Fans pick 22 books like Hash Crack

By Joshua Picolet,

Here are 22 books that Hash Crack fans have personally recommended if you like Hash Crack. Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.

When you buy books, we may earn a commission that helps keep our lights on (or join the rebellion as a member).

Book cover of The Battle of Midway

Mark Ciampa Author Of Security Awareness: Applying Practical Security in Your World

From my list on how to break things (encryption, passwords, etc.).

Why am I passionate about this?

I have had the opportunity to write (I have written over 30 college textbooks on technology, most of them in the area of cybersecurity), study (my PhD dissertation was on cybersecurity), teach (I have taught at colleges and universities my entire career about technology, networking, and cybersecurity), and research (I have published numerous peer-reviewed journal articles) on the topic of cybersecurity. But I have always had a soft spot in my heart for the average computer user who struggles with how to protect their technology devices. This has helped drive my passion to focus on practical cybersecurity for everyone.

Mark's book list on how to break things (encryption, passwords, etc.)

Mark Ciampa Why did Mark love this book?

Perhaps the best book on the epic World War II Battle of Midway, Craig Symonds brings together all the pieces that became the turning point in the Pacific War. Looking at the leadup to the battle from both the Japanese and American perspectives, Symonds shows how the Japanese, in their typical style, created a battle plan that was overly complicated for its objective. Symonds explains how American Joe Rochefort and his eclectic band (he even had commissioned naval musicians) worked to bend (but not entirely break) the Japanese naval code. This allowed the Allies to surmise Midway as the Japanese target and set in place their own battle plan. Symonds clearly explains how the codebreaking efforts played a huge role in this battle of battles.

By Craig L. Symonds,

Why should I read it?

2 authors picked The Battle of Midway as one of their favorite books, and they share why you should read it.

What is this book about?

There are few moments in American history in which the course of events tipped so suddenly and so dramatically as at the Battle of Midway. At dawn of June 4, 1942, a rampaging Japanese navy ruled the Pacific. By sunset, their vaunted carrier force (the Kido Butai) had been sunk and their grip on the Pacific had been loosened forever.

In this riveting account of a key moment in the history of World War II, one of America's leading naval historians, Craig L. Symonds, paints an unforgettable portrait of ingenuity, courage, and sacrifice. Symonds begins with the arrival of Admiral…


Book cover of Battle of Wits: The Complete Story of Codebreaking in World War II

Mark Ciampa Author Of Security Awareness: Applying Practical Security in Your World

From my list on how to break things (encryption, passwords, etc.).

Why am I passionate about this?

I have had the opportunity to write (I have written over 30 college textbooks on technology, most of them in the area of cybersecurity), study (my PhD dissertation was on cybersecurity), teach (I have taught at colleges and universities my entire career about technology, networking, and cybersecurity), and research (I have published numerous peer-reviewed journal articles) on the topic of cybersecurity. But I have always had a soft spot in my heart for the average computer user who struggles with how to protect their technology devices. This has helped drive my passion to focus on practical cybersecurity for everyone.

Mark's book list on how to break things (encryption, passwords, etc.)

Mark Ciampa Why did Mark love this book?

It is hard to underestimate the significance of code breaking during World War II. Without the work of dedicated mathematicians, linguists, and others the great conflicts such as the Battle of Midway and the German U-boat "wolfpacks" that sank over 13 million tons of Allied supplies could have easily been up for grabs. But due to the codebreakers the balance shifted to the Allies. And what is even equally impressive is that the Axis powers never knew that their encoded messages were being read. Stephen Budiansky traces how the codebreakers pulled off this feat while at the same time often battling within their own ranks about who should decode the message, how the messages should be used, and who should get the credit.

By Stephen Budiansky,

Why should I read it?

2 authors picked Battle of Wits as one of their favorite books, and they share why you should read it.

What is this book about?

Drawing from newly declassified documents, the author chronicles the story of codebreaking during the last world war, from cat-and-mouse games with Nazi U-boats to the invasion of Normandy.


Book cover of The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography

Rob Conery Author Of The Imposter's Handbook: A CS Primer for Self-taught Developers

From my list on self-taught programmers.

Why am I passionate about this?

I taught myself to code back in 1994 while working the graveyard shift as a geologist in the environmental industry. My job consisted of sitting in a chair during the dark hours of the night in a shopping center in Stockton, CA, watching another geologist take samples from wells in the parking lot. A friend of mine suggested I learn to code because I liked computers. I don’t mean to make this out to be a “it’s so simple anyone can do it!” You need to have a relentless drive to learn, which is why I wrote my book, The Imposter’s Handbook - as an active step to learning what I didn’t know I didn’t know.

Rob's book list on self-taught programmers

Rob Conery Why did Rob love this book?

This book makes me jealous as the author has an incredible ability to communicate the densest of topics (Cryptography) in an engaging, wonderful way.

It draws you in and you find yourself transported to battlefields and war rooms of the past. I’ve always taken cryptography for granted - I type https into my browser and navigate to a site and all’s well. I know things are reasonably secure - but why?

It turns out that RSA, the algorithm that underpins things like SSL and SSH, is a landmark of human achievement and did something that millennia of mathematicians and scientists could not: provide secure, end-to-end encryption. A wonderful story.

By Simon Singh,

Why should I read it?

4 authors picked The Code Book as one of their favorite books, and they share why you should read it.

What is this book about?

In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.

Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable…


Book cover of Seizing the Enigma: The Race to Break the German U-boat Codes, 1939-1943

Mark Ciampa Author Of Security Awareness: Applying Practical Security in Your World

From my list on how to break things (encryption, passwords, etc.).

Why am I passionate about this?

I have had the opportunity to write (I have written over 30 college textbooks on technology, most of them in the area of cybersecurity), study (my PhD dissertation was on cybersecurity), teach (I have taught at colleges and universities my entire career about technology, networking, and cybersecurity), and research (I have published numerous peer-reviewed journal articles) on the topic of cybersecurity. But I have always had a soft spot in my heart for the average computer user who struggles with how to protect their technology devices. This has helped drive my passion to focus on practical cybersecurity for everyone.

Mark's book list on how to break things (encryption, passwords, etc.)

Mark Ciampa Why did Mark love this book?

David Kahn explains the most widely-known effort (widely-known today but in complete secrecy then) to decipher messages sent by the Germans using their Enigma machines during World War II. This book looks at the groundbreaking work done by Polish mathematicians in the 1930s, how Enigma machines were rescued from sinking German U-boats, and how Bletchley Park in Britain became the focal point of breaking these transmissions. Much of the book focuses on how Enigma machines, rotors, and codebooks were confiscated from German submarines and surface vessels, and how these were then used to allow the Allies, by the war's end, to read German messages almost as quickly as the Germans could send them.

By David Kahn,

Why should I read it?

1 author picked Seizing the Enigma as one of their favorite books, and they share why you should read it.

What is this book about?

Seizing the Enigma tells the thrilling story of the Royal Navy's battle to crack the Germans' supposedly unbreakable U-boat Enigma code, which would allow the vital Allied convoys in the North Atlantic to be routed away from Doenitz's wolfpacks. This battle was fought both on shore and at sea: by an assortment of scientists, chess champions and linguists, including Alan Turing, the father of the modern computer, who struggled to crack Enigma at Bletchley Park, and in the Atlantic by sailors and intelligence officers, such as Ian Fleming, the future creator of James Bond, who undertook dangerous and often fatal…


Book cover of Cryptonomicon

Robert J. Lloyd Author Of The Bloodless Boy

From my list on science-based historical fiction novels.

Why am I passionate about this?

I write as Robert J. Lloyd, but my friends call me Rob. Having studied Fine Art at a BA degree level (starting as a landscape painter but becoming a sculpture/photography/installation/performance generalist), I then moved to writing. During my MA degree in The History of Ideas, I happened to read Robert Hooke’s diary, detailing the life and experiments of this extraordinary and fascinating man. My MA thesis and my Hooke & Hunt series of historical thrillers are all about him. I’m fascinated by early science, which was the initial ‘pull’ into writing these stories, but the political background of the times (The Popish Plot and the Exclusion Crisis, for example) is just as enticing. 

Robert's book list on science-based historical fiction novels

Robert J. Lloyd Why did Robert love this book?

About WWII codebreaking, the reason this makes my ‘Best 5’ is that, besides being constantly inventive and informative, it’s also very funny. (I’m that shallow.)

There are similarities, I think, with Catch 22, in the plot’s intelligence, absurdity, and dreamlike turns.

I think Stephenson’s character Bobbie Shaftoe, a soldier who carries out counterintelligence deceptions, is hilarious. Also, Stephenson’s use of real historical characters–he presents believable portraits of Alan Turing, Douglas MacArthur, Karl Dönitz, and Hermann Göring, with a walk-on appearance by Albert  Einsteingave me license to do so in my own fiction.

By Neal Stephenson,

Why should I read it?

5 authors picked Cryptonomicon as one of their favorite books, and they share why you should read it.

What is this book about?

With this extraordinary first volume in an epoch-making masterpiece, Neal Stephenson hacks into the secret histories of nations and the private obsessions of men, decrypting with dazzling virtuosity the forces that shaped this century.

In 1942, Lawrence Pritchard Waterhouse—mathematical genius and young Captain in the U.S. Navy—is assigned to detachment 2702. It is an outfit so secret that only a handful of people know it exists, and some of those people have names like Churchill and Roosevelt. The mission of Waterhouse and Detachment 2702—commanded by Marine Raider Bobby Shaftoe-is to keep the Nazis ignorant of the fact that Allied Intelligence…


Book cover of Threat Modeling: Designing for Security

Dominik Merli Author Of Engineering Secure Devices: A Practical Guide for Embedded System Architects and Developers

From my list on embedded system security enthusiasts.

Why am I passionate about this?

I’ve been playing with computers and electronics since childhood. I even supported the people in my village with their computer issues back then. During my studies in electrical engineering, I learned how to solve technical challenges with structured approaches. At this time, I became fascinated by topics like cryptography and embedded system security. The books on this list helped me understand important concepts and practical real-world obstacles. I hope they are also of value to you!

Dominik's book list on embedded system security enthusiasts

Dominik Merli Why did Dominik love this book?

I love this book because it has the power to pull even technical people out of their “security technology will save the world” bubble. I regularly encounter engineers randomly throwing countermeasures like strong encryption, secure boot, and TPMs at devices without knowing why.

This book provided me with a set of methods and practical hints for identifying and assessing relevant security threats—a much better starting point than penetration testing! 

By Adam Shostack,

Why should I read it?

1 author picked Threat Modeling as one of their favorite books, and they share why you should read it.

What is this book about?

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn…


Book cover of A Museum of Early American Tools

Kevin Cornell Author Of New in Town

From my list on world-building.

Why am I passionate about this?

I believe stories to be our species’ instinctual tool for discovering our best selves. Sometimes those stories are about real people in the past, sometimes they’re completely imagined people in the future — sometimes we even swap out the humans for animals or aliens, or sassy anthropomorphized objects. Whatever the case, for a story to work its wonders, its details must be believable, or we reject its premise. These books help make a story believable, and, if you get the alchemy just right, those details can even help tell the story themselves.

Kevin's book list on world-building

Kevin Cornell Why did Kevin love this book?

Nothing angers me more than when a book tries to explain something in words when it can be communicated much more effectively through illustration. That’s the beauty of Eric Sloane. The man visually recorded everything from weather phenomena to architecture to tools of bygone eras. I’m recommending the book A Museum of Early American Tools because its the one I’ve found the most useful, but I recommend checking out any of his books. At the very least, it can help you appreciate how those design decisions we take for granted— the roof of a barn, or the shape of a hammer handle— were honed by a balance of tradition, practicality, and circumstance.

By Eric Sloane,

Why should I read it?

1 author picked A Museum of Early American Tools as one of their favorite books, and they share why you should read it.

What is this book about?

This absorbing and profusely illustrated book describes in detail scores of early American tools and the wooden and metal artifacts made with them. Informally and expressively written, the text covers bulding tools and methods; farm and kitchen implements; and the tools of curriers, wheelwrights, coopers, blacksmiths, coachmakers, loggers, tanners, and many other craftsmen of the pre-industrial age. Scores of pen-and-ink sketches by the author accurately depict "special tools for every job," among them a hollowing gouge, hay fork, cornering chisel, apple butter paddle, boring auger, mortising chisel, a holding dog, hauling sledge, winnowing tray, reaping hooks, splitting wedge, felling axe,…


Book cover of Domain-Specific Languages

Alexander Granin Author Of Functional Design and Architecture

From my list on domain modeling.

Why am I passionate about this?

If someone had told me during my early professional years that I would become a strong advocate for functional programming and the author of a fundamental book on functional software engineering, I would have found it hard to believe. Was functional programming truly worth dedicating my life to? However, once I experienced the sheer beauty of functional programming, there was no turning back. I delved deep into Haskell and functional C++, and began writing articles, giving talks, and developing various technologies. I realized that I possessed a truly unique perspective on approaching software engineering in functional languages, and that there was a significant knowledge gap that needed to be filled for the benefit of all.

Alexander's book list on domain modeling

Alexander Granin Why did Alexander love this book?

It was a wonderful time when I first embarked on my programming journey.

I felt an immense sense of power over computers and had countless ideas on how programming could improve my life and the lives of others. Everything seemed within reach, and I approached the world of programming with great enthusiasm in the early 2000s.

However, reality hit me like a cold shower when I started delving into actual software development. I quickly realized that it was far more challenging than just writing code.

Each programming language and technology had its hidden complexities and treacherous pitfalls. Every domain was rife with intricate nuances that had to be understood before attempting to develop software within it. I soon discovered that there was no such thing as a "perfect solution" that could be universally applied.

As I ventured into working with real-world domains, I confronted the daunting task of addressing the…

By Martin Fowler,

Why should I read it?

1 author picked Domain-Specific Languages as one of their favorite books, and they share why you should read it.

What is this book about?

When carefully selected and used, Domain-Specific Languages (DSLs) may simplify complex code, promote effective communication with customers, improve productivity, and unclog development bottlenecks. In Domain-Specific Languages, noted software development expert Martin Fowler first provides the information software professionals need to decide if and when to utilize DSLs. Then, where DSLs prove suitable, Fowler presents effective techniques for building them, and guides software engineers in choosing the right approaches for their applications.

This book's techniques may be utilized with most modern object-oriented languages; the author provides numerous examples in Java and C#, as well as selected examples in Ruby. Wherever possible,…


Book cover of Advanced Programming in the Unix Environment

Arnold Robbins Author Of Linux Programming by Example

From my list on for learning the Zen of Unix.

Why am I passionate about this?

I am a professional software developer and technical author, with a number of books published by O’Reilly and Prentice Hall. I have been working in the C / C++ / Unix / Linux world for over four decades. I am also the maintainer of the Free Software Foundation’s GNU Awk interpreter for the awk programming language. I have a passion for writing clear, correct, efficient, and portable code, and for applying the UNIX and Software Tools principles in my development. I hope that this book list will help you climb the learning curve of doing great Unix / Linux development.

Arnold's book list on for learning the Zen of Unix

Arnold Robbins Why did Arnold love this book?

Modern Unix systems (including Linux) offer a wealth of APIs. This book provides detailed instruction, including sample code, on how to make the best use of them. It is a one-stop-shop for mastering the details of Unix programming in C.

I recommend the book because it is thorough, authoritative, and clearly written. Richard Stevens was a well-known author and consultant and his books are models of clear exposition. Steven Rago is an experienced Unix developer and author as well.

By W. Richard Stevens, Stephen Rago,

Why should I read it?

1 author picked Advanced Programming in the Unix Environment as one of their favorite books, and they share why you should read it.

What is this book about?

For more than twenty years, serious C programmers have relied on one book for practical, in-depth knowledge of the programming interfaces that drive the UNIX and Linux kernels: W. Richard Stevens' Advanced Programming in the UNIX (R) Environment. Now, once again, Rich's colleague Steve Rago has thoroughly updated this classic work. The new third edition supports today's leading platforms, reflects new technical advances and best practices, and aligns with Version 4 of the Single UNIX Specification.



Steve carefully retains the spirit and approach that have made this book so valuable. Building on Rich's pioneering work, he begins with files, directories,…


Book cover of How to Use Woodworking Tools

Graham Blackburn Author Of Traditional Woodworking Handtools: A Manual for the Woodworker

From my list on traditional woodworking.

Why am I passionate about this?

Born in London, I apprenticed under cabinetmaker Hugh Harris before moving to New York to study at Juilliard. Subsequently pursuing a career as a professional musician, recording and playing with groups including Van Morrison, Razmataz, and Full Tilt Boogie, I built a house in Woodstock, NY. In addition to operating my own custom-design furniture-making shop, and lecturing and teaching extensively from coast to coast, I’ve written and illustrated many more books on woodworking. I’ve served as Contributing Editor to Fine Woodworking (1985–1999), and Popular Woodworking (1987–1996), and as Editor-in-Chief of Woodwork Magazine (1991–1994) before becoming a featured speaker and presenter at the National Woodworking Shows.

Graham's book list on traditional woodworking

Graham Blackburn Why did Graham love this book?

Published in 1881 this is an absolutely fundamental book for the beginner. Amply illustrated, you will learn important details such as how to hold tools and what to expect from them as well as how basic joints are formed and made. Focused on wooden tools this is information not commonly reproduced in more contemporary books.

This book is not currently available.

By R.L. Bridgman,

Why should I read it?

1 author picked How to Use Woodworking Tools as one of their favorite books, and they share why you should read it.


Book cover of The Battle of Midway
Book cover of Battle of Wits: The Complete Story of Codebreaking in World War II
Book cover of The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography

Share your top 3 reads of 2024!

And get a beautiful page showing off your 3 favorite reads.

1,586

readers submitted
so far, will you?

5 book lists we think you will like!

Interested in operating system, woodworking, and cryptography?

Operating System 11 books
Woodworking 27 books
Cryptography 31 books