58 books like Digital Fortress

By Dan Brown, Dan Brown,

Here are 58 books that Digital Fortress fans have personally recommended if you like Digital Fortress. Shepherd is a community of 9,000+ authors and super readers sharing their favorite books with the world.

Shepherd is reader supported. When you buy books, we may earn an affiliate commission.

The Circle

By Dave Eggers,

Book cover of The Circle

Akemi C. Brodsky Author Of The Brill Pill

From the list on the double-edged sword of technology.

Who am I?

I have been writing for several years now, but my undergraduate degree is in geochemistry and I have always had a keen interest in science. For me, writing and science go hand-in-hand because both represent an attempt to describe our world in different ways. Throughout my time studying science and spending time with other scientists, I became fascinated with the culture of academia and the competition that pushes people to compromise in the name of progress. We know far less than we don’t know about the universe, and speculative fiction makes a creative effort to fill in this gaping lack of knowledge while presenting us with important thought experiments. 

Akemi's book list on the double-edged sword of technology

Why did Akemi love this book?

This story is almost too close to reality, but that is what made it so engaging for me.

Mae begins as a very relatable and down-to-earth college graduate who is thrilled to be offered a job at the Circle – a tech behemoth. She is blinded by reverence and ambition as her job quickly sucks up her every moment with demands for pseudo-social interactions through the Circle’s constantly evolving network.

A commentary on all of the privacy issues we already face, this novel pushes them to their limits. The question is whether Mae will continue to bend to her new employer’s demands or whether she will break. The stakes continue to rise as her new job and her former life battle over her soul.

By Dave Eggers,

Why should I read it?

5 authors picked The Circle as one of their favorite books, and they share why you should read it.

What is this book about?


NOW A MAJOR MOTION PICTURE starring Tom Hanks, Emma Watson and John Boyega

THE NEW YORK TIMES BESTSELLER - a dark, thrilling and unputdownable novel about our obsession with the internet

'Prepare to be addicted' Daily Mail

'A gripping and highly unsettling read' Sunday Times

'The Circle is 'Brave New World' for our brave new world... Fast, witty and troubling' Washington Post

When Mae is hired to work for the Circle, the world's most powerful internet company, she feels she's been given the opportunity of a lifetime. Run out of a sprawling California campus, the Circle links users' personal emails,…


Little Brother

By Cory Doctorow,

Book cover of Little Brother

Kat Wheeler Author Of There Is No Cloud

From the list on technothrillers with accurate technology representation.

Who am I?

I’m just a book-loving girl working in a corporate world who’s sick to death of the inaccurate representations of technology in fiction. FYI, tracing a phone call is instantaneous, no need to keep that pesky murderer on the line these days. Technology is so ingrained in our daily lives and most people have very limited knowledge of what it actually does, so I became fascinated with the idea of using real modern-day tech in murder mysteries. I got so obsessed with the idea I decided to write it. No Sci-Fi of future tech, it may seem farfetched, but all the electronic wizardry used in my novels is real and accurately represented.

Kat's book list on technothrillers with accurate technology representation

Why did Kat love this book?

Cory Doctorow, the champion of nerds everywhere really hit the nail on the head with his book about the state of current politics and society with Little Brother. This book was released in 2008 but seems truer to life now than ever. His protagonist Marcus, watches appalled as the government begins to strip away citizens' rights under the guise of our protection. This book has been called dystopian young adult fiction, but I disagree. It all feels very familiar to the current climate we live in. It can get a little preachy but regardless of your personal politics it’s a must-read for all.

By Cory Doctorow,

Why should I read it?

2 authors picked Little Brother as one of their favorite books, and they share why you should read it.

What is this book about?

Marcus, a.k.a "w1n5t0n," is only seventeen years old, but he figures he already knows how the system works–and how to work the system. Smart, fast, and wise to the ways of the networked world, he has no trouble outwitting his high school's intrusive but clumsy surveillance systems.

But his whole world changes when he and his friends find themselves caught in the aftermath of a major terrorist attack on San Francisco. In the wrong place at the wrong time, Marcus and his crew are apprehended by the Department of Homeland Security and whisked away to a secret prison where they're…


Ready Player One

By Ernest Cline,

Book cover of Ready Player One

Tyler Schwanke Author Of Breaking In

From the list on movie lovers.

Who am I?

Tyler Schwanke is a writer and a filmmaker. He holds an MFA from Hamline University, and his short stories have been widely published in online journals and literary magazines, including Chaotic Merge, Havik, and Fiction Southeast. He is also a graduate of the New York Film Academy and Minnesota State University Moorhead, where he was awarded a Minnesota Film and TV Grant. Several of his award-winning short films have played at festivals across the country. Tyler lives in the Minneapolis with his wife and their dog. Breaking In is his debut novel.

Tyler's book list on movie lovers

Why did Tyler love this book?

A video game treasure hunt filled with movie geek trivia? Sign me up.

I don’t know a single person who’s read this book and has been disappointed. Set in a not-too-distant future, this YA sci-fi novel is a fun and fast read that’s even better than the movie. 

I love how the plot, and the video game treasure hunt, are propelled forward by movie and pop culture references. This really spoke to me as a reader who loves that stuff, and showed me how I could use the same type of film references in my own book. 

By Ernest Cline,

Why should I read it?

13 authors picked Ready Player One as one of their favorite books, and they share why you should read it.

What is this book about?

SOON TO BE A MAJOR MOTION PICTURE DIRECTED BY STEVEN SPIELBERG

It's the year 2044, and the real world has become an ugly place. We're out of oil. We've wrecked the climate. Famine, poverty, and disease are widespread.

Like most of humanity, Wade Watts escapes this depressing reality by spending his waking hours jacked into the OASIS, a sprawling virtual utopia where you can be anything you want to be, where you can live and play and fall in love on any of ten thousand planets. And like most of humanity, Wade is obsessed by the ultimate lottery ticket that…


Jurassic Park

By Michael Crichton,

Book cover of Jurassic Park

Christopher Calvin Author Of Pendant of God

From the list on that were adapted into worse movies.

Who am I?

I grew up a child of the movies, open to watching anything at least once and countlessly rewatching the movies I loved. When not in front of a television, I was instead in front of a book, playing the words of the page out in my imagination. Now I write thrillers of multiple varieties (action, techno, paranormal, etc.), still visualizing words as movies playing out in my mind. Over the years, I’ve seen the quality of novel adaptations grow (e.g., Harry Potter, The Martian, etc.), and yet these staples of my youth have always stuck with me as lost opportunities to deliver a superior work to the general movie-watching audience.

Christopher's book list on that were adapted into worse movies

Why did Christopher love this book?

This was the book that got me into reading. It has everything: an intriguing premise, great characters, wondrous, yet terrifying creatures, action, suspense, humor, and a hefty dose of intellect.

These days, most people know Jurassic Park by its film franchise. When the first movie released in 1993, audiences were floored. And don’t get me wrong, it’s objectively a great movie, with wonderful acting and cutting-edge special effects for its time. But at the time? I was disappointed.

I had already read the book more than once and was looking forward to seeing its entire story brought to life on the screen. Unfortunately, the movie only captured about fifty percent of that story (with the rest significantly re-tooled and scattered across its sequels).

If you like the Jurassic Park movie universe, I definitely recommend visiting how it all began!

By Michael Crichton,

Why should I read it?

14 authors picked Jurassic Park as one of their favorite books, and they share why you should read it.

What is this book about?

'Crichton's most compulsive novel' Sunday Telegraph
'Crichton's dinosaurs are genuinely frightening' Chicago Sun-Times
'Breathtaking adventure. . . a book that is as hard to put down as it is to forget' Time Out

-------------------------------

The international bestseller that inspired the Jurassic Park film franchise.

On a remote jungle island, genetic engineers have created a dinosaur game park.

An astonishing technique for recovering and cloning dinosaur DNA has been discovered. Now one of mankind's most thrilling fantasies has come true and the first dinosaurs that the Earth has seen in the time of man emerge.

But, as always, there is a…


Book cover of Real-World Cryptography

Jean-Philippe Aumasson Author Of Serious Cryptography: A Practical Introduction to Modern Encryption

From the list on for cryptography apprentices.

Who am I?

I started learning cryptography in the early 2000s with books borrowed from my university’s library, and with information I could find online. Since then I’ve practiced cryptography for 15 years in a variety of contexts: as an academic researcher, while working on my PhD; as a cryptography engineer for software and hardware pay-TV systems; as a consultant for private and public sector clients; as a vulnerability researcher in my spare time; as a code auditor for cryptography projects; as a start-up founder in the domain of IoT security; and as CSO (chief security officer) of a fintech start-up. I live in Lausanne, Switzerland, and besides crypto I enjoy literature, rock climbing, and playing classical guitar.

Jean-Philippe's book list on for cryptography apprentices

Why did Jean-Philippe love this book?

Although David is a friend, I only recommend his book because it’s great, both in terms of content and presentation. Real-World Cryptography is today’s reference book about cryptographic tools and applications: Modern schemes such as the SHA-3 hash function and the Noise protocol framework, end-to-end encryption protocols, cryptocurrencies’ cryptography mechanisms, as well as emerging techniques like fully-homomorphic encryption and multi-party computation; Wong’s book delivers a practice-oriented, accessible introduction, enriched by many visual illustrations (including original comics strips!), and exercises (with their solutions). 

By David Wong,

Why should I read it?

1 author picked Real-World Cryptography as one of their favorite books, and they share why you should read it.

What is this book about?

If you're browsing the web, using public APIs, making and receiving electronic payments, registering and logging in users, or experimenting with blockchain, you're relying on cryptography. And you're probably trusting a collection of tools, frameworks, and protocols to keep your data, users, and business safe. It's important to understand these tools so you can make the best decisions about how, where, and why to use them. Real-World Cryptography teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications. about the technologyCryptography is the foundation of information security. This simultaneously ancient and emerging…


Security Engineering

By Ross Anderson,

Book cover of Security Engineering: A Guide to Building Dependable Distributed Systems

Jean-Philippe Aumasson Author Of Serious Cryptography: A Practical Introduction to Modern Encryption

From the list on for cryptography apprentices.

Who am I?

I started learning cryptography in the early 2000s with books borrowed from my university’s library, and with information I could find online. Since then I’ve practiced cryptography for 15 years in a variety of contexts: as an academic researcher, while working on my PhD; as a cryptography engineer for software and hardware pay-TV systems; as a consultant for private and public sector clients; as a vulnerability researcher in my spare time; as a code auditor for cryptography projects; as a start-up founder in the domain of IoT security; and as CSO (chief security officer) of a fintech start-up. I live in Lausanne, Switzerland, and besides crypto I enjoy literature, rock climbing, and playing classical guitar.

Jean-Philippe's book list on for cryptography apprentices

Why did Jean-Philippe love this book?

One of the books that I open at least once a year, and which I always recommend to students and mentees. Security Engineering isn’t a book (only) about cryptography, yet one about a topic that a cryptographer should know well: security engineering, or the design, implementation, and testing of systems that must be reliable in hostile and adversarial environments. Cryptography is indeed often just a small, yet critical, component of larger security systems. A good cryptographer must therefore not limit themselves to their field, but understand the risks, practical constraints, and functional needs of the environment where cryptography is integrated. Anderson’s book is the undisputed reference in that space.  

By Ross Anderson,

Why should I read it?

1 author picked Security Engineering as one of their favorite books, and they share why you should read it.

What is this book about?

Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic

In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack.

This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than…


Designing Secure Software

By Loren Kohnfelder,

Book cover of Designing Secure Software: A Guide for Developers

Adam Shostack Author Of Threat Modeling: Designing for Security

From the list on application security for builders.

Who am I?

Being able to understand and change reality through our knowledge and skill is literal magic. We’re building systems with so many exciting and unexpected properties that can be exploited and repurposed for both good and evil. I want to keep some of that magic and help people engineer – build great systems that make people’s lives better. I’ve been securing (and breaking) systems, from operating rooms to spaceships, from banks to self-driving cars for over 25 years. The biggest lesson I’ve learned is that if security is not infused from the start, we’re forced to rely on what ought to be our last lines of defense. This list helps you infuse security into your systems.

Adam's book list on application security for builders

Why did Adam love this book?

Loren’s been contributing to security for over 40 years, and this book captures his hard-won wisdom in a way that’s both humble and accessible. It scales from principles and design approaches to in-depth explanations of exactly how things go wrong and how to avoid those problems. (Also, I was honored to write the foreword.)

By Loren Kohnfelder,

Why should I read it?

1 author picked Designing Secure Software as one of their favorite books, and they share why you should read it.

What is this book about?

Designing Secure Software consolidates Loren Kohnfelder's more than twenty years of experience into a concise, elegant guide to improving the security of technology products. Written for a wide range of software professionals, it emphasizes building security into software design early and involving the entire team in the process. The book begins with a discussion of core concepts. The second part, perhaps this book's most important contribution, covers the process of designing and reviewing a software design with security considerations in mind. The final section details the most common coding flaws that create vulnerabilities, making copious use of code snippets written…


Cybersecurity Is Everybody's Business

By Scott N. Schober, Craig W. Schober,

Book cover of Cybersecurity Is Everybody's Business: Solve the Security Puzzle for Your Small Business and Home

Eric J. Rzeszut Author Of 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

From the list on to help you protect your personal information.

Who am I?

I have been an information technology and cybersecurity professional for over two decades. I’ve learned over and over again that “people are the weakest link.” You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via “social engineering” – to trick a human being into giving you the access you need, rather than trying to hack the system itself. The books on this list will help the reader lower their chances of being exploited like this.

Eric's book list on to help you protect your personal information

Why did Eric love this book?

Cybersecurity is Everybody’s Business is a great book that focuses not only on the how to keep your data safe, but on the very critical why this is important. Author Scott Schober suffered a grievous cyberattack in a previous business, and he brings his experience to the forefront in this guide. Joined by his brother as co-author, they focus on cybersecurity for the home and small business – environments that are unlikely to employ full-time cybersecurity professionals. (That’s why these places are often targets for the bad guys!)

By Scott N. Schober, Craig W. Schober,

Why should I read it?

1 author picked Cybersecurity Is Everybody's Business as one of their favorite books, and they share why you should read it.

What is this book about?

Since publication of his first book, HACKED AGAIN, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes. Now joined by his brother Craig, the two have set their sights on the biggest target of all, small businesses.

There are 30 million small businesses currently operating in the United States. Some of them are single owner/operated while others collectively employ hundreds of millions. This book is for all of them and anyone who makes it their business to stay safe…


Secure Coding in C and C++

By Robert C. Seacord,

Book cover of Secure Coding in C and C++

Nancy R. Mead Author Of Cyber Security Engineering: A Practical Approach for Systems and Software Assurance

From the list on software security engineering.

Who am I?

As a kid, I used to do all the math problems in my textbooks just for fun, even if they weren’t part of a homework assignment. My grandchildren cringe when I tell them this. I am a researcher and educator in secure software engineering and have enjoyed a productive career in software development and management, software engineering and software security research, and software and secure software engineering education.  

Nancy's book list on software security engineering

Why did Nancy love this book?

The title says it all. This is probably one of the first, if not the first book on secure coding, by a pioneer in the field. Robert worked tirelessly to make this happen. Although the book has been superseded by the secure coding standards that evolved from it, it is still a good read and contains a lot of useful information for developers.  

By Robert C. Seacord,

Why should I read it?

1 author picked Secure Coding in C and C++ as one of their favorite books, and they share why you should read it.

What is this book about?

Learn the Root Causes of Software Vulnerabilities and How to Avoid Them

Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has determined that a relatively small number of root causes account for most of the vulnerabilities.



Secure Coding in C and C++, Second Edition, identifies and explains these root causes and shows the steps that can be taken to prevent exploitation. Moreover, this book encourages programmers to adopt security best practices and to develop a security mindset that can help protect software from tomorrow's attacks, not…


Building Secure and Reliable Systems

By Heather Adkins, Betsy Beyer, Paul Blankinship, Ana Oprea, Adam Stubblefield

Book cover of Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems

Adam Shostack Author Of Threat Modeling: Designing for Security

From the list on application security for builders.

Who am I?

Being able to understand and change reality through our knowledge and skill is literal magic. We’re building systems with so many exciting and unexpected properties that can be exploited and repurposed for both good and evil. I want to keep some of that magic and help people engineer – build great systems that make people’s lives better. I’ve been securing (and breaking) systems, from operating rooms to spaceships, from banks to self-driving cars for over 25 years. The biggest lesson I’ve learned is that if security is not infused from the start, we’re forced to rely on what ought to be our last lines of defense. This list helps you infuse security into your systems.

Adam's book list on application security for builders

Why did Adam love this book?

This book captures lessons from many authors at Google, some of whom I’ve worked with over the years. The chapters on availability (7, 8, 9) were a revelation to me. I had no idea how Google approaches the topic of resilience and recovery in their systems, and I now think of the whole topic very differently. The biggest takeaway is how to think about the design of systems.

By Heather Adkins, Betsy Beyer, Paul Blankinship, Ana Oprea, Adam Stubblefield

Why should I read it?

1 author picked Building Secure and Reliable Systems as one of their favorite books, and they share why you should read it.

What is this book about?

Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best practices to help your organization design scalable and reliable systems that are fundamentally secure.

Two previous O'Reilly books from Google-Site Reliability Engineering and The Site Reliability Workbook-demonstrated how and why a commitment to the entire service lifecycle enables organizations to successfully build, deploy, monitor, and maintain…


5 book lists we think you will like!

Interested in computer security, intelligence officers, and cryptography?

9,000+ authors have recommended their favorite books and what they love about them. Browse their picks for the best books about computer security, intelligence officers, and cryptography.

Computer Security Explore 23 books about computer security
Intelligence Officers Explore 49 books about intelligence officers
Cryptography Explore 24 books about cryptography