Here are 86 books that Ghost Fleet fans have personally recommended if you like
Ghost Fleet.
Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.
I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.
The first person to ever catch a hacker wasn’t an FBI or CIA agent. It was an astronomer, and his name was Clifford Stoll. This book is a biographical account of how he took on a German hacker who was selling secrets to the KGB in the 1980s. I love this book because it shows how anyone can play a role in cybersecurity.
As a kid, I watched the TV adaptation of the book for PBS’s NOVA program and went into cybersecurity in large part because of Stoll. Because cybersecurity wasn’t a profession at the time, Stoll created his own innovative techniques, like building the first computer honeypot to help catch the hacker in action. When his book was made into a PBS documentary, as a thank you for putting up with him and all the crazy things he had to do to track the hacker, he had all of…
Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name…
I’ve been passionate about science as a way of learning how nature works and approaching truth since I was a pre-teen. After five decades of basic research, teaching, and management in physics, I can distinguish good science from pseudoscience even beyond my own areas of expertise. I am greatly disturbed by attempts to undermine science in public policy-making when its findings conflict with ideology, religious beliefs, or business bottom lines. My passion project, via my blog debunkingdenial.com, is to explain to teachers and the public the underlying science and the flaws in science denial across a wide range of topics at the interface with public policy.
I love this book because Perlroth chronicles the proliferation of cyberweapons, which began in the hands of mischievous young hackers exploiting vulnerabilities in widely used software. Once some of those hackers joined the NSA, their tools were developed into sophisticated weapons to undercut technological developments in enemy states like Iran.
Once NSA’s hacks leaked to the wider world, they spawned an arms race and fueled rampant criminal ransomware attacks on vulnerable institutions. Informed by Perlroth’s book, I see a future in which dwindling human fertility and the ballooning costs of advanced weaponry will enhance the military role of cyber-attacks, leading to Mutually Assured Cyber Destruction, in which many countries have cyberweapons deeply embedded in the critical infrastructure of their adversaries, just waiting to activate them.
THE NEW YORK TIMES BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations)
"Written in the hot, propulsive prose of a spy thriller" (The New York Times), the untold story of the cyberweapons market-the most secretive, government-backed market on earth-and a terrifying first look at a new kind of global warfare.
Zero-day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero-day has the power…
I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.
Amoroso’s experience started with academic research at Bell Labs and Stevens Institute of Technology but moved quickly to practically fill voids at AT&T and NSA. His book reduces technical concepts in cybersecurity to basic principles and explains generically how they are effectively implemented. For the true techy who wants to fully understand all the formal logic behind the theories in Cyber Attacks, reach back to Ed Amoroso’s Fundamentals of Computer Security Technology (1994).
Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well.
This book covers cyber security policy development for…
Truth told, folks still ask if Saul Crabtree sold his soul for the perfect voice. If he sold it to angels or devils. A Bristol newspaper once asked: “Are his love songs closer to heaven than dying?” Others wonder how he wrote a song so sad, everyone who heard it…
I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.
It is a reporter’s account of a cybersecurity entrepreneur stumbling into criminal and nation-state level cyberattacks, assisting in the investigation, and ultimately becoming a target. The writing is clear and accessible to the non-technical reader but it still conveys a good sense of what it is like to witness and investigate cyber-crime. It is a suspenseful human drama.
In 2004, a California computer whiz named Barrett Lyon uncovered the identity of a hacker running major assaults on business websites. Without fully grasping the repercussions, he set on an investigation that led him into the heart of the Russian mob. Cybercrime was evolving. No longer the domain of small-time thieves, it had been discovered by sophisticated gangs. They began by attacking corporate websites but increasingly stole financial data from consumers and defence secrets from governments. While Barrett investigated the cutting edge of technology crime, the U.S. government struggled to catch up. Britain, however, was a different story. In the…
My firsthand experience of the Cold War influenced my taste in reading and entertainment from an early age. I’ve spent my entire adult life collecting books and movies that showcase adventure and adversity in situations where combinations of war and climate change have brought about the end of life as we knew it. All those influences have inspired me to make my own contributions to this form of literature.
This storyline blew me away with its fast pace and realism. All the heartaches and firefights come so fast, you barely have time to catch your breath. I was fascinated by the way so many of the chapters read like scenes from a movie. It made me want to read more.
This story is the first novel in a series about the adventures of a four man elite survival team, set up to keep things under control in post World War III America. In this first story they have to transport the President from war ravaged Washington to a fortress 1000 miles away.
I started telling Sea Stories around February 1992, when I reported to the Recruit Training Center, Great Lakes, Illinois. Since then, I’ve been entertaining anyone who would listen with my hyperbolic storytelling, a loose relationship with the facts, and a total disregard for modesty. Writing these stories really showcases my experiences not only in the Navy but as a student of history and international relations. I couldn’t possibly write the whole story without having received my BA in International Relations from the University of California at Riverside and my Law Degree from Southern Methodist University.
This is the brass ring of Cold War turns Hot military fiction. I loved what Tom Clancy put down on paper back in 1986 and truly believe that without this book, none of the others on this list would have been written. I loved the depth and detail that Clancy digs into with regard to operational planning as well as tactical combat operations.
I can’t compliment him enough on his easy explanation of complex systems and operations. If you like “rivet counting” this book is going to blow your mind. As a former Russian linguist for the Navy, I’m impressed with Clancy’s understanding of Soviet politics and strategy. As a self taught civilian, he knocks it out of the park.
Tom Clancy's second classic No 1 bestselling thriller - a chillingly authentic vision of modern war - now reissued in a new cover.
Three Muslim terrorists who destroyed the Soviet Union's largest petrochemical plant thought they were striking a blow for freedom. What they had done, unknowingly, was fire the first shots in World War III.
Desperately short of oil, the Kremlin hawks see only one way of solving their problem: seize supplies in the Persian Gulf. To do that, they must first neutralise NATO's forces and eliminate their response - and so they develop Red Storm, a dazzling master…
It is April 1st, 2038. Day 60 of China's blockade of the rebel island of Taiwan. The US government has agreed to provide Taiwan with a weapons system so advanced, it can disrupt the balance of power in the region. But what pilot would be crazy enough to run the…
I am an American-born writer and I have been writing fantasy and science fiction since I was just out of elementary school. I have been obsessed with Star Wars (and later Trek) since I was able to watch television, and I believe I was twelve when Peter Jackson’s Fellowship of the Ring hit theaters…needless to say, I have not stopped reading and writing fantasy since. The books on my list are some (but not all) of my very favorites and many of them have gone on to heavily inspire my own style when writing my own works.
Every entry of Brandon Sanderson’s Stormlight Archive is epic, hands down.
Filled with fantasy lore, action, weird magic, and displeased gods, yes, there is something good to say about every book in the series so far. But book 2, Words of Radiance, is filled with moment after moment where I found myself standing up and pumping my fist in the air after the story’s main protagonist does something terrifically badass, especially in the latter half of the novel.
It’s got all the other good stuff, too. Like its predecessor, The Way of Kings, it has plenty of light humor, moments of shared brotherhood in the face of oppression, complicated characters, sweeping battles…but those moments of tension building followed by resounding victory are excellently written and gets my heart pumping to this day.
From #1 New York Times bestselling author Brandon Sanderson, Words of Radiance, Book Two of the Stormlight Archive, continues the immersive fantasy epic that The Way of Kings began.
Expected by his enemies to die the miserable death of a military slave, Kaladin survived to be given command of the royal bodyguards, a controversial first for a low-status "darkeyes." Now he must protect the king and Dalinar from every common peril as well as the distinctly uncommon threat of the Assassin, all while secretly struggling to master remarkable new powers that are somehow linked to his honorspren, Syl.
I was born and spent my childhood living under a tyrannical regime that indiscriminately used violence against innocent civilians. Such cruelty made a lasting impact on me. For the past thirty-two years, I have been teaching philosophy at Seton Hall University. Given my childhood experiences, I have chosen to write on issues related to social and political philosophy and applied ethics. After the catastrophic event of 9/11, I wondered about the motivations, explanations, justifications, or excuses for this kind of unprecedented act of war against civilians. I have spent a great deal of my research exploring the relationship between justified acts of war and terrorist acts.
Fotion has written a short and accessible book for a general audience defending the relevance of just war theory to address issues of war. He distinguished between two different conceptions of just war: one that applies to interstate armed conflicts and one that applies between states and non-state actors. While the distinction between interstate armed conflicts and those between state and non-state actors might be useful at times, the principles of jus ad bellum (the right to wage war) based on the right of self-defense and jus in bello (the right way to wage war) based on respecting the immunity of innocent civilians remains constant in both types of armed conflict. Yet since he explores the nuances of both approaches, his book is a welcome development illustrating the relevance of the just war tradition nowadays.
The US-led invasion of Iraq in 2003 prompted unprecedented public interest in the ethics of war, a debate that has raged furiously in the media, in politics and in the public consciousness ever since. In this fascinating and informative book, Nicholas Fotion, an expert on the ethics of military action, explores the notion of developing an ethical theory that guides the behaviour of those who are at war. Fotion gives a clear account of just war theory, presenting it as a useful device in helping us make decisions about what we should do when war appears on the horizon. Examining…
One might read for many reasons, but one of the main reasons for me is to connect and relate to the character. Female voices are very underheard, and I feel incredibly passionate about changing that and creating and reading stories where the female protagonists have strong voices and are not afraid to be heard. I think it’s important that we continue to create female characters that are raw and real and that portray subjects and feelings that need to be heard more.
I loved this book for so many reasons. The world-building is beautiful, the plot line is intriguing, and the main female character has a lot of depth to her. She’s beautiful and courageous, kind but strong, and she does anything for those she loves.
I saw much of myself in her character, which helped immerse me in the book as I read it. I’m a sucker for any book with a female protagonist that has a lot of depth; I feel it makes them more real, as we all have different sides to our personalities.
THE INSTANT SUNDAY TIMES BESTSELLER
'Epic, romantic, and enthralling from start to finish' Stephanie Garber
The stunning conclusion to the Celestial Kingdom Duology
After winning her mother's freedom from the Celestial Emperor, Xingyin thrives in the enchanting tranquility of her home. But her fragile peace is threatened by the discovery of a strange magic on the moon, and the unsettling changes in the Celestial Kingdom as the emperor tightens his grip on power.
While Xingyin is determined to keep clear of the rising danger, the discovery of a shocking truth spurs her into a perilous confrontation. Forced to flee her…
In a kill-or-be-killed world, The Reaper does whatever it takes to survive.
Following the murder of his half-brother, legendary Army Ranger Luke Foster returns to the United States from fighting terrorists. His brother's history with a prominent New York Mafia family was no secret, so it's no surprise his life…
I’m a retired English prof with a lifelong interest in history. My father fostered my fascination with Civil War battlefields, and growing up in Florida, I studied the Seminole wars in school and later at FSU. While teaching at the University of Idaho (nearly 50 years), I pursued my interest in the Indian wars of the mid-19th century and developed a curiosity about tribes in the inland Northwest, notably the Coeur d’Alene, Spokane, and Nez Perce. My critical biography of Blackfeet novelist James Welch occasioned reading and research on the Plains tribes. I recommend his nonfiction book,Killing Custer: The Battle of Little Bighorn and the Fate the Plains Indians.
Because Crook (not Custer!) was probably the most successful and thoughtful general officer to lead troops in the West. Robinson traces Crook’s career from the 1850s Rogue River War in the Oregon Territory, through the Great Sioux War of the 1870s, concluding with the pursuit of Geronimo in the 1880s, where he achieved his greatest fame. And because, as indicated in an epigraph, quoting Oglala Chief Red Cloud, “He, at least, never lied to us.” I found comments on Crook’s employment of tribal scouts especially informative. Robinson concludes, “In war, he could be as cruel as they, but he always respected them as human beings.” He doesn’t apotheosize Crook, who reflected the views of his era in advocating assimilation to make Indians useful and productive citizens “by white standards.”
General George Crook was one of the most prominent soldiers in the frontier West. General William T. Sherman called him the greatest Indian fighter and manager the army ever had. And yet, on hearing of Crook's death, the Sioux chief Red Cloud lamented, "He, at least, never lied to us." As a young officer in the Pacific Northwest, Crook emphasized training and marksmanship--innovative ideas in the antebellum army.
Crook's career in the West began with successful campaigns against the Apaches that resulted in his promotion to brigadier general. His campaign against the Lakota and Cheyennes was less successful, however, as…