Here are 61 books that Cyber Attacks fans have personally recommended if you like
Cyber Attacks.
Shepherd is a community of 11,000+ authors and super readers sharing their favorite books with the world.
Shepherd is reader supported. When you buy books, we may earn an affiliate commission.
I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.
The first person to ever catch a hacker wasn’t an FBI or CIA agent. It was an astronomer, and his name was Clifford Stoll. This book is a biographical account of how he took on a German hacker who was selling secrets to the KGB in the 1980s. I love this book because it shows how anyone can play a role in cybersecurity.
As a kid, I watched the TV adaptation of the book for PBS’s NOVA program and went into cybersecurity in large part because of Stoll. Because cybersecurity wasn’t a profession at the time, Stoll created his own innovative techniques, like building the first computer honeypot to help catch the hacker in action. When his book was made into a PBS documentary, as a thank you for putting up with him and all the crazy things he had to do to track the hacker, he had all of…
Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name…
I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.
A reporter’s account of nation-states' relentless pursuit of superior offensive capability. Although former NSA officials may not agree with every word, it is generally acknowledged to be a true trail of facts available to reporters. Most cybersecurity staff are routinely muzzled by legal confidentiality agreements in the same manner as staff who have access to business trade secrets. There are few reporters who have had as much access as Perlroth to those individuals.
THE NEW YORK TIMES BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations)
"Written in the hot, propulsive prose of a spy thriller" (The New York Times), the untold story of the cyberweapons market-the most secretive, government-backed market on earth-and a terrifying first look at a new kind of global warfare.
Zero-day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero-day has the power…
I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.
The book portrays a scenario in which nation-state adversaries launch a sophisticated cyberattack against the United States.Though it is science fiction, the political scenario it depicts is a realistic description of how today’s nation-states consider technology options when they are engaged in traditional war. For people interested in cybersecurity and attracted to that genre, it will be an eye-opening experience because the basic scenarios it describes are very easy to project into the near future. It is also a tale of adventure.
Ghost Fleet is a page-turning imagining of a war set in the not-too-distant future. Navy captains battle through a modern-day Pearl Harbour; fighter pilots duel with stealthy drones; teenage hackers fight in digital playgrounds; Silicon Valley billionaires mobilise for cyber-war; and a serial killer carries out her own vendetta. Ultimately, victory will depend on who can best blend the lessons of the past with the weapons of the future. But what makes the story even more notable is that every trend and technology in book - no matter how sci-fi it may seem - is real. The debut novel by…
I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.
It is a reporter’s account of a cybersecurity entrepreneur stumbling into criminal and nation-state level cyberattacks, assisting in the investigation, and ultimately becoming a target. The writing is clear and accessible to the non-technical reader but it still conveys a good sense of what it is like to witness and investigate cyber-crime. It is a suspenseful human drama.
In 2004, a California computer whiz named Barrett Lyon uncovered the identity of a hacker running major assaults on business websites. Without fully grasping the repercussions, he set on an investigation that led him into the heart of the Russian mob. Cybercrime was evolving. No longer the domain of small-time thieves, it had been discovered by sophisticated gangs. They began by attacking corporate websites but increasingly stole financial data from consumers and defence secrets from governments. While Barrett investigated the cutting edge of technology crime, the U.S. government struggled to catch up. Britain, however, was a different story. In the…
I worked as an industrial electrician for over two decades. At one point during a meeting to discuss an upcoming project, a question was posed about the delivery time of a specific piece of equipment. When the answer was given that it would be about a year away, it got me thinking: what if a specialized piece of equipment—critical to the grid and with an equally long lead time—was destroyed, how would the grid survive? More importantly; how would we survive? That single statement was the spark that ignited the fire in me to learn all about the grid, and to write Dark State.
Lights Out is another great non-fiction book about electrical grid vulnerabilities. Koppel also spotlights High Power Transformers as the Achilles Heel of our electrical system
But Koppel also does a deep dive on the survivability—or rather lack thereof, of our society if the grid were to be taken down. He even broke down various social classes of people: rural versus urban, and talked about how each group would survive based upon their skillsets and resources available to them. FYI: Ranchers fare best
He even discussed the amazing organization the Mormon Church has put together with regards to the preparedness of each of their members, as well as how they would leverage their collective strengths together as a group.
NEW YORK TIMES BESTSELLER • Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared.
“Fascinating, frightening, and beyond timely.”—Anderson Cooper
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and…
Dr. Sean McFate is an expert on international relations and a former military contractor. He is a Senior Fellow at the Atlantic Council, a Washington DC think tank, and a professor at Georgetown University's School of Foreign Service, Syracuse University's Maxwell School, and the National Defense University. He began his career as a paratrooper and officer in the U.S. Army's 82nd Airborne Division.
There are cyber mercenaries too. Called “hackback” companies, they are illegal, offshore hackers who hack the hackers. While they cannot retrieve hacked material, they can cause a world of hurt for anyone who tries to hack you, and that’s why they matter: deterrence. CEOs and others around the world sometimes turn to hackback firms to make them hard targets. Also, countries like the United Arab Emirates hire former NSA hackers. New York Times reporter details some of this industry in his book about cyberwar. Like many in cyberspace, his claims are often sensationalized, but his reportage cannot be beat.
From Russia's tampering with the US election to the WannaCry hack that temporarily crippled the NHS, cyber has become the weapon of choice for democracies, dictators, and terrorists.
Cheap to acquire, easily deniable, and used for a variety of malicious purposes - from crippling infrastructure to sowing discord and doubt - cyberweapons are re-writing the rules of warfare. In less than a decade, they have displaced terrorism and nuclear missiles as the biggest immediate threat to international security and to democracy.
Here, New York Times correspondent David E. Sanger takes us from the White House Situation Room to the dens…
I covered the FBI and CIA for years, first as a print reporter in Washington and then as the head of the NBC News investigative unit. So I have covered my fair share of spy scandals, and with my colleague Pete Williams helped NBC break the story of Robert Hanssen’s arrest. I was immediately drawn to the Ana Montes Cuba spy story when it broke and then learned that Montes had bought her condo from my close friend and college roommate, John. That meant I had spent hours inside Ana’s DC apartment, and that odd connection rooted me in her story in a deeper way.
Jack Devine is the former acting director of the CIA’s Directorate of Operations, and ran covert ops that drove the Russians out of Afghanistan. In this book, he shows how the Russians have undermined our democracy for decades and how they’ve now weaponized cyberspace, too. It’s an alarming wake-up call from a true American spymaster.
I have gotten to know Jack over the years, and have gotten a first-hand glimpseat how clever he must have been running secret operations in some of the world’s scariest neighborhoods. Not a guy to ever underestimate; his books are as fascinating as Jack himself.
In Spymaster's Prism: The Fight Against Russian Aggression legendary former spymaster Jack Devine aims to ignite public discourse on our country's intelligence and counterintelligence posture against Russia, among other adversaries. Spymasters are not spies - their mission is to run and handle spies and spy networks. They exist in virtually all sophisticated intelligence services around the world, including the more high-profile services like the CIA, SVR, SIS, MSS, VAJA and Mossad. Without exception, these spymasters are highly trained and broadly experienced top-level government officials who are at the heart of the intelligence business. They make the life and death decisions.…
The sci-fi/fantasy/crime genre is probably one I’ve known the least about, and I only really started to dive down the rabbit hole when I began writing my series. I’m glad I did. The world-building and lore that is woven into this genre truly sets it apart from the usual stuff. On top of needing an intricate technological imagination that has some grounding in the real world, these kinds of books also need to have characters that are believable and a narrative that is not so futuristic that it strains credulity. It’s a tough mix to get right, but when I find a story that nails these aspects it really immerses me into the world and narrative like nothing else.
Where to start with this one? It is probably considered one of the original titles that brought in the cyberpunk genre and takes you on a wild ride.
What I liked best about this series is the way it delves into the concepts of a soul (a ghost) and whether people who have become cyborg or with a cyborg brain are indeed still human. At what point does the line between human and android overlap?
These greater philosophical questions are brilliantly intertwined with political intrigue, espionage, terrorism, and murder. Plus the main character is a badass sexy cyborg and pro hacker that likes to shoot guns, kick people and drive really fast. What’s not to love?
Deep into the twenty-first century, the line between man and machine has been blurred as humans rely on the enhancement of mechanical implants and robots are upgraded with human tissue. In this rapidly converging landscape, cyborg superagent Major Motoko Kusanagi is charged to track down the craftiest and most dangerous terrorists and cybercriminals, including 'ghost hackers' who are capable of exploiting the human/machine interface and reprogramming humans to become puppets to carry out the hackers' criminal ends.
I’ve always been fascinated by science fiction and by Biblical Scripture. That may seem dichotomous to some, but not to me. I have a passion for science and for Scripture because both bring understanding about our world from the microcosm to the macrocosm. My writings are a mixture of science and mystery with a science fiction feel and a Christian perspective. I like stories that show how truth arises even from the dark, confusing, and ambiguity of life to help one discover something about God they may not have considered before, and at the same time enjoy a fun, fast-paced, and exciting journey as they read.
While not science fiction in the classical sense, it is a story of a different kind of world where virtual reality and reality blur. The main character almost lives in a virtual reality gaming program, but when he is to do something in the real world, he finds he can’t really tell the two apart and that leads to grave consequences.
From James Dashner, the author of the New York Times bestselling Maze Runner series, comes an edge-of-your seat adventure. The Eye of Minds is the first book in The Mortality Doctrine, a series set in a world of hyper advanced technology, cyberterrorists, and gaming beyond your wildest dreams ...and your worst nightmares. To catch a hacker, you need a hacker. For Michael and the other gamers, the VirtNet can make your wildest fantasies become real. And the more hacking skills you have, the more fun. Who wants to play by the rules anyway? But some rules were made for a…
In my teenage years, it was sci-fi (and later fantasy) comedies that made me fall in love with reading. There was just something about exploring worlds where anything could happen mixed with the joy of laughter that kept drawing me back in. Naturally, in the many...many...years that followed, I've read countless novels from a wide variety of genres, but sci-fi comedy will always hold a special place in my heart.
Is it even a list of sci-fi books if you don’t include a story with a rogue artificial intelligence? Sure, it’s not necessarily the funniestpremise, but when you throw in the fact that the A.I. in question has the mind of a six-year-old, the heroes trying to catch him are essentially his daycare providers, and the author is Scott Meyer, creator of the webcomic Basic Instructions and the Magic 2.0 series, and you’re sure to have a good time.
From the author of the popular Magic 2.0 series comes the witty tale of a mischievous A.I. gone rogue.
Al, a well-meaning but impish artificial intelligence, has the mind of a six-year-old and a penchant for tantrums. And the first one to discover just how much trouble Al could cause is Hope Takeda, the lab assistant in charge of educating and socializing him. Day care is a lot more difficult when your kid is an evolving and easily frightened A.I.
When Al manages to access the Internet and escape the lab days before his official unveiling, Hope and her team…
Interested in
national security,
computer security,
and
survival?
11,000+ authors have recommended their favorite books and what they love about them.
Browse their picks for the best books about
national security,
computer security,
and
survival.