100 books like Fatal System Error

By Joseph Menn,

Here are 100 books that Fatal System Error fans have personally recommended if you like Fatal System Error. Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.

When you buy books, we may earn a commission that helps keep our lights on (or join the rebellion as a member).

Book cover of The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

George Finney Author Of Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

From my list on books on cybersecurity that anyone can understand.

Why am I passionate about this?

I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.

George's book list on books on cybersecurity that anyone can understand

George Finney Why did George love this book?

The first person to ever catch a hacker wasn’t an FBI or CIA agent. It was an astronomer, and his name was Clifford Stoll. This book is a biographical account of how he took on a German hacker who was selling secrets to the KGB in the 1980s. I love this book because it shows how anyone can play a role in cybersecurity.

As a kid, I watched the TV adaptation of the book for PBS’s NOVA program and went into cybersecurity in large part because of Stoll. Because cybersecurity wasn’t a profession at the time, Stoll created his own innovative techniques, like building the first computer honeypot to help catch the hacker in action. When his book was made into a PBS documentary, as a thank you for putting up with him and all the crazy things he had to do to track the hacker, he had all of…

By Clifford Stoll,

Why should I read it?

4 authors picked The Cuckoo's Egg as one of their favorite books, and they share why you should read it.

What is this book about?

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name…


Book cover of This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

Steve Vigdor Author Of Signatures of the Artist: The Vital Imperfections That Make Our Universe Habitable

From my list on science that should inform public policy.

Why am I passionate about this?

I’ve been passionate about science as a way of learning how nature works and approaching truth since I was a pre-teen. After five decades of basic research, teaching, and management in physics, I can distinguish good science from pseudoscience even beyond my own areas of expertise. I am greatly disturbed by attempts to undermine science in public policy-making when its findings conflict with ideology, religious beliefs, or business bottom lines. My passion project, via my blog debunkingdenial.com, is to explain to teachers and the public the underlying science and the flaws in science denial across a wide range of topics at the interface with public policy. 

Steve's book list on science that should inform public policy

Steve Vigdor Why did Steve love this book?

I love this book because Perlroth chronicles the proliferation of cyberweapons, which began in the hands of mischievous young hackers exploiting vulnerabilities in widely used software. Once some of those hackers joined the NSA, their tools were developed into sophisticated weapons to undercut technological developments in enemy states like Iran.

Once NSA’s hacks leaked to the wider world, they spawned an arms race and fueled rampant criminal ransomware attacks on vulnerable institutions. Informed by Perlroth’s book, I see a future in which dwindling human fertility and the ballooning costs of advanced weaponry will enhance the military role of cyber-attacks, leading to Mutually Assured Cyber Destruction, in which many countries have cyberweapons deeply embedded in the critical infrastructure of their adversaries, just waiting to activate them.

By Nicole Perlroth,

Why should I read it?

2 authors picked This Is How They Tell Me the World Ends as one of their favorite books, and they share why you should read it.

What is this book about?

THE NEW YORK TIMES BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations)

"Written in the hot, propulsive prose of a spy thriller" (The New York Times), the untold story of the cyberweapons market-the most secretive, government-backed market on earth-and a terrifying first look at a new kind of global warfare.

Zero-day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero-day has the power…


Book cover of Ghost Fleet: A Novel of the Next World War

Jennifer L. Bayuk Author Of Enterprise Security for the Executive: Setting the Tone from the Top

From my list on cybersecurity for every type of reader.

Why am I passionate about this?

I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.

Jennifer's book list on cybersecurity for every type of reader

Jennifer L. Bayuk Why did Jennifer love this book?

The book portrays a scenario in which nation-state adversaries launch a sophisticated cyberattack against the United States. Though it is science fiction, the political scenario it depicts is a realistic description of how today’s nation-states consider technology options when they are engaged in traditional war. For people interested in cybersecurity and attracted to that genre, it will be an eye-opening experience because the basic scenarios it describes are very easy to project into the near future. It is also a tale of adventure.

By P.W. Singer, August Cole,

Why should I read it?

1 author picked Ghost Fleet as one of their favorite books, and they share why you should read it.

What is this book about?

Ghost Fleet is a page-turning imagining of a war set in the not-too-distant future. Navy captains battle through a modern-day Pearl Harbour; fighter pilots duel with stealthy drones; teenage hackers fight in digital playgrounds; Silicon Valley billionaires mobilise for cyber-war; and a serial killer carries out her own vendetta. Ultimately, victory will depend on who can best blend the lessons of the past with the weapons of the future. But what makes the story even more notable is that every trend and technology in book - no matter how sci-fi it may seem - is real. The debut novel by…


Book cover of Cyber Attacks: Protecting National Infrastructure

Jennifer L. Bayuk Author Of Enterprise Security for the Executive: Setting the Tone from the Top

From my list on cybersecurity for every type of reader.

Why am I passionate about this?

I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.

Jennifer's book list on cybersecurity for every type of reader

Jennifer L. Bayuk Why did Jennifer love this book?

Amoroso’s experience started with academic research at Bell Labs and Stevens Institute of Technology but moved quickly to practically fill voids at AT&T and NSA. His book reduces technical concepts in cybersecurity to basic principles and explains generically how they are effectively implemented. For the true techy who wants to fully understand all the formal logic behind the theories in Cyber Attacks, reach back to Ed Amoroso’s Fundamentals of Computer Security Technology (1994). 

By Edward Amoroso,

Why should I read it?

1 author picked Cyber Attacks as one of their favorite books, and they share why you should read it.

What is this book about?

Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well.

This book covers cyber security policy development for…


Book cover of Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

George Finney Author Of Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

From my list on books on cybersecurity that anyone can understand.

Why am I passionate about this?

I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.

George's book list on books on cybersecurity that anyone can understand

George Finney Why did George love this book?

Ever wondered what Russian hackers have been up to over the last few years? I found this a really sobering read, but at the same time, I loved hearing the stories of the people who work so hard to keep us safe.

Hackers are usually pretty big nerds, so it’s not really surprising that the title of this book comes from how cybercriminals embedded references to Frank Herbert’s book Dune into the code they used to carry out cyberattacks against Ukraine and other countries.

By Andy Greenberg,

Why should I read it?

1 author picked Sandworm as one of their favorite books, and they share why you should read it.

What is this book about?

"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy

The true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times).

In 2014, the world witnessed the start of a…


Book cover of The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime

Leslie Shannon Author Of Interconnected Realities: How the Metaverse Will Transform Our Relationship with Technology Forever

From my list on when hot new technology meets reality.

Why am I passionate about this?

I’m the Head of Trend and Innovation Scouting for Nokia, and I’ve been with the company since the glory days of Nokia mobile phone world dominance. I know first-hand what happens when a company focuses exclusively on the technology, not the humans that use it, and how quickly that can lead to disaster. One of the lessons that I see repeated continuously in the field of innovation is that a huge amount of attention gets paid to the new technology, and not nearly enough on how the technology will interact with our existing systems, beliefs, attitudes, and culture. Learning from the mistakes is the best way to make sure that the future doesn’t repeat them!

Leslie's book list on when hot new technology meets reality

Leslie Shannon Why did Leslie love this book?

Stepping away from the topic of immersive technology, The Ransomware Hunting Team instead looks at the realities of cybercrime in the US, and why especially our government infrastructure has such a hard time fighting it effectively. 

Like all the other books on my list, it’s an examination of what happens when the rubber meets the road with a new technology, and how we humans often just aren’t very good at adapting to change.  

Part of the key problem is that hackers – including the white hat hackers that you want on your side to bring down the bad guys – tend not to be social animals, and our official organizations are far happier hiring a smiling guy in a suit than a scowling nerd who would rather work from his dark bedroom at home.  (Apologies for the stereotypes, but – this really is a problem!) 

This book is an absorbing…

By Renee Dudley, Daniel Golden,

Why should I read it?

1 author picked The Ransomware Hunting Team as one of their favorite books, and they share why you should read it.

What is this book about?

Scattered across the world, an elite team of code-cracking techies is working tirelessly on your behalf to thwart the most notorious cyber scourge of our time. You've probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, especially if its cybersecurity is imperfect, chances are that you're painfully familiar with the group's sworn enemy: ransomware. Again and again, these ordinary people, mostly self-taught and often struggling to make ends meet, have outwitted the shadowy networks of hackers and criminal gangs that lock computer networks and extort huge payments in return…


Book cover of Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Jeremy N. Smith Author Of Breaking and Entering: The Extraordinary Story of a Hacker Called Alien

From my list on hackers and hacking.

Why am I passionate about this?

Jeremy N. Smith is the author of three acclaimed narrative non-fiction books, including Breaking and Entering, about a female hacker called “Alien” and the birth of our information insecurity age. He has written for The Atlantic, Discover, Slate, and the New York Times, among other outlets, and he and his work have been featured by CNN, NPR, NBC Nightly News, The Today Show, and Wired. He hosts The Hacker Next Door podcast and lives in Missoula, Montana.

Jeremy's book list on hackers and hacking

Jeremy N. Smith Why did Jeremy love this book?

A famous hacker’s real-life story, told from his own perspective, Ghost in the Wires explains how criminal hackers think and act and the diverse techniques they use, no keyboard necessary—all, in this case, with little motive beyond a compulsion to explore and exploit. The hacking community has no bigger characters than Kevin Mitnick and no better first-person accounts of the art of “social engineering,” or human hacking—manipulating people (including, in Mitnick’s case, the FBI and other would-be pursuers) to your own advantage.

By William L. Simon, Kevin Mitnick,

Why should I read it?

1 author picked Ghost in the Wires as one of their favorite books, and they share why you should read it.

What is this book about?

In this "intriguing, insightful and extremely educational" novel, the world's most famous hacker teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data (Frank W. Abagnale).

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies -- and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI's net finally began to tighten, Mitnick went on the run, engaging in an increasingly sophisticated game of hide-and-seek that escalated…


Book cover of SafeCyberHome: Protect Your Family From Fraud, Identity Theft and Computer Hackers

Eric J. Rzeszut Author Of 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

From my list on to help you protect your personal information.

Why am I passionate about this?

I have been an information technology and cybersecurity professional for over two decades. I’ve learned over and over again that “people are the weakest link.” You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via “social engineering” – to trick a human being into giving you the access you need, rather than trying to hack the system itself. The books on this list will help the reader lower their chances of being exploited like this.

Eric's book list on to help you protect your personal information

Eric J. Rzeszut Why did Eric love this book?

SafeCyberHome focuses on understanding how corporations and governments collect and use our personal data. The book also gives strategies for opting out of this data collection whenever possible. And, where it is not possible to opt-out, the book gives clear explanations on why we should be as restrictive with our personal data as possible. Vancannon uses an example similar to one from my own book: if someone is really determined to get your data, they will. But if they’re just looking for an easy target, and you’re not one, they’ll move on. Same reason you lock your front door – a determined master thief can defeat even the best lock, if they really want to – but do you want to make your house the easiest target on the block?

By Billy VanCannon,

Why should I read it?

1 author picked SafeCyberHome as one of their favorite books, and they share why you should read it.

What is this book about?

Online security and data privacy is one of the most pressing yet misunderstood issues of our time.

Today we use the internet to shop, work, learn, and be entertained. At the same time, we leave a trail that others can use to steal from us, assume our identity to commit crimes in our names, and hack our computers. If you ever felt helpless because governments and corporations can’t protect themselves with all their resources, then this book is for you. The vast majority of fraud and cybercrime can be stopped with basic knowledge about how your data is collected and…


Book cover of Digital Fortress

Kat Wheeler Author Of There Is No Cloud

From my list on technothrillers with accurate technology representation.

Why am I passionate about this?

I’m just a book-loving girl working in a corporate world who’s sick to death of the inaccurate representations of technology in fiction. FYI, tracing a phone call is instantaneous, no need to keep that pesky murderer on the line these days. Technology is so ingrained in our daily lives and most people have very limited knowledge of what it actually does, so I became fascinated with the idea of using real modern-day tech in murder mysteries. I got so obsessed with the idea I decided to write it. No Sci-Fi of future tech, it may seem farfetched, but all the electronic wizardry used in my novels is real and accurately represented.

Kat's book list on technothrillers with accurate technology representation

Kat Wheeler Why did Kat love this book?

Ah, Dan Brown. Love him or hate him, he’s a paragon of the modern thriller. Let’s go way back to 1998. It was pre-DaVinci Code, and he released his first novel, Digital Fortress. For the time period, it was a unique idea. A woman cryptologist at the NSA gets embroiled in a high-stakes murder mystery and the only way through is to solve the code. There are a lot of issues with this book, primarily that the author couldn’t be bothered to check his work and misuses bits and bytes throughout the whole novel which makes the code-breaking premise ridiculous. But to be fair, this was 1998 and for a first novel, it’s still a fun ride. So, if you’re a Dan Brown fan or love a fast-paced easy read give it a try. If you have even a basic understanding of how encryption works you may…

By Dan Brown, Dan Brown,

Why should I read it?

1 author picked Digital Fortress as one of their favorite books, and they share why you should read it.

What is this book about?

A former National Security Agency programmer threatens to release a mathematical formula that will allow organized crime and terrorism to skyrocket, unless the code-breaking computer that is used to keep them in check but that violates civil rights is not exposed to the public.


Book cover of Software Security: Building Security in

Nancy R. Mead Author Of Cyber Security Engineering: A Practical Approach for Systems and Software Assurance

From my list on software security engineering.

Why am I passionate about this?

As a kid, I used to do all the math problems in my textbooks just for fun, even if they weren’t part of a homework assignment. My grandchildren cringe when I tell them this. I am a researcher and educator in secure software engineering and have enjoyed a productive career in software development and management, software engineering and software security research, and software and secure software engineering education.  

Nancy's book list on software security engineering

Nancy R. Mead Why did Nancy love this book?

Gary McGraw has been an advocate for the importance of developing secure software during the more than 15 years that I have known him, and before that! He has written a number of books, but this one captures his philosophy on how to develop secure software. It’s an excellent resource for practitioners and management.

By Gary McGraw,

Why should I read it?

1 author picked Software Security as one of their favorite books, and they share why you should read it.

What is this book about?

"When it comes to software security, the devil is in the details. This book tackles the details."
--Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies



"McGraw's book shows you how to make the 'culture of security' part of your development lifecycle."
--Howard A. Schmidt, Former White House Cyber Security Advisor



"McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn't), buy this book and post it up on the lunchroom wall."
--Avi Rubin, Director of the NSF…


Book cover of The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Book cover of This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Book cover of Ghost Fleet: A Novel of the Next World War

Share your top 3 reads of 2024!

And get a beautiful page showing off your 3 favorite reads.

1,223

readers submitted
so far, will you?

5 book lists we think you will like!

Interested in computer security, Russia, and cyber crimes?

Russia 385 books
Cyber Crimes 14 books