. The debut novel by…


Book cover of Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet

Jennifer L. Bayuk Author Of Enterprise Security for the Executive: Setting the Tone from the Top

From my list on cybersecurity for every type of reader.

Who am I?

I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.

Jennifer's book list on cybersecurity for every type of reader

Jennifer L. Bayuk Why did Jennifer love this book?

It is a reporter’s account of a cybersecurity entrepreneur stumbling into criminal and nation-state level cyberattacks, assisting in the investigation, and ultimately becoming a target. The writing is clear and accessible to the non-technical reader but it still conveys a good sense of what it is like to witness and investigate cyber-crime. It is a suspenseful human drama.

By Joseph Menn,

Why should I read it?

1 author picked Fatal System Error as one of their favorite books, and they share why you should read it.

What is this book about?

In 2004, a California computer whiz named Barrett Lyon uncovered the identity of a hacker running major assaults on business websites. Without fully grasping the repercussions, he set on an investigation that led him into the heart of the Russian mob. Cybercrime was evolving. No longer the domain of small-time thieves, it had been discovered by sophisticated gangs. They began by attacking corporate websites but increasingly stole financial data from consumers and defence secrets from governments. While Barrett investigated the cutting edge of technology crime, the U.S. government struggled to catch up. Britain, however, was a different story. In the…


Book cover of Spymaster's Prism: The Fight Against Russian Aggression

Jim Popkin Author Of Code Name Blue Wren: The True Story of America's Most Dangerous Female Spy--And the Sister She Betrayed

From my list on nonfiction spy books to read in one day.

Who am I?

I covered the FBI and CIA for years, first as a print reporter in Washington and then as the head of the NBC News investigative unit. So I have covered my fair share of spy scandals, and with my colleague Pete Williams helped NBC break the story of Robert Hanssen’s arrest. I was immediately drawn to the Ana Montes Cuba spy story when it broke and then learned that Montes had bought her condo from my close friend and college roommate, John. That meant I had spent hours inside Ana’s DC apartment, and that odd connection rooted me in her story in a deeper way.  

Jim's book list on nonfiction spy books to read in one day

Jim Popkin Why did Jim love this book?

Jack Devine is the former acting director of the CIA’s Directorate of Operations, and ran covert ops that drove the Russians out of Afghanistan. In this book, he shows how the Russians have undermined our democracy for decades and how they’ve now weaponized cyberspace, too. It’s an alarming wake-up call from a true American spymaster. 

I have gotten to know Jack over the years, and have gotten a first-hand glimpse at how clever he must have been running secret operations in some of the world’s scariest neighborhoods. Not a guy to ever underestimate; his books are as fascinating as Jack himself.

By Jack Devine,

Why should I read it?

2 authors picked Spymaster's Prism as one of their favorite books, and they share why you should read it.

What is this book about?

In Spymaster's Prism: The Fight Against Russian Aggression legendary former spymaster Jack Devine aims to ignite public discourse on our country's intelligence and counterintelligence posture against Russia, among other adversaries. Spymasters are not spies - their mission is to run and handle spies and spy networks. They exist in virtually all sophisticated intelligence services around the world, including the more high-profile services like the CIA, SVR, SIS, MSS, VAJA and Mossad. Without exception, these spymasters are highly trained and broadly experienced top-level government officials who are at the heart of the intelligence business. They make the life and death decisions.…


Book cover of Lights Out: A Cyberattack: A Nation Unprepared: Surviving the Aftermath

Christopher J. Lynch Author Of Dark State

From my list on electrical grid vulnerabilities and our survival.

Who am I?

I worked as an industrial electrician for over two decades. At one point during a meeting to discuss an upcoming project, a question was posed about the delivery time of a specific piece of equipment. When the answer was given that it would be about a year away, it got me thinking: what if a specialized piece of equipment—critical to the grid and with an equally long lead time—was destroyed, how would the grid survive? More importantly; how would we survive? That single statement was the spark that ignited the fire in me to learn all about the grid, and to write Dark State.   

Christopher's book list on electrical grid vulnerabilities and our survival

Christopher J. Lynch Why did Christopher love this book?

Lights Out is another great non-fiction book about electrical grid vulnerabilities. Koppel also spotlights High Power Transformers as the Achilles Heel of our electrical system 

But Koppel also does a deep dive on the survivability—or rather lack thereof, of our society if the grid were to be taken down. He even broke down various social classes of people: rural versus urban, and talked about how each group would survive based upon their skillsets and resources available to them. FYI: Ranchers fare best

He even discussed the amazing organization the Mormon Church has put together with regards to the preparedness of each of their members, as well as how they would leverage their collective strengths together as a group.

By Ted Koppel,

Why should I read it?

2 authors picked Lights Out as one of their favorite books, and they share why you should read it.

What is this book about?

NEW YORK TIMES BESTSELLER • Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared.

“Fascinating, frightening, and beyond timely.”—Anderson Cooper

Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and…


Book cover of The Eye of Minds

Randy C. Dockens Author Of Myeem

From my list on science fiction stories of amazing worlds.

Who am I?

I’ve always been fascinated by science fiction and by Biblical Scripture. That may seem dichotomous to some, but not to me. I have a passion for science and for Scripture because both bring understanding about our world from the microcosm to the macrocosm. My writings are a mixture of science and mystery with a science fiction feel and a Christian perspective. I like stories that show how truth arises even from the dark, confusing, and ambiguity of life to help one discover something about God they may not have considered before, and at the same time enjoy a fun, fast-paced, and exciting journey as they read.

Randy's book list on science fiction stories of amazing worlds

Randy C. Dockens Why did Randy love this book?

While not science fiction in the classical sense, it is a story of a different kind of world where virtual reality and reality blur. The main character almost lives in a virtual reality gaming program, but when he is to do something in the real world, he finds he can’t really tell the two apart and that leads to grave consequences.

By James Dashner,

Why should I read it?

2 authors picked The Eye of Minds as one of their favorite books, and they share why you should read it. This book is for kids age 12, 13, 14, and 15.

What is this book about?

From James Dashner, the author of the New York Times bestselling Maze Runner series, comes an edge-of-your seat adventure. The Eye of Minds is the first book in The Mortality Doctrine, a series set in a world of hyper advanced technology, cyberterrorists, and gaming beyond your wildest dreams ...and your worst nightmares. To catch a hacker, you need a hacker. For Michael and the other gamers, the VirtNet can make your wildest fantasies become real. And the more hacking skills you have, the more fun. Who wants to play by the rules anyway? But some rules were made for a…


Book cover of The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

Sean McFate Author Of The New Rules of War: How America Can Win--Against Russia, China, and Other Threats

From my list on mercenaries from a former military contractor.

Who am I?

Dr. Sean McFate is an expert on international relations and a former military contractor. He is a Senior Fellow at the Atlantic Council, a Washington DC think tank, and a professor at Georgetown University's School of Foreign Service, Syracuse University's Maxwell School, and the National Defense University. He began his career as a paratrooper and officer in the U.S. Army's 82nd Airborne Division. 

Sean's book list on mercenaries from a former military contractor

Sean McFate Why did Sean love this book?

There are cyber mercenaries too. Called “hackback” companies, they are illegal, offshore hackers who hack the hackers. While they cannot retrieve hacked material, they can cause a world of hurt for anyone who tries to hack you, and that’s why they matter: deterrence. CEOs and others around the world sometimes turn to hackback firms to make them hard targets. Also, countries like the United Arab Emirates hire former NSA hackers. New York Times reporter details some of this industry in his book about cyberwar. Like many in cyberspace, his claims are often sensationalized, but his reportage cannot be beat.

By David E. Sanger,

Why should I read it?

1 author picked The Perfect Weapon as one of their favorite books, and they share why you should read it.

What is this book about?

From Russia's tampering with the US election to the WannaCry hack that temporarily crippled the NHS, cyber has become the weapon of choice for democracies, dictators, and terrorists.

Cheap to acquire, easily deniable, and used for a variety of malicious purposes - from crippling infrastructure to sowing discord and doubt - cyberweapons are re-writing the rules of warfare. In less than a decade, they have displaced terrorism and nuclear missiles as the biggest immediate threat to international security and to democracy.

Here, New York Times correspondent David E. Sanger takes us from the White House Situation Room to the dens…


Book cover of Turbulent

Alex Apostol Author Of Dead Soil

From my list on zombies with characters other than ex-CIA agents.

Who am I?

I grew up watching the best horror movies of the 80s. My parents put me to bed watching Nightmare on Elm Street and this harbored my passion for a truly scary bedtime story. Zombies became my focus when I was trying to decide what road to take with my own writing. There’s something familiar about them, since they were once humans, but also terrifying. They don’t need to eat or sleep, they never stop, and they’ll just keep coming no matter how much you fight them off. I spent my twenties devouring every zombie book and movie I could and now I'm privileged to be a part of this classic horror genre.

Alex's book list on zombies with characters other than ex-CIA agents

Alex Apostol Why did Alex love this book?

I love thrilling action books, especially zombie ones, that feature a strong female heroine. The more believable they are as an everyday woman and not some CIA agent superhero the better! Turbulent delivered on this and more. I loved the main character and her survival in this post-apocalyptic world was extremely believable. I also loved the twist that technology helped to bring us down because that’s something I have a real fear of, so it made it all the scarier for me. The topping on the rotting cake that tipped this book into my favorites pile was that the story was set in Chicago, near where I live and where most of my books take place as well. It really brought the story home for me (pardon the pun).

By T.L. Payne,

Why should I read it?

1 author picked Turbulent as one of their favorite books, and they share why you should read it.

What is this book about?

In an instant, everything stops. No lights. No phones. No transportation.

When coordinated EMP and Cyber attacks wipe out the nation’s power grid and communications, ultra marathon runner, Maddie Langston, is forced to run for her life.

Stranded in a Chicago airport when the lights go out, Maddie is in a race against time. According to her father, she doesn’t have long before the city descends into chaos. She must leave the airport before it is too late.

Although she knows she must flee the Windy City, Maddie’s first battle is to overcome her fear of the violence she knows…


Book cover of Run Program

Will Hartzell-Baird Author Of The Taste of Cashews

From my list on science fiction for people who enjoy comedy.

Who am I?

In my teenage years, it was sci-fi (and later fantasy) comedies that made me fall in love with reading. There was just something about exploring worlds where anything could happen mixed with the joy of laughter that kept drawing me back in. Naturally, in the many...many...years that followed, I've read countless novels from a wide variety of genres, but sci-fi comedy will always hold a special place in my heart.

Will's book list on science fiction for people who enjoy comedy

Will Hartzell-Baird Why did Will love this book?

Is it even a list of sci-fi books if you don’t include a story with a rogue artificial intelligence? Sure, it’s not necessarily the funniest premise, but when you throw in the fact that the A.I. in question has the mind of a six-year-old, the heroes trying to catch him are essentially his daycare providers, and the author is Scott Meyer, creator of the webcomic Basic Instructions and the Magic 2.0 series, and you’re sure to have a good time.

By Scott Meyer,

Why should I read it?

1 author picked Run Program as one of their favorite books, and they share why you should read it.

What is this book about?

From the author of the popular Magic 2.0 series comes the witty tale of a mischievous A.I. gone rogue.

Al, a well-meaning but impish artificial intelligence, has the mind of a six-year-old and a penchant for tantrums. And the first one to discover just how much trouble Al could cause is Hope Takeda, the lab assistant in charge of educating and socializing him. Day care is a lot more difficult when your kid is an evolving and easily frightened A.I.

When Al manages to access the Internet and escape the lab days before his official unveiling, Hope and her team…


5 book lists we think you will like!

Interested in national security, computer security, and survival?

9,000+ authors have recommended their favorite books and what they love about them. Browse their picks for the best books about national security, computer security, and survival.

National Security Explore 20 books about national security
Computer Security Explore 23 books about computer security
Survival Explore 186 books about survival