Love The Art of Invisibility? Readers share 76 books like The Art of Invisibility...

By Kevin D. Mitnick,

Here are 76 books that The Art of Invisibility fans have personally recommended if you like The Art of Invisibility. Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.

When you buy books, we may earn a commission that helps keep our lights on (or join the rebellion as a member).

Book cover of Cybersecurity Is Everybody's Business: Solve the Security Puzzle for Your Small Business and Home

Eric J. Rzeszut Author Of 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

From my list on to help you protect your personal information.

Why am I passionate about this?

I have been an information technology and cybersecurity professional for over two decades. I’ve learned over and over again that “people are the weakest link.” You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via “social engineering” – to trick a human being into giving you the access you need, rather than trying to hack the system itself. The books on this list will help the reader lower their chances of being exploited like this.

Eric's book list on to help you protect your personal information

Eric J. Rzeszut Why did Eric love this book?

Cybersecurity is Everybody’s Business is a great book that focuses not only on the how to keep your data safe, but on the very critical why this is important. Author Scott Schober suffered a grievous cyberattack in a previous business, and he brings his experience to the forefront in this guide. Joined by his brother as co-author, they focus on cybersecurity for the home and small business – environments that are unlikely to employ full-time cybersecurity professionals. (That’s why these places are often targets for the bad guys!)

By Scott N. Schober, Craig W. Schober,

Why should I read it?

1 author picked Cybersecurity Is Everybody's Business as one of their favorite books, and they share why you should read it.

What is this book about?

Since publication of his first book, HACKED AGAIN, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes. Now joined by his brother Craig, the two have set their sights on the biggest target of all, small businesses.

There are 30 million small businesses currently operating in the United States. Some of them are single owner/operated while others collectively employ hundreds of millions. This book is for all of them and anyone who makes it their business to stay safe…


Book cover of How to Stay Safe on Social Media: Social Media Dos and Don'ts: What Kids and Parents Should Know

Eric J. Rzeszut Author Of 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

From my list on to help you protect your personal information.

Why am I passionate about this?

I have been an information technology and cybersecurity professional for over two decades. I’ve learned over and over again that “people are the weakest link.” You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via “social engineering” – to trick a human being into giving you the access you need, rather than trying to hack the system itself. The books on this list will help the reader lower their chances of being exploited like this.

Eric's book list on to help you protect your personal information

Eric J. Rzeszut Why did Eric love this book?

This book focuses on cybersecurity for parents and teenagers, specifically focusing on social media. As a parent of a teenager myself, I know how critical this area really is. Teens are often using social networks and communication channels that their parents are mostly or completely unfamiliar with. Due to that lack of familiarity, parents have a hard time monitoring or setting appropriate limits on the ways their children use social media. Author Effie Manolas wrote this book for both parents and teens, enabling an open conversation on both the benefits and the risks of social media.

By Effie Manolas,

Why should I read it?

1 author picked How to Stay Safe on Social Media as one of their favorite books, and they share why you should read it.

What is this book about?

Do you feel your child isn’t using social media correctly?

Social media is a powerful platform that can either make the world better–or more dangerous. When a person doesn’t know how to use social media the right way, they can break relationships, disseminate false information, or even tarnish their own reputation.

As a parent, the last thing you want is for your child to be using social media in a way that can hurt them. But parents can hardly help their children if they themselves remain oblivious to the repercussions of their behavior on social media.

Teach your child to…


Book cover of SafeCyberHome: Protect Your Family From Fraud, Identity Theft and Computer Hackers

Eric J. Rzeszut Author Of 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

From my list on to help you protect your personal information.

Why am I passionate about this?

I have been an information technology and cybersecurity professional for over two decades. I’ve learned over and over again that “people are the weakest link.” You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via “social engineering” – to trick a human being into giving you the access you need, rather than trying to hack the system itself. The books on this list will help the reader lower their chances of being exploited like this.

Eric's book list on to help you protect your personal information

Eric J. Rzeszut Why did Eric love this book?

SafeCyberHome focuses on understanding how corporations and governments collect and use our personal data. The book also gives strategies for opting out of this data collection whenever possible. And, where it is not possible to opt-out, the book gives clear explanations on why we should be as restrictive with our personal data as possible. Vancannon uses an example similar to one from my own book: if someone is really determined to get your data, they will. But if they’re just looking for an easy target, and you’re not one, they’ll move on. Same reason you lock your front door – a determined master thief can defeat even the best lock, if they really want to – but do you want to make your house the easiest target on the block?

By Billy VanCannon,

Why should I read it?

1 author picked SafeCyberHome as one of their favorite books, and they share why you should read it.

What is this book about?

Online security and data privacy is one of the most pressing yet misunderstood issues of our time.

Today we use the internet to shop, work, learn, and be entertained. At the same time, we leave a trail that others can use to steal from us, assume our identity to commit crimes in our names, and hack our computers. If you ever felt helpless because governments and corporations can’t protect themselves with all their resources, then this book is for you. The vast majority of fraud and cybercrime can be stopped with basic knowledge about how your data is collected and…


If you love The Art of Invisibility...

Ad

Book cover of Tap Dancing on Everest: A Young Doctor's Unlikely Adventure

Tap Dancing on Everest by Mimi Zieman,

Tap Dancing on Everest, part coming-of-age memoir, part true-survival adventure story, is about a young medical student, the daughter of a Holocaust survivor raised in N.Y.C., who battles self-doubt to serve as the doctor—and only woman—on a remote Everest climb in Tibet.

The team attempts a new route up…

Book cover of Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

Eric J. Rzeszut Author Of 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

From my list on to help you protect your personal information.

Why am I passionate about this?

I have been an information technology and cybersecurity professional for over two decades. I’ve learned over and over again that “people are the weakest link.” You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via “social engineering” – to trick a human being into giving you the access you need, rather than trying to hack the system itself. The books on this list will help the reader lower their chances of being exploited like this.

Eric's book list on to help you protect your personal information

Eric J. Rzeszut Why did Eric love this book?

Security expert Bruce Schneier wrote this excellent book, talking about the “Goliaths” who are looking to exploit individuals’ data. Focusing more on politics (specifically US politics) than the other books on this list, Schneier talks about the Edward Snowden classified information reveal. He talks about mass surveillance conducted by the US and other governments around the world, and lays out in detail why this should concern us all.

By Bruce Schneier,

Why should I read it?

1 author picked Data and Goliath as one of their favorite books, and they share why you should read it.

What is this book about?

Data is everywhere. We create it every time we go online, turn our phone on (or off) or pay with a credit card. This data is stored, studied, bought and sold by companies and governments for surveillance and for control. "Foremost security expert" (Wired) Bruce Schneier shows how this data has led to a double-edged Internet-a Web that gives power to the people but is abused by the institutions on which those people depend.

In Data and Goliath, Schneier reveals the full extent of surveillance, censorship and propaganda in society today, examining the risks of cybercrime, cyberterrorism and cyberwar. He…


Book cover of Privacy Is Power: Why and How You Should Take Back Control of Your Data

Susie Alegre Author Of Freedom to Think: Protecting a Fundamental Human Right in the Digital Age

From my list on how technology affects your human rights.

Why am I passionate about this?

I’ve always been passionate about social justice as a writer and as an international human rights lawyer. I had worked on human rights, surveillance, and privacy for decades around the world, but it was when I first read about Cambridge Analytica back in 2017 that it felt personal – privacy is the gateway to our right to freedom of thought and opinion and Big Tech is increasingly acting as the gatekeeper to all our human rights. These books have all helped me to understand what the risks are and how to tackle them.

Susie's book list on how technology affects your human rights

Susie Alegre Why did Susie love this book?

Privacy Is Power gets to the heart of why we should all be worried about encroachments on our privacy. 

Carissa Veliz is a philosopher and a talented writer who brings complex and profound ideas to life on the page. Some writing about technology can feel dry and detached, but Veliz makes you understand viscerally how the impact of technology is a human, not a technological issue. 

By Carissa Veliz,

Why should I read it?

2 authors picked Privacy Is Power as one of their favorite books, and they share why you should read it.

What is this book about?

An Economist BEST BOOK OF THE YEAR

As the data economy grows in power, Carissa Veliz exposes how our privacy is eroded by big tech and governments, why that matters and what we can do about it.

The moment you check your phone in the morning you are giving away your data. Before you've even switched off your alarm, a whole host of organisations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your 'suggested friends' on Facebook, you continually compromise your privacy.

Without your permission, or even…


Book cover of This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

Steve Vigdor Author Of Signatures of the Artist: The Vital Imperfections That Make Our Universe Habitable

From my list on science that should inform public policy.

Why am I passionate about this?

I’ve been passionate about science as a way of learning how nature works and approaching truth since I was a pre-teen. After five decades of basic research, teaching, and management in physics, I can distinguish good science from pseudoscience even beyond my own areas of expertise. I am greatly disturbed by attempts to undermine science in public policy-making when its findings conflict with ideology, religious beliefs, or business bottom lines. My passion project, via my blog debunkingdenial.com, is to explain to teachers and the public the underlying science and the flaws in science denial across a wide range of topics at the interface with public policy. 

Steve's book list on science that should inform public policy

Steve Vigdor Why did Steve love this book?

I love this book because Perlroth chronicles the proliferation of cyberweapons, which began in the hands of mischievous young hackers exploiting vulnerabilities in widely used software. Once some of those hackers joined the NSA, their tools were developed into sophisticated weapons to undercut technological developments in enemy states like Iran.

Once NSA’s hacks leaked to the wider world, they spawned an arms race and fueled rampant criminal ransomware attacks on vulnerable institutions. Informed by Perlroth’s book, I see a future in which dwindling human fertility and the ballooning costs of advanced weaponry will enhance the military role of cyber-attacks, leading to Mutually Assured Cyber Destruction, in which many countries have cyberweapons deeply embedded in the critical infrastructure of their adversaries, just waiting to activate them.

By Nicole Perlroth,

Why should I read it?

2 authors picked This Is How They Tell Me the World Ends as one of their favorite books, and they share why you should read it.

What is this book about?

THE NEW YORK TIMES BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations)

"Written in the hot, propulsive prose of a spy thriller" (The New York Times), the untold story of the cyberweapons market-the most secretive, government-backed market on earth-and a terrifying first look at a new kind of global warfare.

Zero-day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero-day has the power…


If you love Kevin D. Mitnick...

Ad

Book cover of The Coaching Habit: Say Less, Ask More & Change the Way You Lead Forever

The Coaching Habit by Michael Bungay Stanier,

The coaching book that's for all of us, not just coaches.

It's the best-selling book on coaching this century, with 15k+ online reviews. Brené Brown calls it "a classic". Dan Pink said it was "essential".

It is practical, funny, and short, and "unweirds" coaching. Whether you're a parent, a teacher,…

Book cover of Industry Unbound: The Inside Story of Privacy, Data, and Corporate Power

Daniel J. Solove Author Of Understanding Privacy

From my list on about privacy.

Why am I passionate about this?

I became interested in privacy in the mid-1990s. When I began my career as a law professor, I thought I might write one or two papers about privacy and then move on to other issues involving law and technology. But like Alice in Wonderland, I found an amazing world on the other side of the rabbit hole. I’ve written more than 10 books and 50 articles about privacy, and I have a list of topics and ideas that will keep me writing many more in the future. I recently wrote a children’s book about privacy called The Eyemonger, which is designed to spark a child’s thoughts and understanding about privacy.

Daniel's book list on about privacy

Daniel J. Solove Why did Daniel love this book?

Ari Waldman’s Industry Unbound eviscerates many of the current privacy laws and corporate privacy programs. On the surface, we appear to be living in the golden age of privacy law. Privacy laws are being passed at a feverish rate. Many companies now have dedicated teams of individuals who build a privacy program at the company to comply with the laws, assess privacy risks, train employees, and ensure that products and services are designed in ways that are protective of privacy. Unfortunately, Waldman contends, these privacy programs are hollow. They amount to building a meaningless paper record and end up cloaking poor privacy practices with a pretty facade. Even those who do not agree with the potency of Waldman’s critique must take note of the concerns he raises. His arguments are essential to engage with.  

By Ari Ezra Waldman,

Why should I read it?

1 author picked Industry Unbound as one of their favorite books, and they share why you should read it.

What is this book about?

In Industry Unbound, Ari Ezra Waldman exposes precisely how the tech industry conducts its ongoing crusade to undermine our privacy. With research based on interviews with scores of tech employees and internal documents outlining corporate strategies, Waldman reveals that companies don't just lobby against privacy law; they also manipulate how we think about privacy, how their employees approach their work, and how they weaken the law to make data-extractive products the norm. In contrast to those who claim that privacy law is getting stronger, Waldman shows why recent shifts in privacy law are precisely the kinds of changes that corporations…


Book cover of Privacy's Blueprint: The Battle to Control the Design of New Technologies

Daniel J. Solove Author Of Understanding Privacy

From my list on about privacy.

Why am I passionate about this?

I became interested in privacy in the mid-1990s. When I began my career as a law professor, I thought I might write one or two papers about privacy and then move on to other issues involving law and technology. But like Alice in Wonderland, I found an amazing world on the other side of the rabbit hole. I’ve written more than 10 books and 50 articles about privacy, and I have a list of topics and ideas that will keep me writing many more in the future. I recently wrote a children’s book about privacy called The Eyemonger, which is designed to spark a child’s thoughts and understanding about privacy.

Daniel's book list on about privacy

Daniel J. Solove Why did Daniel love this book?

Privacy’s Blueprint presents a deep, vivid, and concrete account of how technology companies design devices, websites, and software in ways that diminish privacy. Design choices are frequently clandestine, built so that people don’t notice them or how they are being pushed and manipulated into sharing more data or making choices that surrender their privacy. With clear and engaging examples, Hartzog illuminates these shadowy designs and shows how they work. He contends that privacy law can’t be effective unless it regulates design. According to Hartzog, design can be regulated in ways that aren’t overly controlling or stifling to innovation. This is a great book, filled with countless insights, and it is highly accessible. 

By Woodrow Hartzog,

Why should I read it?

1 author picked Privacy's Blueprint as one of their favorite books, and they share why you should read it.

What is this book about?

Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves-even when the odds are deliberately stacked against them.

In Privacy's Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it were value-neutral:…


Book cover of Understanding Cryptography: A Textbook for Students and Practitioners

Dominik Merli Author Of Engineering Secure Devices: A Practical Guide for Embedded System Architects and Developers

From my list on embedded system security enthusiasts.

Why am I passionate about this?

I’ve been playing with computers and electronics since childhood. I even supported the people in my village with their computer issues back then. During my studies in electrical engineering, I learned how to solve technical challenges with structured approaches. At this time, I became fascinated by topics like cryptography and embedded system security. The books on this list helped me understand important concepts and practical real-world obstacles. I hope they are also of value to you!

Dominik's book list on embedded system security enthusiasts

Dominik Merli Why did Dominik love this book?

When I first heard about cryptography at university, it sounded like mathematical magic. After looking into some randomly chosen crypto books, I was discouraged from digging deeper because they were full of math details.

Understanding Cryptography was different. It was aimed at engineering students like me, and it provided me with the most relevant facts necessary for designing secure devices. Since then, it has always been a great reference book for me.

By Christof Paar, Jan Pelzl,

Why should I read it?

1 author picked Understanding Cryptography as one of their favorite books, and they share why you should read it.

What is this book about?

Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography.

After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital…


If you love The Art of Invisibility...

Ad

Book cover of Against the Seas: Saving Civilizations from Rising Waters

Against the Seas by Mary Soderstrom,

The scenario we are facing is scary: within a few decades, sea levels around the world may well rise by a metre or more as glaciers and ice caps melt due to climate change. Large parts of our coastal cities will be flooded, the basic outline of our world will…

Book cover of Why Privacy Matters

Daniel J. Solove Author Of Understanding Privacy

From my list on about privacy.

Why am I passionate about this?

I became interested in privacy in the mid-1990s. When I began my career as a law professor, I thought I might write one or two papers about privacy and then move on to other issues involving law and technology. But like Alice in Wonderland, I found an amazing world on the other side of the rabbit hole. I’ve written more than 10 books and 50 articles about privacy, and I have a list of topics and ideas that will keep me writing many more in the future. I recently wrote a children’s book about privacy called The Eyemonger, which is designed to spark a child’s thoughts and understanding about privacy.

Daniel's book list on about privacy

Daniel J. Solove Why did Daniel love this book?

I had a hard time choosing which book by Richards to include, as his earlier book, Intellectual Privacy, is a superb discussion about how privacy is essential for our expression and consumption of ideas. In Why Privacy Matters, Richards broadens his focus to discuss other reasons why privacy is important. He debunks common myths, such as privacy is dying or privacy is about creepiness. In an eloquent and clear way, Richards explains why privacy matters for our identity, freedom, and protection. This book powerfully shows that how we think about privacy is essential to effectively safeguarding it. Richards writes in an engaging and accessible way, but his book has tremendous depth and insight. 

By Neil Richards,

Why should I read it?

1 author picked Why Privacy Matters as one of their favorite books, and they share why you should read it.

What is this book about?

A much-needed corrective on what privacy is, why it matters, and how we can protect in an age when so many believe that the concept is dead.

Everywhere we look, companies and governments are spying on us-seeking information about us and everyone we know. Ad networks monitor our web-surfing to send us "more relevant" ads. The NSA screens our communications for signs of radicalism. Schools track students' emails to stop school shootings. Cameras guard every street corner and traffic light, and drones fly in our skies. Databases of human information are assembled for purposes of "training" artificial intelligence programs designed…


Book cover of Cybersecurity Is Everybody's Business: Solve the Security Puzzle for Your Small Business and Home
Book cover of How to Stay Safe on Social Media: Social Media Dos and Don'ts: What Kids and Parents Should Know
Book cover of SafeCyberHome: Protect Your Family From Fraud, Identity Theft and Computer Hackers

Share your top 3 reads of 2024!

And get a beautiful page showing off your 3 favorite reads.

1,889

readers submitted
so far, will you?

5 book lists we think you will like!

Interested in computer security, the Internet, and the right to privacy?

The Internet 27 books