100 books like The Code Book

By Simon Singh,

Here are 100 books that The Code Book fans have personally recommended if you like The Code Book. Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.

When you buy books, we may earn a commission that helps keep our lights on (or join the rebellion as a member).

Book cover of The Battle of Midway

Mark Ciampa Author Of Security Awareness: Applying Practical Security in Your World

From my list on how to break things (encryption, passwords, etc.).

Why am I passionate about this?

I have had the opportunity to write (I have written over 30 college textbooks on technology, most of them in the area of cybersecurity), study (my PhD dissertation was on cybersecurity), teach (I have taught at colleges and universities my entire career about technology, networking, and cybersecurity), and research (I have published numerous peer-reviewed journal articles) on the topic of cybersecurity. But I have always had a soft spot in my heart for the average computer user who struggles with how to protect their technology devices. This has helped drive my passion to focus on practical cybersecurity for everyone.

Mark's book list on how to break things (encryption, passwords, etc.)

Mark Ciampa Why did Mark love this book?

Perhaps the best book on the epic World War II Battle of Midway, Craig Symonds brings together all the pieces that became the turning point in the Pacific War. Looking at the leadup to the battle from both the Japanese and American perspectives, Symonds shows how the Japanese, in their typical style, created a battle plan that was overly complicated for its objective. Symonds explains how American Joe Rochefort and his eclectic band (he even had commissioned naval musicians) worked to bend (but not entirely break) the Japanese naval code. This allowed the Allies to surmise Midway as the Japanese target and set in place their own battle plan. Symonds clearly explains how the codebreaking efforts played a huge role in this battle of battles.

By Craig L. Symonds,

Why should I read it?

2 authors picked The Battle of Midway as one of their favorite books, and they share why you should read it.

What is this book about?

There are few moments in American history in which the course of events tipped so suddenly and so dramatically as at the Battle of Midway. At dawn of June 4, 1942, a rampaging Japanese navy ruled the Pacific. By sunset, their vaunted carrier force (the Kido Butai) had been sunk and their grip on the Pacific had been loosened forever.

In this riveting account of a key moment in the history of World War II, one of America's leading naval historians, Craig L. Symonds, paints an unforgettable portrait of ingenuity, courage, and sacrifice. Symonds begins with the arrival of Admiral…


Book cover of Battle of Wits: The Complete Story of Codebreaking in World War II

Mark Ciampa Author Of Security Awareness: Applying Practical Security in Your World

From my list on how to break things (encryption, passwords, etc.).

Why am I passionate about this?

I have had the opportunity to write (I have written over 30 college textbooks on technology, most of them in the area of cybersecurity), study (my PhD dissertation was on cybersecurity), teach (I have taught at colleges and universities my entire career about technology, networking, and cybersecurity), and research (I have published numerous peer-reviewed journal articles) on the topic of cybersecurity. But I have always had a soft spot in my heart for the average computer user who struggles with how to protect their technology devices. This has helped drive my passion to focus on practical cybersecurity for everyone.

Mark's book list on how to break things (encryption, passwords, etc.)

Mark Ciampa Why did Mark love this book?

It is hard to underestimate the significance of code breaking during World War II. Without the work of dedicated mathematicians, linguists, and others the great conflicts such as the Battle of Midway and the German U-boat "wolfpacks" that sank over 13 million tons of Allied supplies could have easily been up for grabs. But due to the codebreakers the balance shifted to the Allies. And what is even equally impressive is that the Axis powers never knew that their encoded messages were being read. Stephen Budiansky traces how the codebreakers pulled off this feat while at the same time often battling within their own ranks about who should decode the message, how the messages should be used, and who should get the credit.

By Stephen Budiansky,

Why should I read it?

2 authors picked Battle of Wits as one of their favorite books, and they share why you should read it.

What is this book about?

Drawing from newly declassified documents, the author chronicles the story of codebreaking during the last world war, from cat-and-mouse games with Nazi U-boats to the invasion of Normandy.


Book cover of Hash Crack: Password Cracking Manual

Mark Ciampa Author Of Security Awareness: Applying Practical Security in Your World

From my list on how to break things (encryption, passwords, etc.).

Why am I passionate about this?

I have had the opportunity to write (I have written over 30 college textbooks on technology, most of them in the area of cybersecurity), study (my PhD dissertation was on cybersecurity), teach (I have taught at colleges and universities my entire career about technology, networking, and cybersecurity), and research (I have published numerous peer-reviewed journal articles) on the topic of cybersecurity. But I have always had a soft spot in my heart for the average computer user who struggles with how to protect their technology devices. This has helped drive my passion to focus on practical cybersecurity for everyone.

Mark's book list on how to break things (encryption, passwords, etc.)

Mark Ciampa Why did Mark love this book?

Passwords: everybody has them and everybody abuses them. Passwords can provide good security, but very few users use passwords correctly in order to take advantage of the protections they provide. The key to our poor implementation of passwords is a complete misunderstanding of how attackers break our passwords. Without this understanding users create weak passwords that are easy to break. Joshua Picolet's book is a reference guide for cracking passwords, but by explaining how to break passwords it also provides valuable information about how to make them strong to protect passwords from attacks. This book provides the proof of why we should treat passwords like our underwear: don't let people see it, change it often, and don't share it with strangers.

By Joshua Picolet,

Why should I read it?

1 author picked Hash Crack as one of their favorite books, and they share why you should read it.

What is this book about?

The Hash Crack: Password Cracking Manual v3 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis techniques. A compilation of basic and advanced techniques to assist penetration testers and network security professionals evaluate their organization's posture. The Hash Crack manual contains syntax and examples for the most popular cracking and analysis tools and will save you hours of research looking up tool usage. It also includes basic cracking knowledge and methodologies every security professional should know when dealing with password attack capabilities. Hash Crack contains all the tables, commands, online resources, and more to complete your…


Book cover of Seizing the Enigma: The Race to Break the German U-boat Codes, 1939-1943

Mark Ciampa Author Of Security Awareness: Applying Practical Security in Your World

From my list on how to break things (encryption, passwords, etc.).

Why am I passionate about this?

I have had the opportunity to write (I have written over 30 college textbooks on technology, most of them in the area of cybersecurity), study (my PhD dissertation was on cybersecurity), teach (I have taught at colleges and universities my entire career about technology, networking, and cybersecurity), and research (I have published numerous peer-reviewed journal articles) on the topic of cybersecurity. But I have always had a soft spot in my heart for the average computer user who struggles with how to protect their technology devices. This has helped drive my passion to focus on practical cybersecurity for everyone.

Mark's book list on how to break things (encryption, passwords, etc.)

Mark Ciampa Why did Mark love this book?

David Kahn explains the most widely-known effort (widely-known today but in complete secrecy then) to decipher messages sent by the Germans using their Enigma machines during World War II. This book looks at the groundbreaking work done by Polish mathematicians in the 1930s, how Enigma machines were rescued from sinking German U-boats, and how Bletchley Park in Britain became the focal point of breaking these transmissions. Much of the book focuses on how Enigma machines, rotors, and codebooks were confiscated from German submarines and surface vessels, and how these were then used to allow the Allies, by the war's end, to read German messages almost as quickly as the Germans could send them.

By David Kahn,

Why should I read it?

1 author picked Seizing the Enigma as one of their favorite books, and they share why you should read it.

What is this book about?

Seizing the Enigma tells the thrilling story of the Royal Navy's battle to crack the Germans' supposedly unbreakable U-boat Enigma code, which would allow the vital Allied convoys in the North Atlantic to be routed away from Doenitz's wolfpacks. This battle was fought both on shore and at sea: by an assortment of scientists, chess champions and linguists, including Alan Turing, the father of the modern computer, who struggled to crack Enigma at Bletchley Park, and in the Atlantic by sailors and intelligence officers, such as Ian Fleming, the future creator of James Bond, who undertook dangerous and often fatal…


Book cover of Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age

Keith M. Martin Author Of Cryptography: The Key to Digital Security, How It Works, and Why It Matters

From my list on cryptography and how we secure the digital world.

Why am I passionate about this?

I am a cryptography professor, which sadly doesn’t mean I spend my time breaking secret messages (at least not every day). I first studied cryptography simply because it was fun and interesting. It still is – but today it is unbelievably important, underpinning the security of almost everything we do in the digital world. I believe that developing a notion of 'cyber common sense’ is a vital life skill since so much of what we do is digital. A basic understanding of cryptography and its societal impact provides a superb foundation for making sense of digital security, so I’ve selected some of my favourite reads to get you started.

Keith's book list on cryptography and how we secure the digital world

Keith M. Martin Why did Keith love this book?

I always knew cryptography was political, but I had no idea how political until I read this book. Seeing the subject I am so fascinated by through the words of a political journalist was truly eye-opening. Steven Levy navigates a deeply fascinating period in modern technological history – the late twentieth-century battles between governments trying to maintain power and control over communications, and technologists who saw the fledgling internet as an opportunity to build a new world. Cryptography, which protects digital communications, sat plum on the frontline between these two communities, hence battles over cryptography turned into so-called 'crypto wars’ (although nobody died). Nobody who read this book was surprised with much that Edward Snowden had to say to the world in 2013 – Snowden was just reportage of the latest chapter in the same ongoing conflict.

By Steven Levy,

Why should I read it?

1 author picked Crypto as one of their favorite books, and they share why you should read it.

What is this book about?

If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy the author who made "hackers" a household word comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"&#151nerds and visionaries turned freedom fighters&#151teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the…


Book cover of Cryptography: A Very Short Introduction

Keith M. Martin Author Of Cryptography: The Key to Digital Security, How It Works, and Why It Matters

From my list on cryptography and how we secure the digital world.

Why am I passionate about this?

I am a cryptography professor, which sadly doesn’t mean I spend my time breaking secret messages (at least not every day). I first studied cryptography simply because it was fun and interesting. It still is – but today it is unbelievably important, underpinning the security of almost everything we do in the digital world. I believe that developing a notion of 'cyber common sense’ is a vital life skill since so much of what we do is digital. A basic understanding of cryptography and its societal impact provides a superb foundation for making sense of digital security, so I’ve selected some of my favourite reads to get you started.

Keith's book list on cryptography and how we secure the digital world

Keith M. Martin Why did Keith love this book?

This is a very short (of course!) introduction to cryptography, but it is masterful in its concise conveyance of all that really matters on this topic. I have no hesitation in admitting a close relationship with both authors, but most particularly Fred Piper, who was my doctoral supervisor. Fred has been a mentor throughout my professional life, and this book presents his take on the crucial components of modern cryptography, written for a general audience. I’ve seen this book in airport bookshops and thought `how cool – you can buy a book on cryptography that is written so well you could read it on a plane!’ I have now written two books about cryptography that are less short, and might need longer plane journeys, but Cryptography: A Very Short Introduction remains an inspiration to me.

By Fred Piper, Sean Murphy,

Why should I read it?

1 author picked Cryptography as one of their favorite books, and they share why you should read it.

What is this book about?

This book is a clear and informative introduction to cryptography and data protection - subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are highlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce. This book highlights the explosive impact
of cryptography on modern society, with, for example, the evolution of the internet and the introduction of more sophisticated banking methods.

ABOUT THE SERIES: The Very Short Introductions series from Oxford University…


Book cover of The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

George Finney Author Of Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

From my list on books on cybersecurity that anyone can understand.

Why am I passionate about this?

I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.

George's book list on books on cybersecurity that anyone can understand

George Finney Why did George love this book?

The first person to ever catch a hacker wasn’t an FBI or CIA agent. It was an astronomer, and his name was Clifford Stoll. This book is a biographical account of how he took on a German hacker who was selling secrets to the KGB in the 1980s. I love this book because it shows how anyone can play a role in cybersecurity.

As a kid, I watched the TV adaptation of the book for PBS’s NOVA program and went into cybersecurity in large part because of Stoll. Because cybersecurity wasn’t a profession at the time, Stoll created his own innovative techniques, like building the first computer honeypot to help catch the hacker in action. When his book was made into a PBS documentary, as a thank you for putting up with him and all the crazy things he had to do to track the hacker, he had all of…

By Clifford Stoll,

Why should I read it?

4 authors picked The Cuckoo's Egg as one of their favorite books, and they share why you should read it.

What is this book about?

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name…


Book cover of Bitcoin: The Future of Money?

Keith M. Martin Author Of Cryptography: The Key to Digital Security, How It Works, and Why It Matters

From my list on cryptography and how we secure the digital world.

Why am I passionate about this?

I am a cryptography professor, which sadly doesn’t mean I spend my time breaking secret messages (at least not every day). I first studied cryptography simply because it was fun and interesting. It still is – but today it is unbelievably important, underpinning the security of almost everything we do in the digital world. I believe that developing a notion of 'cyber common sense’ is a vital life skill since so much of what we do is digital. A basic understanding of cryptography and its societal impact provides a superb foundation for making sense of digital security, so I’ve selected some of my favourite reads to get you started.

Keith's book list on cryptography and how we secure the digital world

Keith M. Martin Why did Keith love this book?

Most digital technologies crucially rely on cryptography for their security, but few are entirely built from cryptography. Bitcoin is – simply – cryptography. The idea that money can be created from cryptography is a little bit mind-blowing, even for a cryptographer like myself. Dominic Frisby wrote one of the first, and finest, books about the leading cryptocurrency Bitcoin. He explores not just the incredible story of the founding of Bitcoin, but also gives an accessible explanation of how it works and what role it might play in our wider financial system. If you have let the term 'cryptocurrency’ wash over you but remain just a tiny bit curious, this book is your best route towards enlightenment. Whether you then decide to invest in any cryptocurrency is another matter altogether!

By Dominic Frisby,

Why should I read it?

1 author picked Bitcoin as one of their favorite books, and they share why you should read it.

What is this book about?

Following the economic crisis of 2008, the website `bitcoin.org' was registered by a mysterious computer programmer called Satoshi Nakamoto. A new form of money was born: electronic cash. Does Bitcoin have the potential to change how the world transacts financially? Or is it just a passing fad, even a major scam?

In Bitcoin: The Future of Money?, MoneyWeek's Dominic Frisby's explains this controversial new currency and how it came about, interviewing some of the key players in its development while casting light on its strange and murky origins, in particular the much-disputed identity of Nakamoto himself.

Economic theory meets whodunnit…


Book cover of Foundations of Cryptography: Volume 1, Basic Tools

Jean-Philippe Aumasson Author Of Serious Cryptography: A Practical Introduction to Modern Encryption

From my list on for cryptography apprentices.

Why am I passionate about this?

I started learning cryptography in the early 2000s with books borrowed from my university’s library, and with information I could find online. Since then I’ve practiced cryptography for 15 years in a variety of contexts: as an academic researcher, while working on my PhD; as a cryptography engineer for software and hardware pay-TV systems; as a consultant for private and public sector clients; as a vulnerability researcher in my spare time; as a code auditor for cryptography projects; as a start-up founder in the domain of IoT security; and as CSO (chief security officer) of a fintech start-up. I live in Lausanne, Switzerland, and besides crypto I enjoy literature, rock climbing, and playing classical guitar.

Jean-Philippe's book list on for cryptography apprentices

Jean-Philippe Aumasson Why did Jean-Philippe love this book?

If you want to compose or play music, you need to know some basic music theory: notes, scales, chords, and so on. Likewise, solid cryptography knowledge requires understanding its foundations: concepts such as one-way function, pseudorandom generators, computational hardness, secure encryption, and zero-knowledge proofs. Goldreich’s books are the best starting point for those who want to delve into cryptography theory.  

By Oded Goldreich,

Why should I read it?

1 author picked Foundations of Cryptography as one of their favorite books, and they share why you should read it.

What is this book about?

Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical tools: computational difficulty (one-way functions), pseudorandomness and zero-knowledge proofs. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving cryptographic problems, rather than on describing ad-hoc approaches. The book is suitable for use in a graduate course on…


Book cover of Security Engineering: A Guide to Building Dependable Distributed Systems

Dominik Merli Author Of Engineering Secure Devices: A Practical Guide for Embedded System Architects and Developers

From my list on embedded system security enthusiasts.

Why am I passionate about this?

I’ve been playing with computers and electronics since childhood. I even supported the people in my village with their computer issues back then. During my studies in electrical engineering, I learned how to solve technical challenges with structured approaches. At this time, I became fascinated by topics like cryptography and embedded system security. The books on this list helped me understand important concepts and practical real-world obstacles. I hope they are also of value to you!

Dominik's book list on embedded system security enthusiasts

Dominik Merli Why did Dominik love this book?

When I take this book off my shelf, the probability that I find the answer I'm looking for is very high. Yes, it's a big book, and I'm pretty sure I haven't read every single page yet, but because of its broad coverage of security engineering knowledge, from crypto to real-world processes, it is an invaluable reference for teaching and practical cyber security.

By Ross Anderson,

Why should I read it?

2 authors picked Security Engineering as one of their favorite books, and they share why you should read it.

What is this book about?

Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic

In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack.

This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than…


Book cover of The Battle of Midway
Book cover of Battle of Wits: The Complete Story of Codebreaking in World War II
Book cover of Hash Crack: Password Cracking Manual

Share your top 3 reads of 2024!

And get a beautiful page showing off your 3 favorite reads.

1,413

readers submitted
so far, will you?

5 book lists we think you will like!

Interested in cryptography, the Enigma machine, and ancient Egypt?

Cryptography 31 books
Ancient Egypt 123 books