Here are 100 books that The New Hacker's Dictionary fans have personally recommended if you like
The New Hacker's Dictionary.
Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.
Jeremy N. Smith is the author of three acclaimed narrative non-fiction books, including Breaking and Entering, about a female hacker called “Alien” and the birth of our information insecurity age. He has written for The Atlantic, Discover, Slate, and the New York Times, among other outlets, and he and his work have been featured by CNN, NPR, NBC Nightly News, The Today Show, and Wired. He hosts The Hacker Next Door podcast and lives in Missoula, Montana.
The Journal of IHTFP (look up that acronym!) is a delightful introduction to the original hacking scene at MIT, where hacks were elaborate, extremely clever student pranks—handing out colored cards at a Harvard-Yale football game to spell MIT rather than BEAT YALE when raised by eleven hundred Harvard fans, for example, or sneaking a power supply, multi-piece wooden frame, and the outer metal parts of a Chevrolet Cavalier atop the school’s Great Dome, so it appeared that the building was mounted by a real police cruiser, complete with flashing lights and boxes of Dunkin’ Donuts. The oversized book includes numerous photographs. Now out of print, it has been replaced by Nightwork by T. F. Peterson, which includes more recent hacks.
The Beatles are widely regarded as the foremost and most influential music band in history and their career has been the subject of many biographies. Yet the band's historical significance has not received sustained academic treatment to date. In The Beatles and the 1960s, Kenneth L. Campbell uses The…
Jeremy N. Smith is the author of three acclaimed narrative non-fiction books, including Breaking and Entering, about a female hacker called “Alien” and the birth of our information insecurity age. He has written for The Atlantic, Discover, Slate, and the New York Times, among other outlets, and he and his work have been featured by CNN, NPR, NBC Nightly News, The Today Show, and Wired. He hosts The Hacker Next Door podcast and lives in Missoula, Montana.
Hackers is a classic account of the computer revolution, centered on the pioneering tinkerers, gamers, social theorists, entrepreneurs, and other explorers who made military and corporate technology personal. These are not hackers in the criminal sense most people understand the term today, but men (and a few women) like Bill Gates, Steve Jobs, and others far less famous. Their interwoven biographies are brilliantly researched and reported, underpinned by what Levy calls a common “hacker ethic” whose tenets dominate our economy, politics, and culture today.
Steven Levy's classic book about the original hackers of the computer revolution is now available in a special 25th anniversary edition, with updated material from noteworthy hackers such as Bill Gates, Mark Zukerberg, Richard Stallman, and Tim O'Reilly. Hackers traces the exploits of innovators from the research labs in the late 1950s to the rise of the home computer in the mid-1980s. It's a fascinating story of brilliant and eccentric nerds such as Steve Wozniak, Ken Williams, and John Draper who took risks, bent the rules, and took the world in a radical new direction. "Hacker" is often a derogatory…
Jeremy N. Smith is the author of three acclaimed narrative non-fiction books, including Breaking and Entering, about a female hacker called “Alien” and the birth of our information insecurity age. He has written for The Atlantic, Discover, Slate, and the New York Times, among other outlets, and he and his work have been featured by CNN, NPR, NBC Nightly News, The Today Show, and Wired. He hosts The Hacker Next Door podcast and lives in Missoula, Montana.
We Are Anonymous, along with Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous by Gabriella Coleman, explores the politics and personalities of the best-known real-world hacktivist group, Anonymous, how it rose to prominence and power, its impact and influence, and the government machinations that ultimately turned members against each other. Its pages reveal hackers at their most human—brilliant, idealistic, vulnerable, and conflicted.
A thrilling, exclusive exposè of the hacker collectives Anonymous and LulzSec.
We Are Anonymous is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds -- and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec.
In late 2010, thousands of hacktivists joined a mass digital…
Anatomy of Embodied Education
by
E. Timothy Burns,
The vast mysterious terrain explored in this book encompasses the embodied human brain, the processes through which humans grow, develop, and learn, and the mystery of consciousness itself. We authors offer this guidebook to assist you in entering and exploring that terrain.
Jeremy N. Smith is the author of three acclaimed narrative non-fiction books, including Breaking and Entering, about a female hacker called “Alien” and the birth of our information insecurity age. He has written for The Atlantic, Discover, Slate, and the New York Times, among other outlets, and he and his work have been featured by CNN, NPR, NBC Nightly News, The Today Show, and Wired. He hosts The Hacker Next Door podcast and lives in Missoula, Montana.
A famous hacker’s real-life story, told from his own perspective, Ghost in the Wires explains how criminal hackers think and act and the diverse techniques they use, no keyboard necessary—all, in this case, with little motive beyond a compulsion to explore and exploit. The hacking community has no bigger characters than Kevin Mitnick and no better first-person accounts of the art of “social engineering,” or human hacking—manipulating people (including, in Mitnick’s case, the FBI and other would-be pursuers) to your own advantage.
In this "intriguing, insightful and extremely educational" novel, the world's most famous hacker teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data (Frank W. Abagnale).
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies -- and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI's net finally began to tighten, Mitnick went on the run, engaging in an increasingly sophisticated game of hide-and-seek that escalated…
I’ve been playing with computers and electronics since childhood. I even supported the people in my village with their computer issues back then. During my studies in electrical engineering, I learned how to solve technical challenges with structured approaches. At this time, I became fascinated by topics like cryptography and embedded system security. The books on this list helped me understand important concepts and practical real-world obstacles. I hope they are also of value to you!
When I take this book off my shelf, the probability that I find the answer I'm looking for is very high. Yes, it's a big book, and I'm pretty sure I haven't read every single page yet, but because of its broad coverage of security engineering knowledge, from crypto to real-world processes, it is an invaluable reference for teaching and practical cyber security.
Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic
In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack.
This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than…
Like most geeks, I've always loved efficiency and productivity. Coming from a Windows-dominated world, the command line I was faced with in my CompSci degree was Initially mystifying, but over time I have come to see it as the most powerful human-computer interface out there. After spending years wresting with the command line at work, I decided to write a book on bash, and have blogged extensively on this and related topics. I also run live courses on bash and the command line for O'Reilly. There's nothing I enjoy more than opening people's eyes to the power of the shell!
Regular expressions are the cornerstone of command line wizardry.
They are used in pretty much all command-line tools, and all programming languages.
If you read this book, you'll have a deep understanding of what's going on, and the knowledge to go from hand-waving and guessing your way through regular expression writing to the mastery the book promises.
Regular expressions are an extremely powerful tool for manipulating text and data. They are now standard features in a wide range of languages and popular tools, including Perl, Python, Ruby, Java, VB.NET and C# (and any language using the .NET Framework), PHP, and MySQL. If you don't use regular expressions yet, you will discover in this book a whole new world of mastery over your data. If you already use them, you'll appreciate this book's unprecedented detail and breadth of coverage. If you think you know all you need to know about regular expressions, this book is a stunning eye-opener.…
I’ve spent more than a decade working on infrastructure, from my early days at LinkedIn, where we had to do a massive DevOps transformation to save the company, to co-founding Gruntwork, where I had the opportunity to work with hundreds of companies on their software delivery practices. From all of this, I can say the following with certainty: the DevOps best practices that a handful of the top tech companies have figured out are not filtering down to the rest of the industry. This is making the entire software industry slower, less effective, and less secure—and I see it as my mission to fix that.
This book felt like a chance to sit with a few experienced Ops people and hear their war stories.
The book is full of concrete, actionable learnings that are essential for running software, including operational requirements (e.g., configuration, draining, hot swaps, feature toggles, graceful degradation, etc.), software architecture (e.g., three-tier web service, four-tier web service, load balancing models etc.), scaling patterns (e.g., horizontal duplication, service splits, caching, etc.), resiliency patterns (software vs hardware resiliency, spare capacity, failure domains, etc.), and much more.
I loved being able to pick up decades of experience and hard-won knowledge by just flipping through a few pages of a book!
"There's an incredible amount of depth and thinking in the practices described here, and it's impressive to see it all in one place."
-Win Treese, coauthor of Designing Systems for Internet Commerce
The Practice of Cloud System Administration, Volume 2, focuses on "distributed" or "cloud" computing and brings a DevOps/SRE sensibility to the practice of system administration. Unsatisfied with books that cover either design or operations in isolation, the authors created this authoritative reference centered on a comprehensive approach.
Case studies and examples from Google, Etsy, Twitter, Facebook, Netflix, Amazon, and other industry giants are explained in practical ways that…
My passion for developing production-ready, cooperating microservices began in 2008 when I first started assisting customers in creating distributed systems—long before the term “microservices” was coined. During that time, I faced significant challenges, including grappling with the “Eight Fallacies of Distributed Computing”. Since then, I’ve dedicated most of my career to deepening my understanding of these complexities and finding ways to address them through robust architecture, design patterns, and the right tools.
Apache Kafka is the industry standard for real-time event streaming, an essential component for large-scale, high-performance microservice ecosystems.
Despite being new to Kafka when I read this book, it quickly brought me up to speed on key concepts that underpin its scalability and real-time capabilities, such as the commit log, topic partitions, and consumer groups. The book also introduces other critical Kafka features like the schema registry, Kafka Connect, and stream processing with Kafka Streams and ksqlDB. The practical examples provided were straightforward to apply and adapt to my own use cases.
Kafka in Action is a practical, hands-on guide to building Kafka-based data pipelines. Filled with real-world use cases and scenarios, this book probes Kafka's most common use cases, ranging from simple logging through managing streaming data systems for message routing, analytics, and more.
In systems that handle big data, streaming data, or fast data, it's important to get your data pipelines right. Apache Kafka is a wicked-fast distributed streaming platform that operates as more than just a persistent log or a flexible message queue.
As a computer science professor and educator, my teaching motto is Rigor and Vigor. I believe that the only way to learn something deeply, whether it's an abstract mathematical argument or a complex computer system – is building the thing from the ground up, from first principles. That's the rigor. The second requirement – vigor – comes from the need to make this learning experience captivating, rewarding, empowering. I spent much of my career developing books, courses, and games that help learn computer science and mathematics with gusto. I am pleased that this work has had an impact, and that it resonates with many students and self-learners around the world.
This popular book takes a broad perspective that surveys the main physical and logical layers from which all digital devices are made.
I like the accessible writing style, aimed at lay readers, and the book’s companion website, where one can experiment interactively with many of the artifacts described in the book. The second edition includes a new section that focuses on a functional subset of Intel 8080, the microprocessor that ushered the personal computing revolution, and the instruction set used by many PCs and servers today.
What do flashlights, the British invasion, black cats, and seesaws have to do with computers? In CODE, they show us the ingenious ways we manipulate language and invent new means of communicating with each other. And through CODE, we see how this ingenuity and our very human compulsion to communicate have driven the technological innovations of the past two centuries.
Using everyday objects and familiar language systems such as Braille and Morse code, author Charles Petzold weaves an illuminating narrative for anyone who's ever wondered about the secret inner life of computers and other smart machines.
My sons were both reluctant readers and that made me want to write books that they wouldn’t be able to resist reading! Reading should be a pleasure and this list is packed with books that are impossible to put down. They are perfect for young, reluctant readers, as they are not trying to be too serious or worthy or overwhelming with too much text. They pull you in and hook you from the start and you can’t help being moved by the characters as they grow and develop, fostering a love of books and fiction. I love comedy in books, but funny books also have to have heart, believable characters, and a great plot that keeps you reading till the very end.
This book made me first want to write for 7 to 11-year-olds! It is really easy to get into and the characters are fun, believable, and have heart. Baddiel’s books are all set in the real world of school and normal life but with a fantastical twist.
In this story, the naughtiest boy in school accidentally swaps bodies with the very strict headteacher, and they both learn a lot about themselves while having chaotic, madcap adventures along the way.
From the million-copy bestselling author of THE PARENT AGENCY and BIRTHDAY BOY comes a wildly entertaining wish-fulfilment adventure that asks the question: what would happen if the strictest head teacher swapped bodies with the naughtiest kid in school?
Strictest head naughtiest boy = chaos.
Bracket Wood is about to be visited by the school inspectors. But there's one big problem: Ryan Ward.
The maestro of practical jokes, Ryan has played so many tricks that in the end the Head Teacher just walks out. And then the new Head Teacher, Mr Carter, arrives. A man so strict even the teachers are…