66 books like Digital Fortress

By Dan Brown, Dan Brown,

Here are 66 books that Digital Fortress fans have personally recommended if you like Digital Fortress. Shepherd is a community of 11,000+ authors and super readers sharing their favorite books with the world.

Shepherd is reader supported. When you buy books, we may earn an affiliate commission.

Book cover of The Circle

Stephen Harrison Author Of The Editors

From my list on real-life experience of living and working online.

Why am I passionate about this?

I’m a novelist who draws inspiration from my work experience as both a journalist covering tech platforms and a lawyer advising clients on tech transactions. It fascinates me how the internet has become ubiquitous in our lives, and yet it appears so rarely in popular fiction. My high school English teachers taught me that we don’t read just for escapism but to better understand the full range of human experience. Given how deeply technology shapes today’s moral problems, I believe fiction should address these issues head-on. I’m excited to share this list of books that depict how the internet is affecting us—for better and for worse.

Stephen's book list on real-life experience of living and working online

Stephen Harrison Why did Stephen love this book?

This book resonated with me on so many levels. I first read it in 2015 while working at a tech company, and the novel gave me the language to express the unease I felt about Big Tech’s relentless push for “transparency” and “sharing,” often at the expense of privacy. In many ways, the book is an argument about trade-offs—the perks of working for a Google-like company versus the torture of being overly connected.

Eggers also offers one of the most accurate portrayals of life as a Silicon Valley tech worker. The overwhelming barrage of pings and constant demands for feedback felt all too familiar. Ultimately, it is both a compelling dystopian thriller and a thought-provoking critique of the tech-driven world we inhabit, raising critical questions about privacy and the cost of innovation.

By Dave Eggers,

Why should I read it?

10 authors picked The Circle as one of their favorite books, and they share why you should read it.

What is this book about?


NOW A MAJOR MOTION PICTURE starring Tom Hanks, Emma Watson and John Boyega

THE NEW YORK TIMES BESTSELLER - a dark, thrilling and unputdownable novel about our obsession with the internet

'Prepare to be addicted' Daily Mail

'A gripping and highly unsettling read' Sunday Times

'The Circle is 'Brave New World' for our brave new world... Fast, witty and troubling' Washington Post

When Mae is hired to work for the Circle, the world's most powerful internet company, she feels she's been given the opportunity of a lifetime. Run out of a sprawling California campus, the Circle links users' personal emails,…


Book cover of Little Brother

Kat Wheeler Author Of There Is No Cloud

From my list on technothrillers with accurate technology representation.

Why am I passionate about this?

I’m just a book-loving girl working in a corporate world who’s sick to death of the inaccurate representations of technology in fiction. FYI, tracing a phone call is instantaneous, no need to keep that pesky murderer on the line these days. Technology is so ingrained in our daily lives and most people have very limited knowledge of what it actually does, so I became fascinated with the idea of using real modern-day tech in murder mysteries. I got so obsessed with the idea I decided to write it. No Sci-Fi of future tech, it may seem farfetched, but all the electronic wizardry used in my novels is real and accurately represented.

Kat's book list on technothrillers with accurate technology representation

Kat Wheeler Why did Kat love this book?

Cory Doctorow, the champion of nerds everywhere really hit the nail on the head with his book about the state of current politics and society with Little Brother. This book was released in 2008 but seems truer to life now than ever. His protagonist Marcus, watches appalled as the government begins to strip away citizens' rights under the guise of our protection. This book has been called dystopian young adult fiction, but I disagree. It all feels very familiar to the current climate we live in. It can get a little preachy but regardless of your personal politics it’s a must-read for all.

By Cory Doctorow,

Why should I read it?

3 authors picked Little Brother as one of their favorite books, and they share why you should read it. This book is for kids age 13, 14, 15, and 16.

What is this book about?

Marcus, a.k.a "w1n5t0n," is only seventeen years old, but he figures he already knows how the system works–and how to work the system. Smart, fast, and wise to the ways of the networked world, he has no trouble outwitting his high school's intrusive but clumsy surveillance systems.

But his whole world changes when he and his friends find themselves caught in the aftermath of a major terrorist attack on San Francisco. In the wrong place at the wrong time, Marcus and his crew are apprehended by the Department of Homeland Security and whisked away to a secret prison where they're…


Book cover of Ready Player One

Stephen Harrison Author Of The Editors

From my list on real-life experience of living and working online.

Why am I passionate about this?

I’m a novelist who draws inspiration from my work experience as both a journalist covering tech platforms and a lawyer advising clients on tech transactions. It fascinates me how the internet has become ubiquitous in our lives, and yet it appears so rarely in popular fiction. My high school English teachers taught me that we don’t read just for escapism but to better understand the full range of human experience. Given how deeply technology shapes today’s moral problems, I believe fiction should address these issues head-on. I’m excited to share this list of books that depict how the internet is affecting us—for better and for worse.

Stephen's book list on real-life experience of living and working online

Stephen Harrison Why did Stephen love this book?

While this book doesn’t depict today’s internet culture directly, it’s easy to imagine a dystopian future where most people spend their lives in a virtual reality world like the Oasis. As the main character navigates the challenges of this massive multiplayer online role-playing game (MMORPG), he encounters dilemmas that resonate with today’s internet users: Can you truly trust someone you’ve only met online? How do you compete when others have far more resources?

Though the book is geared toward a young adult audience, its themes hit home for readers of all ages. I’m glad we have stories showing that tech isn’t always a neutral force in society and that retreating into an online space doesn’t solve the larger systemic problems in the world.

By Ernest Cline,

Why should I read it?

20 authors picked Ready Player One as one of their favorite books, and they share why you should read it.

What is this book about?

SOON TO BE A MAJOR MOTION PICTURE DIRECTED BY STEVEN SPIELBERG

It's the year 2044, and the real world has become an ugly place. We're out of oil. We've wrecked the climate. Famine, poverty, and disease are widespread.

Like most of humanity, Wade Watts escapes this depressing reality by spending his waking hours jacked into the OASIS, a sprawling virtual utopia where you can be anything you want to be, where you can live and play and fall in love on any of ten thousand planets. And like most of humanity, Wade is obsessed by the ultimate lottery ticket that…


Defection in Prague

By Ray C Doyle,

Book cover of Defection in Prague

Ray C Doyle Author Of Lara's Secret

New book alert!

Why am I passionate about this?

I have been writing for many years, and my main preference is political thrillers with criminal overtones. I first became interested in politics when I worked at several political conferences in the 60’s and 70’s. I have been involved in several criminal cases, including my own, and within my family, I have a nephew in the police force. For many years I have had the opportunity to mix with the upper tiers of society as well as the criminal classes and this has given me great insight into creating my characters and plots.

Ray's book list on mysteries with complicated plots and risky characters

What is my book about?

Pete West, a political columnist, travels to Prague to find a missing diplomat, later found murdered. He attempts to discover more about a cryptic note received from the diplomat and is immediately entangled in the secret Bilderberg Club’s strategy to form a world federation.

Pete meets a Czechian agent who wants asylum. She has a murdered EU Commissioner’s diary containing clues to the civil unrest planned by the club, encrypted in algebraic chess notations. West seeks answers and links up with retired MI6 officer Tosh. While escaping would-be captors, they decode enough chess moves to reveal the anarchy of the…

Defection in Prague

By Ray C Doyle,

What is this book about?

Pete West, a political columnist, travels to Prague to find a missing diplomat, later found murdered. He attempts to discover more about a cryptic note received from the diplomat and is immediately entangled in the secret Bilderberg Club’s strategy to form a world federation.

Pete meets a Czechian agent who wants asylum. She has a murdered EU Commissioner’s diary containing clues to the civil unrest planned by the club, encrypted in algebraic chess notations. West seeks answers and links up with retired MI6 officer Tosh. While escaping would-be captors, they decode enough chess moves to reveal the anarchy of the…


Book cover of Jurassic Park

CL Fors Author Of Cradle of Mars

From my list on Science Fiction with unexpected depth.

Why am I passionate about this?

I grew up curious about the world and perplexed that people saw the same problems I did but didn’t feel the same urgency. With a science teacher for a father, I became a lover of the natural world. Science fiction gave me hope and the ability to picture solutions. It puts readers in a mindset to consider “what could be.” I continue to study and read science while writing and publishing sci-fi novels through my publishing house, Epitome Press. It’s my way of exploring possible futures and inviting the world to see them with me. I hope this list of unexpectedly thought-provoking sci-fi gets you thinking, dreaming, and taking action.

CL's book list on Science Fiction with unexpected depth

CL Fors Why did CL love this book?

I walked into this expecting dinosaur horror and came away with science and intelligent social commentary. Dr. Malcolm has significantly more space on the written page to delight us with Chaos theory and criticisms of human arrogance, and I am here for it!

While Jurassic Park delivers on horror, death, and danger, it also manages to deliver some thoughtful themes that go deeper than “science is dangerous.” We explore the responsibility we have to keep the power of scientific advancement with experts operating with the temperance that expertise confers.

Thoughtful sci-fi like Jurassic Park must always come with a dose of how we maintain our humanity and navigate our relationship with the natural world as technological advancements flood in.

By Michael Crichton,

Why should I read it?

20 authors picked Jurassic Park as one of their favorite books, and they share why you should read it.

What is this book about?

'Crichton's most compulsive novel' Sunday Telegraph
'Crichton's dinosaurs are genuinely frightening' Chicago Sun-Times
'Breathtaking adventure. . . a book that is as hard to put down as it is to forget' Time Out

-------------------------------

The international bestseller that inspired the Jurassic Park film franchise.

On a remote jungle island, genetic engineers have created a dinosaur game park.

An astonishing technique for recovering and cloning dinosaur DNA has been discovered. Now one of mankind's most thrilling fantasies has come true and the first dinosaurs that the Earth has seen in the time of man emerge.

But, as always, there is a…


Book cover of Real-World Cryptography

Jean-Philippe Aumasson Author Of Serious Cryptography: A Practical Introduction to Modern Encryption

From my list on for cryptography apprentices.

Why am I passionate about this?

I started learning cryptography in the early 2000s with books borrowed from my university’s library, and with information I could find online. Since then I’ve practiced cryptography for 15 years in a variety of contexts: as an academic researcher, while working on my PhD; as a cryptography engineer for software and hardware pay-TV systems; as a consultant for private and public sector clients; as a vulnerability researcher in my spare time; as a code auditor for cryptography projects; as a start-up founder in the domain of IoT security; and as CSO (chief security officer) of a fintech start-up. I live in Lausanne, Switzerland, and besides crypto I enjoy literature, rock climbing, and playing classical guitar.

Jean-Philippe's book list on for cryptography apprentices

Jean-Philippe Aumasson Why did Jean-Philippe love this book?

Although David is a friend, I only recommend his book because it’s great, both in terms of content and presentation. Real-World Cryptography is today’s reference book about cryptographic tools and applications: Modern schemes such as the SHA-3 hash function and the Noise protocol framework, end-to-end encryption protocols, cryptocurrencies’ cryptography mechanisms, as well as emerging techniques like fully-homomorphic encryption and multi-party computation; Wong’s book delivers a practice-oriented, accessible introduction, enriched by many visual illustrations (including original comics strips!), and exercises (with their solutions). 

By David Wong,

Why should I read it?

1 author picked Real-World Cryptography as one of their favorite books, and they share why you should read it.

What is this book about?

If you're browsing the web, using public APIs, making and receiving electronic payments, registering and logging in users, or experimenting with blockchain, you're relying on cryptography. And you're probably trusting a collection of tools, frameworks, and protocols to keep your data, users, and business safe. It's important to understand these tools so you can make the best decisions about how, where, and why to use them. Real-World Cryptography teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications. about the technologyCryptography is the foundation of information security. This simultaneously ancient and emerging…


Book cover of Security Engineering: A Guide to Building Dependable Distributed Systems

Dominik Merli Author Of Engineering Secure Devices: A Practical Guide for Embedded System Architects and Developers

From my list on embedded system security enthusiasts.

Why am I passionate about this?

I’ve been playing with computers and electronics since childhood. I even supported the people in my village with their computer issues back then. During my studies in electrical engineering, I learned how to solve technical challenges with structured approaches. At this time, I became fascinated by topics like cryptography and embedded system security. The books on this list helped me understand important concepts and practical real-world obstacles. I hope they are also of value to you!

Dominik's book list on embedded system security enthusiasts

Dominik Merli Why did Dominik love this book?

When I take this book off my shelf, the probability that I find the answer I'm looking for is very high. Yes, it's a big book, and I'm pretty sure I haven't read every single page yet, but because of its broad coverage of security engineering knowledge, from crypto to real-world processes, it is an invaluable reference for teaching and practical cyber security.

By Ross Anderson,

Why should I read it?

2 authors picked Security Engineering as one of their favorite books, and they share why you should read it.

What is this book about?

Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic

In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack.

This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than…


Book cover of Computer Security: Art and Science

Nancy R. Mead Author Of Cyber Security Engineering: A Practical Approach for Systems and Software Assurance

From my list on software security engineering.

Why am I passionate about this?

As a kid, I used to do all the math problems in my textbooks just for fun, even if they weren’t part of a homework assignment. My grandchildren cringe when I tell them this. I am a researcher and educator in secure software engineering and have enjoyed a productive career in software development and management, software engineering and software security research, and software and secure software engineering education.  

Nancy's book list on software security engineering

Nancy R. Mead Why did Nancy love this book?

Although strictly speaking, this book is not on software security, it is so well-known in the field as a general reference that it deserves to be on this list. It discusses the important issues of computer security and can be used as either a textbook or a reference. No doubt that many, if not most, students of computer security are familiar with this book.

By Matt Bishop,

Why should I read it?

1 author picked Computer Security as one of their favorite books, and they share why you should read it.

What is this book about?

Today, everyone recognizes the importance of safeguarding computer systems and networks from vulnerability, attack, and compromise. But computer security is neither an easy art nor a simple science: its methodologies and technologies require rigorous study, and a deep grounding in principles that can be applied even as technologies change. Moreover, practitioners must understand how to align concepts with real policies, and then actually implement those policies -- managing inevitable tradeoffs such as "How secure do our devices really need to be, and how much inconvenience can we accept?"



In his extensively updated Computer Security: Art and Science, 2nd Edition, University…


Book cover of Designing Secure Software: A Guide for Developers

Adam Shostack Author Of Threat Modeling: Designing for Security

From my list on application security for builders.

Why am I passionate about this?

Being able to understand and change reality through our knowledge and skill is literal magic. We’re building systems with so many exciting and unexpected properties that can be exploited and repurposed for both good and evil. I want to keep some of that magic and help people engineer – build great systems that make people’s lives better. I’ve been securing (and breaking) systems, from operating rooms to spaceships, from banks to self-driving cars for over 25 years. The biggest lesson I’ve learned is that if security is not infused from the start, we’re forced to rely on what ought to be our last lines of defense. This list helps you infuse security into your systems.

Adam's book list on application security for builders

Adam Shostack Why did Adam love this book?

Loren’s been contributing to security for over 40 years, and this book captures his hard-won wisdom in a way that’s both humble and accessible. It scales from principles and design approaches to in-depth explanations of exactly how things go wrong and how to avoid those problems. (Also, I was honored to write the foreword.)

By Loren Kohnfelder,

Why should I read it?

1 author picked Designing Secure Software as one of their favorite books, and they share why you should read it.

What is this book about?

Designing Secure Software consolidates Loren Kohnfelder's more than twenty years of experience into a concise, elegant guide to improving the security of technology products. Written for a wide range of software professionals, it emphasizes building security into software design early and involving the entire team in the process. The book begins with a discussion of core concepts. The second part, perhaps this book's most important contribution, covers the process of designing and reviewing a software design with security considerations in mind. The final section details the most common coding flaws that create vulnerabilities, making copious use of code snippets written…


Book cover of Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems

Adam Shostack Author Of Threat Modeling: Designing for Security

From my list on application security for builders.

Why am I passionate about this?

Being able to understand and change reality through our knowledge and skill is literal magic. We’re building systems with so many exciting and unexpected properties that can be exploited and repurposed for both good and evil. I want to keep some of that magic and help people engineer – build great systems that make people’s lives better. I’ve been securing (and breaking) systems, from operating rooms to spaceships, from banks to self-driving cars for over 25 years. The biggest lesson I’ve learned is that if security is not infused from the start, we’re forced to rely on what ought to be our last lines of defense. This list helps you infuse security into your systems.

Adam's book list on application security for builders

Adam Shostack Why did Adam love this book?

This book captures lessons from many authors at Google, some of whom I’ve worked with over the years. The chapters on availability (7, 8, 9) were a revelation to me. I had no idea how Google approaches the topic of resilience and recovery in their systems, and I now think of the whole topic very differently. The biggest takeaway is how to think about the design of systems.

By Heather Adkins, Betsy Beyer, Paul Blankinship , Ana Oprea , Adam Stubblefield

Why should I read it?

1 author picked Building Secure and Reliable Systems as one of their favorite books, and they share why you should read it.

What is this book about?

Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best practices to help your organization design scalable and reliable systems that are fundamentally secure.

Two previous O'Reilly books from Google-Site Reliability Engineering and The Site Reliability Workbook-demonstrated how and why a commitment to the entire service lifecycle enables organizations to successfully build, deploy, monitor, and maintain…


Book cover of Secure Coding in C and C++

Nancy R. Mead Author Of Cyber Security Engineering: A Practical Approach for Systems and Software Assurance

From my list on software security engineering.

Why am I passionate about this?

As a kid, I used to do all the math problems in my textbooks just for fun, even if they weren’t part of a homework assignment. My grandchildren cringe when I tell them this. I am a researcher and educator in secure software engineering and have enjoyed a productive career in software development and management, software engineering and software security research, and software and secure software engineering education.  

Nancy's book list on software security engineering

Nancy R. Mead Why did Nancy love this book?

The title says it all. This is probably one of the first, if not the first book on secure coding, by a pioneer in the field. Robert worked tirelessly to make this happen. Although the book has been superseded by the secure coding standards that evolved from it, it is still a good read and contains a lot of useful information for developers.  

By Robert C. Seacord,

Why should I read it?

1 author picked Secure Coding in C and C++ as one of their favorite books, and they share why you should read it.

What is this book about?

Learn the Root Causes of Software Vulnerabilities and How to Avoid Them

Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has determined that a relatively small number of root causes account for most of the vulnerabilities.



Secure Coding in C and C++, Second Edition, identifies and explains these root causes and shows the steps that can be taken to prevent exploitation. Moreover, this book encourages programmers to adopt security best practices and to develop a security mindset that can help protect software from tomorrow's attacks, not…


5 book lists we think you will like!

Interested in computer security, intelligence officers, and cryptography?

Cryptography 31 books