34 books like SafeCyberHome

By Billy VanCannon,

Here are 34 books that SafeCyberHome fans have personally recommended if you like SafeCyberHome. Shepherd is a community of 10,000+ authors and super readers sharing their favorite books with the world.

Shepherd is reader supported. When you buy books, we may earn an affiliate commission.

Book cover of Cybersecurity Is Everybody's Business: Solve the Security Puzzle for Your Small Business and Home

Eric J. Rzeszut Author Of 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

From my list on to help you protect your personal information.

Why am I passionate about this?

I have been an information technology and cybersecurity professional for over two decades. I’ve learned over and over again that “people are the weakest link.” You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via “social engineering” – to trick a human being into giving you the access you need, rather than trying to hack the system itself. The books on this list will help the reader lower their chances of being exploited like this.

Eric's book list on to help you protect your personal information

Eric J. Rzeszut Why did Eric love this book?

Cybersecurity is Everybody’s Business is a great book that focuses not only on the how to keep your data safe, but on the very critical why this is important. Author Scott Schober suffered a grievous cyberattack in a previous business, and he brings his experience to the forefront in this guide. Joined by his brother as co-author, they focus on cybersecurity for the home and small business – environments that are unlikely to employ full-time cybersecurity professionals. (That’s why these places are often targets for the bad guys!)

By Scott N. Schober, Craig W. Schober,

Why should I read it?

1 author picked Cybersecurity Is Everybody's Business as one of their favorite books, and they share why you should read it.

What is this book about?

Since publication of his first book, HACKED AGAIN, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes. Now joined by his brother Craig, the two have set their sights on the biggest target of all, small businesses.

There are 30 million small businesses currently operating in the United States. Some of them are single owner/operated while others collectively employ hundreds of millions. This book is for all of them and anyone who makes it their business to stay safe…


Book cover of How to Stay Safe on Social Media: Social Media Dos and Don'ts: What Kids and Parents Should Know

Eric J. Rzeszut Author Of 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

From my list on to help you protect your personal information.

Why am I passionate about this?

I have been an information technology and cybersecurity professional for over two decades. I’ve learned over and over again that “people are the weakest link.” You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via “social engineering” – to trick a human being into giving you the access you need, rather than trying to hack the system itself. The books on this list will help the reader lower their chances of being exploited like this.

Eric's book list on to help you protect your personal information

Eric J. Rzeszut Why did Eric love this book?

This book focuses on cybersecurity for parents and teenagers, specifically focusing on social media. As a parent of a teenager myself, I know how critical this area really is. Teens are often using social networks and communication channels that their parents are mostly or completely unfamiliar with. Due to that lack of familiarity, parents have a hard time monitoring or setting appropriate limits on the ways their children use social media. Author Effie Manolas wrote this book for both parents and teens, enabling an open conversation on both the benefits and the risks of social media.

By Effie Manolas,

Why should I read it?

1 author picked How to Stay Safe on Social Media as one of their favorite books, and they share why you should read it.

What is this book about?

Do you feel your child isn’t using social media correctly?

Social media is a powerful platform that can either make the world better–or more dangerous. When a person doesn’t know how to use social media the right way, they can break relationships, disseminate false information, or even tarnish their own reputation.

As a parent, the last thing you want is for your child to be using social media in a way that can hurt them. But parents can hardly help their children if they themselves remain oblivious to the repercussions of their behavior on social media.

Teach your child to…


Book cover of The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Eric J. Rzeszut Author Of 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

From my list on to help you protect your personal information.

Why am I passionate about this?

I have been an information technology and cybersecurity professional for over two decades. I’ve learned over and over again that “people are the weakest link.” You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via “social engineering” – to trick a human being into giving you the access you need, rather than trying to hack the system itself. The books on this list will help the reader lower their chances of being exploited like this.

Eric's book list on to help you protect your personal information

Eric J. Rzeszut Why did Eric love this book?

Kevin Mitnick is often called the “world’s most famous hacker,” and he spent years in prison for his crimes. However, he’s since reformed, and now advises individuals and corporations on how to protect their data. In this book, he talks about strategies that we can all use to better protect our data from exploitation by corporations and governments. Although it’s never possible to be truly “invisible” (despite the title of his book) he presents some great strategies to lower your risk profile.

By Kevin D. Mitnick,

Why should I read it?

1 author picked The Art of Invisibility as one of their favorite books, and they share why you should read it.

What is this book about?

Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and…


Book cover of Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

Eric J. Rzeszut Author Of 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

From my list on to help you protect your personal information.

Why am I passionate about this?

I have been an information technology and cybersecurity professional for over two decades. I’ve learned over and over again that “people are the weakest link.” You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via “social engineering” – to trick a human being into giving you the access you need, rather than trying to hack the system itself. The books on this list will help the reader lower their chances of being exploited like this.

Eric's book list on to help you protect your personal information

Eric J. Rzeszut Why did Eric love this book?

Security expert Bruce Schneier wrote this excellent book, talking about the “Goliaths” who are looking to exploit individuals’ data. Focusing more on politics (specifically US politics) than the other books on this list, Schneier talks about the Edward Snowden classified information reveal. He talks about mass surveillance conducted by the US and other governments around the world, and lays out in detail why this should concern us all.

By Bruce Schneier,

Why should I read it?

1 author picked Data and Goliath as one of their favorite books, and they share why you should read it.

What is this book about?

Data is everywhere. We create it every time we go online, turn our phone on (or off) or pay with a credit card. This data is stored, studied, bought and sold by companies and governments for surveillance and for control. "Foremost security expert" (Wired) Bruce Schneier shows how this data has led to a double-edged Internet-a Web that gives power to the people but is abused by the institutions on which those people depend.

In Data and Goliath, Schneier reveals the full extent of surveillance, censorship and propaganda in society today, examining the risks of cybercrime, cyberterrorism and cyberwar. He…


Book cover of Await Your Reply

Jan-Andrew Henderson Author Of The Kirkfallen Stopwatch

From my list on absolutely crazy plots.

Why am I passionate about this?

I’ve written many types of book—fiction and non-fiction—for readers of all ages. But I keep returning to my first passion—the clever, crazy, over the top psychological thrillers I was addicted to reading or watching on TV when I was growing up. I’ve always loved trying to write page turners with plots readers have never seen before. Certainly, I want my audience to care about the book’s characters and laugh at the one-liners. But nothing beats making people think… there’s no way he can possibly pull all these plot strands together at the end. And then doing it. Besides, my nutty thrillers are the ones that get the best reviews.

Jan-Andrew's book list on absolutely crazy plots

Jan-Andrew Henderson Why did Jan-Andrew love this book?

I love an intricate plot. But sometimes you want some real literary heft to go along with it. In which case, you can’t do better than anything by Dan Chaon.

A lot of books witter on about the nature of self and identity. This one actually nails it. The characterizations and descriptions are superb. Best of all, it’s a sublimely written triple mystery, whose disparate strands finally lock in a devastating fashion.

By Dan Chaon,

Why should I read it?

1 author picked Await Your Reply as one of their favorite books, and they share why you should read it.

What is this book about?

BONUS: This edition contains an Await Your Reply discussion guide.

The lives of three strangers interconnect in unforeseen ways–and with unexpected consequences–in acclaimed author Dan Chaon’s gripping, brilliantly written new novel.

Longing to get on with his life, Miles Cheshire nevertheless can’t stop searching for his troubled twin brother, Hayden, who has been missing for ten years. Hayden has covered his tracks skillfully, moving stealthily from place to place, managing along the way to hold down various jobs and seem, to the people he meets, entirely normal. But some version of the truth is always concealed.

A few days after…


Book cover of The Less People Know About Us: A Mystery of Betrayal, Family Secrets, and Stolen Identity

Ericka Clay Author Of A Violent Hope

From my list on female protagonists from dysfunctional families.

Why am I passionate about this?

As a female writer, I love digging into the minds of women characters, especially in light of their family circumstances. I think we can sometimes underestimate the importance of a strong, loving family unit in terms of personal development. But what’s amazing is how a person’s story can be redeemed even if they were raised in a less-than-ideal environment. Even though I got pretty lucky in the parent department, I know not a lot of people have. And I love showing others through fiction that despite hardships they’ve had to face along the way, they are still loved and still wanted by a God who knows them better than anyone.

Ericka's book list on female protagonists from dysfunctional families

Ericka Clay Why did Ericka love this book?

This book hooked me from the get-go. Axton Betz-Hamilton is raised by two parents who are the victims of stolen identities. She lives in a world of paranoia fostered by this incident and watches as the two people she’s closest to begin to turn on each other. Years later, Axton discovers she’s also the victim of identity theft and the journey she takes to figure out why is a nail-biter!

By Axton Betz-Hamilton,

Why should I read it?

1 author picked The Less People Know About Us as one of their favorite books, and they share why you should read it.

What is this book about?

Axton Betz-Hamilton grew up in small-town Indiana in the early '90s. When she was 11 years old, her parents both had their identities stolen. Their credit ratings were ruined and they were constantly fighting over money. This was before the age of the Internet, when identity theft became more commonplace, so authorities and banks were clueless and reluctant to help Axton's parents.

Axton's family switched PO Boxes, changed all of their personal information and moved to different addresses but the identity thief followed them wherever they went. Convinced that the thief had to be someone they knew, Axton and her…


Book cover of The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime

Leslie Shannon Author Of Interconnected Realities: How the Metaverse Will Transform Our Relationship with Technology Forever

From my list on when hot new technology meets reality.

Why am I passionate about this?

I’m the Head of Trend and Innovation Scouting for Nokia, and I’ve been with the company since the glory days of Nokia mobile phone world dominance. I know first-hand what happens when a company focuses exclusively on the technology, not the humans that use it, and how quickly that can lead to disaster. One of the lessons that I see repeated continuously in the field of innovation is that a huge amount of attention gets paid to the new technology, and not nearly enough on how the technology will interact with our existing systems, beliefs, attitudes, and culture. Learning from the mistakes is the best way to make sure that the future doesn’t repeat them!

Leslie's book list on when hot new technology meets reality

Leslie Shannon Why did Leslie love this book?

Stepping away from the topic of immersive technology, The Ransomware Hunting Team instead looks at the realities of cybercrime in the US, and why especially our government infrastructure has such a hard time fighting it effectively. 

Like all the other books on my list, it’s an examination of what happens when the rubber meets the road with a new technology, and how we humans often just aren’t very good at adapting to change.  

Part of the key problem is that hackers – including the white hat hackers that you want on your side to bring down the bad guys – tend not to be social animals, and our official organizations are far happier hiring a smiling guy in a suit than a scowling nerd who would rather work from his dark bedroom at home.  (Apologies for the stereotypes, but – this really is a problem!) 

This book is an absorbing…

By Renee Dudley, Daniel Golden,

Why should I read it?

1 author picked The Ransomware Hunting Team as one of their favorite books, and they share why you should read it.

What is this book about?

Scattered across the world, an elite team of code-cracking techies is working tirelessly on your behalf to thwart the most notorious cyber scourge of our time. You've probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, especially if its cybersecurity is imperfect, chances are that you're painfully familiar with the group's sworn enemy: ransomware. Again and again, these ordinary people, mostly self-taught and often struggling to make ends meet, have outwitted the shadowy networks of hackers and criminal gangs that lock computer networks and extort huge payments in return…


Book cover of Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Jeremy N. Smith Author Of Breaking and Entering: The Extraordinary Story of a Hacker Called Alien

From my list on hackers and hacking.

Why am I passionate about this?

Jeremy N. Smith is the author of three acclaimed narrative non-fiction books, including Breaking and Entering, about a female hacker called “Alien” and the birth of our information insecurity age. He has written for The Atlantic, Discover, Slate, and the New York Times, among other outlets, and he and his work have been featured by CNN, NPR, NBC Nightly News, The Today Show, and Wired. He hosts The Hacker Next Door podcast and lives in Missoula, Montana.

Jeremy's book list on hackers and hacking

Jeremy N. Smith Why did Jeremy love this book?

A famous hacker’s real-life story, told from his own perspective, Ghost in the Wires explains how criminal hackers think and act and the diverse techniques they use, no keyboard necessary—all, in this case, with little motive beyond a compulsion to explore and exploit. The hacking community has no bigger characters than Kevin Mitnick and no better first-person accounts of the art of “social engineering,” or human hacking—manipulating people (including, in Mitnick’s case, the FBI and other would-be pursuers) to your own advantage.

By Kevin Mitnick, William L. Simon,

Why should I read it?

1 author picked Ghost in the Wires as one of their favorite books, and they share why you should read it.

What is this book about?

In this "intriguing, insightful and extremely educational" novel, the world's most famous hacker teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data (Frank W. Abagnale).

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies -- and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI's net finally began to tighten, Mitnick went on the run, engaging in an increasingly sophisticated game of hide-and-seek that escalated…


Book cover of Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet

Jennifer L. Bayuk Author Of Enterprise Security for the Executive: Setting the Tone from the Top

From my list on cybersecurity for every type of reader.

Why am I passionate about this?

I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.

Jennifer's book list on cybersecurity for every type of reader

Jennifer L. Bayuk Why did Jennifer love this book?

It is a reporter’s account of a cybersecurity entrepreneur stumbling into criminal and nation-state level cyberattacks, assisting in the investigation, and ultimately becoming a target. The writing is clear and accessible to the non-technical reader but it still conveys a good sense of what it is like to witness and investigate cyber-crime. It is a suspenseful human drama.

By Joseph Menn,

Why should I read it?

1 author picked Fatal System Error as one of their favorite books, and they share why you should read it.

What is this book about?

In 2004, a California computer whiz named Barrett Lyon uncovered the identity of a hacker running major assaults on business websites. Without fully grasping the repercussions, he set on an investigation that led him into the heart of the Russian mob. Cybercrime was evolving. No longer the domain of small-time thieves, it had been discovered by sophisticated gangs. They began by attacking corporate websites but increasingly stole financial data from consumers and defence secrets from governments. While Barrett investigated the cutting edge of technology crime, the U.S. government struggled to catch up. Britain, however, was a different story. In the…


Book cover of This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

Jennifer L. Bayuk Author Of Enterprise Security for the Executive: Setting the Tone from the Top

From my list on cybersecurity for every type of reader.

Why am I passionate about this?

I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.

Jennifer's book list on cybersecurity for every type of reader

Jennifer L. Bayuk Why did Jennifer love this book?

A reporter’s account of nation-states' relentless pursuit of superior offensive capability. Although former NSA officials may not agree with every word, it is generally acknowledged to be a true trail of facts available to reporters. Most cybersecurity staff are routinely muzzled by legal confidentiality agreements in the same manner as staff who have access to business trade secrets. There are few reporters who have had as much access as Perlroth to those individuals. 

By Nicole Perlroth,

Why should I read it?

1 author picked This Is How They Tell Me the World Ends as one of their favorite books, and they share why you should read it.

What is this book about?

THE NEW YORK TIMES BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations)

"Written in the hot, propulsive prose of a spy thriller" (The New York Times), the untold story of the cyberweapons market-the most secretive, government-backed market on earth-and a terrifying first look at a new kind of global warfare.

Zero-day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero-day has the power…


5 book lists we think you will like!

Interested in cyber crimes, computer security, and hackers?

10,000+ authors have recommended their favorite books and what they love about them. Browse their picks for the best books about cyber crimes, computer security, and hackers.

Cyber Crimes Explore 12 books about cyber crimes
Computer Security Explore 23 books about computer security
Hackers Explore 10 books about hackers