Fans pick 100 books like Sandworm

By Andy Greenberg,

Here are 100 books that Sandworm fans have personally recommended if you like Sandworm. Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.

When you buy books, we may earn a commission that helps keep our lights on (or join the rebellion as a member).

Book cover of The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

George Finney Author Of Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

From my list on books on cybersecurity that anyone can understand.

Why am I passionate about this?

I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.

George's book list on books on cybersecurity that anyone can understand

George Finney Why did George love this book?

The first person to ever catch a hacker wasn’t an FBI or CIA agent. It was an astronomer, and his name was Clifford Stoll. This book is a biographical account of how he took on a German hacker who was selling secrets to the KGB in the 1980s. I love this book because it shows how anyone can play a role in cybersecurity.

As a kid, I watched the TV adaptation of the book for PBS’s NOVA program and went into cybersecurity in large part because of Stoll. Because cybersecurity wasn’t a profession at the time, Stoll created his own innovative techniques, like building the first computer honeypot to help catch the hacker in action. When his book was made into a PBS documentary, as a thank you for putting up with him and all the crazy things he had to do to track the hacker, he had all of…

By Clifford Stoll,

Why should I read it?

4 authors picked The Cuckoo's Egg as one of their favorite books, and they share why you should read it.

What is this book about?

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name…


Book cover of The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win

George Finney Author Of Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

From my list on books on cybersecurity that anyone can understand.

Why am I passionate about this?

I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.

George's book list on books on cybersecurity that anyone can understand

George Finney Why did George love this book?

This book was one of the biggest inspirations for me when I wrote my book.

Running a team of technology experts is really hard, so instead of writing a reference manual or an inspirational leadership memoir, Kim tells the story of a group of people who work together to learn the same best practices that have been in use for decades in the manufacturing and project management industries.

This hits close to home since I can recognize myself and many of my colleagues in each of the vivid characters.

By Gene Kim, Kevin Behr, George Spafford

Why should I read it?

2 authors picked The Phoenix Project as one of their favorite books, and they share why you should read it.

What is this book about?

***Over a half-million sold! And available now, the Wall Street Journal Bestselling sequel The Unicorn Project***

"Every person involved in a failed IT project should be forced to read this book."-TIM O'REILLY, Founder & CEO of O'Reilly Media

"The Phoenix Project is a must read for business and IT executives who are struggling with the growing complexity of IT."-JIM WHITEHURST, President and CEO, Red Hat, Inc.

Five years after this sleeper hit took on the world of IT and flipped it on it's head, the 5th Anniversary Edition of The Phoenix Project continues to guide IT in the DevOps revolution.…


Book cover of The Loop: How Technology is Creating a World Without Choices and How to Fight Back

Michael Wolk

From my list on feed your internet paranoia.

Why am I passionate about this?

Researching DevilsGame, about an Internet meltdown caused by an unknown evil, I exposed myself to some harrowing truths. I learned how astonishingly frail our internet ecosystem is and how imperiled it is by bad actors who have burrowed deeply and often invisibly into its infrastructure. So, beyond writing a fictional thriller, I was moved to ring a warning bell! And I hope by formatting DevilsGame as “hyperlinked fiction,” mixing real news sites with fictional sites created for the novel, readers will experience the story in a way that parallels and parodies the way we experience real, live crises these days: navigating from fact to fiction, often without observing the boundaries.

Michael's book list on feed your internet paranoia

Michael Wolk Why did Michael love this book?

The most philosophical of my recommendations, I found this book wonderfully heartening because it places the responsibility for understanding and responding to the negative impacts of our internet-driven era firmly in our own hands.

Ward made me realize that I am (along with the multitudes!) a victim of “the Loop, “ which is when our unconscious tendencies feed into the business and cultural forces working hard and happily “to convince us we’re making independent choices when we’re doing the opposite.”

I was grateful for Ward's suggestions for becoming self-aware and freeing ourselves—and our futures—from the “shrinking choices” imposed by the Loop.

By Jacob Ward,

Why should I read it?

2 authors picked The Loop as one of their favorite books, and they share why you should read it.

What is this book about?

"The best book I have ever read about AI." -Roger McNamee, New York Times bestselling author of Zucked
Artificial intelligence is going to change the world as we know it. But the real danger isn't some robot that's going to enslave us: It's our own brain. Our brains are constantly making decisions using shortcuts, biases, and hidden processes-and we're using those same techniques to create technology that makes choices for us. In The Loop, award-winning science journalist Jacob Ward reveals how we are poised to build all of our worst instincts into our AIs, creating a narrow loop where each…


If you love Sandworm...

Ad

Book cover of Tap Dancing on Everest: A Young Doctor's Unlikely Adventure

Tap Dancing on Everest By Mimi Zieman,

Tap Dancing on Everest, part coming-of-age memoir, part true-survival adventure story, is about a young medical student, the daughter of a Holocaust survivor raised in N.Y.C., who battles self-doubt to serve as the doctor—and only woman—on a remote Everest climb in Tibet.

The team attempts a new route up…

Book cover of Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

George Finney Author Of Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

From my list on books on cybersecurity that anyone can understand.

Why am I passionate about this?

I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.

George's book list on books on cybersecurity that anyone can understand

George Finney Why did George love this book?

This isn’t just the story of the first cyberweapon ever launched by one country against another; it’s actually two detective stories woven together.

I loved how Zetter blends the stories of the cybersecurity companies trying to figure out how it was discovered and what the cyberweapon did, together with the efforts of the International Atomic Energy Agency to track down the weird anomalies popping up in Iran’s nuclear program.

This book is a lot like The Godfather in terms of storytelling. You don’t need to know what a “Zero Day” is to get something out of it.

By Kim Zetter,

Why should I read it?

1 author picked Countdown to Zero Day as one of their favorite books, and they share why you should read it.

What is this book about?

A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. 

“Immensely enjoyable . . . Zetter turns a complicated and technical cyber story into an engrossing whodunit.”—The Washington Post
 
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm…


Book cover of Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World

George Finney Author Of Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

From my list on books on cybersecurity that anyone can understand.

Why am I passionate about this?

I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.

George's book list on books on cybersecurity that anyone can understand

George Finney Why did George love this book?

I loved this one because there are so many really influential people in the world today who started out as hackers. Former Texas Legislator and presidential candidate Beto O’Rourke was a member of one of the first hacker groups, The Cult of the Dead Cow.

What really makes this one stand out for me was how Menn was able to illustrate how our culture of cybersecurity today, things like responsible disclosure of security vulnerabilities, was shaped by the hacker ethos as a response to mega corporations actively trying to ignore the problem or even suing researchers to prevent them from talking rather than to fix the issues.

By Joseph Menn,

Why should I read it?

1 author picked Cult of the Dead Cow as one of their favorite books, and they share why you should read it.

What is this book about?

Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development of Tor, the most important privacy tool on the net, and helped build cyberweapons that advanced US security without injuring anyone. With its origins in the earliest…


Book cover of Click Here to Kill Everybody: Security and Survival in a Hyper-connected World

Michael Wolk

From my list on feed your internet paranoia.

Why am I passionate about this?

Researching DevilsGame, about an Internet meltdown caused by an unknown evil, I exposed myself to some harrowing truths. I learned how astonishingly frail our internet ecosystem is and how imperiled it is by bad actors who have burrowed deeply and often invisibly into its infrastructure. So, beyond writing a fictional thriller, I was moved to ring a warning bell! And I hope by formatting DevilsGame as “hyperlinked fiction,” mixing real news sites with fictional sites created for the novel, readers will experience the story in a way that parallels and parodies the way we experience real, live crises these days: navigating from fact to fiction, often without observing the boundaries.

Michael's book list on feed your internet paranoia

Michael Wolk Why did Michael love this book?

I found the gist of this powerful book to best summed up by former National Cybersecurity Center director Rod Beckstrom's maxim: (1) anything connected to the Internet can be hacked; (2) everything is being connected to the Internet; (3) as a result, everything is becoming vulnerable.

I was shocked by the harrowing detail with which the author demonstrates our vulnerabilities: Our medical and financial information is potentially held hostage by our internet connectivity, as evidenced by innumerable ransomware attacks worldwide, and the internet dependence of our utilities, our factories, our ports, and our military imperils our physical existence. 

I also took away powerful insights offered by Schneider, who blames "surveillance capitalism" for an internet that has gotten out of control and provides practical pathways for re-establishing our control.

By Bruce Schneier,

Why should I read it?

1 author picked Click Here to Kill Everybody as one of their favorite books, and they share why you should read it.

What is this book about?

We have created the ultimate hive-mind robot: an Internet of interconnected devices that senses, thinks and acts. Bruce Schneier calls it the "World-Sized Web". It includes everything from driverless cars to smart thermostats, from billboards that respond to specific people to drones equipped with their own behavioural algorithms. While the World-Sized Web carries enormous potential, Schneier argues that we are unprepared for the vulnerabilities it brings. Cutting-edge digital attackers can now crash your car, pacemaker and home security system and everyone else's.

Click Here to Kill Everybody explores the risks and security implications of the World-Sized Web and lays out…


If you love Andy Greenberg...

Ad

Book cover of Benghazi! A New History of the Fiasco that Pushed America and its World to the Brink

Benghazi! A New History of the Fiasco that Pushed America and its World to the Brink By Ethan Chorin,

Benghazi: A New History is a look back at the enigmatic 2012 attack on the US mission in Benghazi, Libya, its long-tail causes, and devastating (and largely unexamined) consequences for US domestic politics and foreign policy. It contains information not found elsewhere, and is backed up by 40 pages of…

Book cover of Meganets

Michael Wolk

From my list on feed your internet paranoia.

Why am I passionate about this?

Researching DevilsGame, about an Internet meltdown caused by an unknown evil, I exposed myself to some harrowing truths. I learned how astonishingly frail our internet ecosystem is and how imperiled it is by bad actors who have burrowed deeply and often invisibly into its infrastructure. So, beyond writing a fictional thriller, I was moved to ring a warning bell! And I hope by formatting DevilsGame as “hyperlinked fiction,” mixing real news sites with fictional sites created for the novel, readers will experience the story in a way that parallels and parodies the way we experience real, live crises these days: navigating from fact to fiction, often without observing the boundaries.

Michael's book list on feed your internet paranoia

Michael Wolk Why did Michael love this book?

I was impressed by the way author Auerbach distills what has changed in our relationship with the internet over the past 20 years: there has been a gradual but momentous shift from “search” on the web” to “recommendations” offered by the web. Initially, we searched for what we were interested in–but now, networks tell us what we are interested in!

Auerbach defines the meganet as that “new creature…born [to] manage the data boom and absorb, filter, and recommend it,” and I was sobered by his graphic warning of the dangers that emerge from “off-loading our decision-making” to the internet.

By David B. Auerbach,

Why should I read it?

1 author picked Meganets as one of their favorite books, and they share why you should read it.

What is this book about?

How the autonomous digital forces jolting our lives - as uncontrollable as the weather and plate tectonics - are transforming life, society, culture, and politics.

David Auerbach's exploration of the phenomenon he has identified as the meganet begins with a simple, startling revelation: There is no hand on the tiller of some of the largest global digital forces that influence our daily lives: from corporate sites such as Facebook, Amazon, Google, YouTube, Instagram, and Reddit to the burgeoning metaverse encompassing cryptocurrencies and online gaming to government systems such as China's Social Credit System and India's Aadhaar.

As we increasingly integrate…


Book cover of Battlefield Cyber: How China and Russia are Undermining Our Democracy and National Security

Michael Wolk

From my list on feed your internet paranoia.

Why am I passionate about this?

Researching DevilsGame, about an Internet meltdown caused by an unknown evil, I exposed myself to some harrowing truths. I learned how astonishingly frail our internet ecosystem is and how imperiled it is by bad actors who have burrowed deeply and often invisibly into its infrastructure. So, beyond writing a fictional thriller, I was moved to ring a warning bell! And I hope by formatting DevilsGame as “hyperlinked fiction,” mixing real news sites with fictional sites created for the novel, readers will experience the story in a way that parallels and parodies the way we experience real, live crises these days: navigating from fact to fiction, often without observing the boundaries.

Michael's book list on feed your internet paranoia

Michael Wolk Why did Michael love this book?

I was stunned by the authors' dire and dramatic warning that the interests and methods of two mighty authoritarian regimes–China and Russia–are increasingly coming into alignment, and this alignment is spawning increasingly deadly threats to, and attacks on, the very foundations of our democracy and national security.

I found myself agreeing as the authors demonstrate how the United States government is failing to fully acknowledge and effectively respond to these massive threats–but I was also somewhat encouraged, as they do offer solutions and provide a ray of hope that we can restructure our approach to Chinese and Russian threats by streamlining our bureaucratic agencies and purpose-building them to directly confront them.

By Michael McLaughlin, William J. Holstein,

Why should I read it?

1 author picked Battlefield Cyber as one of their favorite books, and they share why you should read it.

What is this book about?

The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain and corporate email servers, malicious cyber activities have reached an all-time high. Russia attracts the most attention, but China is vastly more sophisticated. They have a common interest in exploiting the openness of the Internet and social media—and our democracy—to erode confidence in our institutions and to exacerbate our societal rifts to prevent us from mounting an effective response. Halting this digital aggression will require Americans to undertake sweeping changes in how we educate, organize…


Book cover of Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Jeremy N. Smith Author Of Breaking and Entering: The Extraordinary Story of a Hacker Called Alien

From my list on hackers and hacking.

Why am I passionate about this?

Jeremy N. Smith is the author of three acclaimed narrative non-fiction books, including Breaking and Entering, about a female hacker called “Alien” and the birth of our information insecurity age. He has written for The Atlantic, Discover, Slate, and the New York Times, among other outlets, and he and his work have been featured by CNN, NPR, NBC Nightly News, The Today Show, and Wired. He hosts The Hacker Next Door podcast and lives in Missoula, Montana.

Jeremy's book list on hackers and hacking

Jeremy N. Smith Why did Jeremy love this book?

A famous hacker’s real-life story, told from his own perspective, Ghost in the Wires explains how criminal hackers think and act and the diverse techniques they use, no keyboard necessary—all, in this case, with little motive beyond a compulsion to explore and exploit. The hacking community has no bigger characters than Kevin Mitnick and no better first-person accounts of the art of “social engineering,” or human hacking—manipulating people (including, in Mitnick’s case, the FBI and other would-be pursuers) to your own advantage.

By Kevin Mitnick, William L. Simon,

Why should I read it?

1 author picked Ghost in the Wires as one of their favorite books, and they share why you should read it.

What is this book about?

In this "intriguing, insightful and extremely educational" novel, the world's most famous hacker teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data (Frank W. Abagnale).

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies -- and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI's net finally began to tighten, Mitnick went on the run, engaging in an increasingly sophisticated game of hide-and-seek that escalated…


If you love Sandworm...

Ad

Book cover of The Model Spy: Based on the True Story of Toto Koopman’s World War II Ventures

The Model Spy By Maryka Biaggio,

The Model Spy is based on the true story of Toto Koopman, who spied for the Allies and Italian Resistance during World War II.

Largely unknown today, Toto was arguably the first woman to spy for the British Intelligence Service. Operating in the hotbed of Mussolini's Italy, she courted danger…

Book cover of Warcross

Candace Kade Author Of Enhanced: Volume 1

From my list on young adult near future novels.

Why am I passionate about this?

My family moved from America to rural China when I was four. We never stayed in one place for very long. Ever since, I’ve been searching for home in books and countries around the world. The themes of home, belonging, and identity are important ones to me that I explore in my young adult novels. My love of travel, martial arts, and tech also lend themselves well to writing fast-paced adventure books with epic battles and fight scenes. I hope you enjoy the novels on this list as much as I do!

Candace's book list on young adult near future novels

Candace Kade Why did Candace love this book?

Warcross hooked me from page one and never let go.

First off, the near future American and Japanese settings were super fun to explore. Secondly, there were hackers, dark web bounty hunters, and virtual reality games—I mean, come on!

This book had all the fun tropes that I love in a series. 

By Marie Lu,

Why should I read it?

3 authors picked Warcross as one of their favorite books, and they share why you should read it. This book is for kids age 12, 13, 14, and 15.

What is this book about?

Perfect for fans of Ready Player One!

From #1 New York Times bestselling author Marie Lu - when a game called Warcross takes the world by storm, one girl hacks her way into its dangerous depths.

For the millions who log in every day, Warcross isn't just a game - it's a way of life. Struggling to make ends meet, teenage hacker Emika Chen works as a bounty hunter, tracking down players who bet on the game illegally. Needing to make some quick cash, Emika takes a risk and hacks into the opening game of the international Warcross Championships -…


Book cover of The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Book cover of The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win
Book cover of The Loop: How Technology is Creating a World Without Choices and How to Fight Back

Share your top 3 reads of 2024!

And get a beautiful page showing off your 3 favorite reads.

1,593

readers submitted
so far, will you?

5 book lists we think you will like!

Interested in hackers, Russia, and cyber crimes?

Hackers 16 books
Russia 390 books
Cyber Crimes 15 books