73 books like This Is How They Tell Me the World Ends

By Nicole Perlroth,

Here are 73 books that This Is How They Tell Me the World Ends fans have personally recommended if you like This Is How They Tell Me the World Ends. Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.

When you buy books, we may earn a commission that helps keep our lights on (or join the rebellion as a member).

Book cover of The Code Breaker: Jennifer Doudna, Gene Editing, and the Future of the Human Race

Steve Vigdor Author Of Signatures of the Artist: The Vital Imperfections That Make Our Universe Habitable

From my list on science that should inform public policy.

Why am I passionate about this?

I’ve been passionate about science as a way of learning how nature works and approaching truth since I was a pre-teen. After five decades of basic research, teaching, and management in physics, I can distinguish good science from pseudoscience even beyond my own areas of expertise. I am greatly disturbed by attempts to undermine science in public policy-making when its findings conflict with ideology, religious beliefs, or business bottom lines. My passion project, via my blog debunkingdenial.com, is to explain to teachers and the public the underlying science and the flaws in science denial across a wide range of topics at the interface with public policy. 

Steve's book list on science that should inform public policy

Steve Vigdor Why did Steve love this book?

I love this book because it turns the most impactful science discovery of the 21st century–CRISPR gene editing–into a page-turner. Isaacson combines a biography of Jennifer Doudna, who shared the 2020 Nobel Prize in Chemistry with Emmanuelle Charpentier, with lucid accounts of the science and sequence of research breakthroughs that underlie CRISPR editing, as well as the intrigues and jockeying among powerful scientists and personalities vying for prizes and patents on the technology.

I came through this book to appreciate the enormous potential of CRISPR gene editing for good (curing hereditary diseases) and not-so-good (designer babies or, in the words of Vladimir Putin, “a soldier, an individual who can fight without fear or compassion, mercy or pain”). CRISPR promises to make human selection as important as natural selection in the evolution of many species, including humans.

By Walter Isaacson,

Why should I read it?

11 authors picked The Code Breaker as one of their favorite books, and they share why you should read it.

What is this book about?

The best-selling author of Leonardo da Vinci and Steve Jobs returns.

In 2012, Nobel Prize winning scientist Jennifer Doudna hit upon an invention that will transform the future of the human race: an easy-to-use tool that can edit DNA.

Known as CRISPR, it opened a brave new world of medical miracles and moral questions. It has already been deployed to cure deadly diseases, fight the coronavirus pandemic of 2020, and make inheritable changes in the genes of babies.

But what does that mean for humanity? Should we be hacking our own DNA to make us less susceptible to disease? Should…


Book cover of Merchants of Doubt: How a Handful of Scientists Obscured the Truth on Issues from Tobacco Smoke to Climate Change

Genevieve Guenther Author Of The Language of Climate Politics: Fossil-Fuel Propaganda and How to Fight It

From my list on understand climate change.

Why am I passionate about this?

I am a former Shakespeare scholar who became increasingly concerned about the climate crisis after I had a son and started worrying about the world he would inherit after I died. I began to do research into climate communication, and I realized I could use my linguistic expertise to help craft messages for campaigners, policymakers, and enlightened corporations who want to drive climate action. As I learned more about the history of climate change communication, however, I realized that we couldn’t talk about the crisis effectively without knowing how to parry climate denial and fossil-fuel propaganda. So now I also research and write about climate disinformation, too. 

Genevieve's book list on understand climate change

Genevieve Guenther Why did Genevieve love this book?

This book is the classic study that you must read if you’re going to understand how fossil fuel interests set out to create climate denial. Taking their playbook from the tobacco lobby, these interests hired unscrupulous researchers to do work that inspired doubt about climate science.

This book documents a core truth: climate change isn’t a tragedy; it’s a crime. This book will introduce you to the criminals and show you their MO. 

By Naomi Oreskes, Erik M. Conway,

Why should I read it?

14 authors picked Merchants of Doubt as one of their favorite books, and they share why you should read it.

What is this book about?

The U.S. scientific community has long led the world in research on such areas as public health, environmental science, and issues affecting quality of life. Our scientists have produced landmark studies on the dangers of DDT, tobacco smoke, acid rain, and global warming. But at the same time, a small yet potent subset of this community leads the world in vehement denial of these dangers. Merchants of Doubt tells the story of how a loose-knit group of high-level scientists and scientific advisers, with deep connections in politics and industry, ran effective campaigns to mislead the public and deny well-established scientific…


Book cover of The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

George Finney Author Of Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

From my list on books on cybersecurity that anyone can understand.

Why am I passionate about this?

I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.

George's book list on books on cybersecurity that anyone can understand

George Finney Why did George love this book?

The first person to ever catch a hacker wasn’t an FBI or CIA agent. It was an astronomer, and his name was Clifford Stoll. This book is a biographical account of how he took on a German hacker who was selling secrets to the KGB in the 1980s. I love this book because it shows how anyone can play a role in cybersecurity.

As a kid, I watched the TV adaptation of the book for PBS’s NOVA program and went into cybersecurity in large part because of Stoll. Because cybersecurity wasn’t a profession at the time, Stoll created his own innovative techniques, like building the first computer honeypot to help catch the hacker in action. When his book was made into a PBS documentary, as a thank you for putting up with him and all the crazy things he had to do to track the hacker, he had all of…

By Clifford Stoll,

Why should I read it?

4 authors picked The Cuckoo's Egg as one of their favorite books, and they share why you should read it.

What is this book about?

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name…


Book cover of Ghost Fleet: A Novel of the Next World War

Jennifer L. Bayuk Author Of Enterprise Security for the Executive: Setting the Tone from the Top

From my list on cybersecurity for every type of reader.

Why am I passionate about this?

I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.

Jennifer's book list on cybersecurity for every type of reader

Jennifer L. Bayuk Why did Jennifer love this book?

The book portrays a scenario in which nation-state adversaries launch a sophisticated cyberattack against the United States. Though it is science fiction, the political scenario it depicts is a realistic description of how today’s nation-states consider technology options when they are engaged in traditional war. For people interested in cybersecurity and attracted to that genre, it will be an eye-opening experience because the basic scenarios it describes are very easy to project into the near future. It is also a tale of adventure.

By P.W. Singer, August Cole,

Why should I read it?

1 author picked Ghost Fleet as one of their favorite books, and they share why you should read it.

What is this book about?

Ghost Fleet is a page-turning imagining of a war set in the not-too-distant future. Navy captains battle through a modern-day Pearl Harbour; fighter pilots duel with stealthy drones; teenage hackers fight in digital playgrounds; Silicon Valley billionaires mobilise for cyber-war; and a serial killer carries out her own vendetta. Ultimately, victory will depend on who can best blend the lessons of the past with the weapons of the future. But what makes the story even more notable is that every trend and technology in book - no matter how sci-fi it may seem - is real. The debut novel by…


Book cover of Cyber Attacks: Protecting National Infrastructure

Jennifer L. Bayuk Author Of Enterprise Security for the Executive: Setting the Tone from the Top

From my list on cybersecurity for every type of reader.

Why am I passionate about this?

I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.

Jennifer's book list on cybersecurity for every type of reader

Jennifer L. Bayuk Why did Jennifer love this book?

Amoroso’s experience started with academic research at Bell Labs and Stevens Institute of Technology but moved quickly to practically fill voids at AT&T and NSA. His book reduces technical concepts in cybersecurity to basic principles and explains generically how they are effectively implemented. For the true techy who wants to fully understand all the formal logic behind the theories in Cyber Attacks, reach back to Ed Amoroso’s Fundamentals of Computer Security Technology (1994). 

By Edward Amoroso,

Why should I read it?

1 author picked Cyber Attacks as one of their favorite books, and they share why you should read it.

What is this book about?

Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well.

This book covers cyber security policy development for…


Book cover of Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet

Jennifer L. Bayuk Author Of Enterprise Security for the Executive: Setting the Tone from the Top

From my list on cybersecurity for every type of reader.

Why am I passionate about this?

I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.

Jennifer's book list on cybersecurity for every type of reader

Jennifer L. Bayuk Why did Jennifer love this book?

It is a reporter’s account of a cybersecurity entrepreneur stumbling into criminal and nation-state level cyberattacks, assisting in the investigation, and ultimately becoming a target. The writing is clear and accessible to the non-technical reader but it still conveys a good sense of what it is like to witness and investigate cyber-crime. It is a suspenseful human drama.

By Joseph Menn,

Why should I read it?

1 author picked Fatal System Error as one of their favorite books, and they share why you should read it.

What is this book about?

In 2004, a California computer whiz named Barrett Lyon uncovered the identity of a hacker running major assaults on business websites. Without fully grasping the repercussions, he set on an investigation that led him into the heart of the Russian mob. Cybercrime was evolving. No longer the domain of small-time thieves, it had been discovered by sophisticated gangs. They began by attacking corporate websites but increasingly stole financial data from consumers and defence secrets from governments. While Barrett investigated the cutting edge of technology crime, the U.S. government struggled to catch up. Britain, however, was a different story. In the…


Book cover of The End of Gender: Debunking the Myths about Sex and Identity in Our Society

Steve Vigdor Author Of Signatures of the Artist: The Vital Imperfections That Make Our Universe Habitable

From my list on science that should inform public policy.

Why am I passionate about this?

I’ve been passionate about science as a way of learning how nature works and approaching truth since I was a pre-teen. After five decades of basic research, teaching, and management in physics, I can distinguish good science from pseudoscience even beyond my own areas of expertise. I am greatly disturbed by attempts to undermine science in public policy-making when its findings conflict with ideology, religious beliefs, or business bottom lines. My passion project, via my blog debunkingdenial.com, is to explain to teachers and the public the underlying science and the flaws in science denial across a wide range of topics at the interface with public policy. 

Steve's book list on science that should inform public policy

Steve Vigdor Why did Steve love this book?

I love this book because the author debunks myths about sex and gender promulgated by both the political left and the political right. Soh surveys recent biological research on brain and fetal development that demonstrates that sex and gender identity are not identical; they are distinct biological traits developed at different stages of pregnancy. Sex is determined by reproductive organs normally formed within the first trimester.

At the same time, gender identity resides in the brain, whose development is influenced not only by chromosomes but also by exposure to hormones during the second trimester and all the way up to birth. Male and female brains are wired differently. Gender is not simply a “social construct,” as many social scientists claim. My understanding of many issues relevant to the contentious politics regarding gender and transgender rights has been influenced by this book.

By Debra Soh,

Why should I read it?

1 author picked The End of Gender as one of their favorite books, and they share why you should read it.

What is this book about?

International sex researcher, neuroscientist, and columnist Debra Soh debunks popular gender myths in this scientific examination of the many facets of gender identity that "is not only eminently reasonable and beautifully-written, it is brave and vital" (Ben Shapiro, #1 New York Times bestselling author).

Is our gender something we're born with, or are we conditioned by society? In The End of Gender, neuroscientist and sexologist Dr. Debra Soh uses a research-based approach to address this hot-button topic, unmasking popular misconceptions about the nature vs. nurture debate and exploring what it means to be a woman or a man in today's…


Book cover of Brainwashing: The science of thought control

Steve Vigdor Author Of Signatures of the Artist: The Vital Imperfections That Make Our Universe Habitable

From my list on science that should inform public policy.

Why am I passionate about this?

I’ve been passionate about science as a way of learning how nature works and approaching truth since I was a pre-teen. After five decades of basic research, teaching, and management in physics, I can distinguish good science from pseudoscience even beyond my own areas of expertise. I am greatly disturbed by attempts to undermine science in public policy-making when its findings conflict with ideology, religious beliefs, or business bottom lines. My passion project, via my blog debunkingdenial.com, is to explain to teachers and the public the underlying science and the flaws in science denial across a wide range of topics at the interface with public policy. 

Steve's book list on science that should inform public policy

Steve Vigdor Why did Steve love this book?

I love this book because it reveals that we are all creatures of neuronal habit, which brainwashers exploit to their own benefit. The neurons that trigger most frequently tend to dominate our thoughts. I see how the brain science revealed in Taylor’s book helps to account for our current Age of Misinformation.

With advertiser-click business models, social media allows would-be brainwashers to repeat and spread their messages beyond their former wildest imaginations. They need only plant a misinformation seed to see it spread virally by users whose neurons have been preconditioned to accept and like the message. I feel that social media regulations are needed to mitigate the creation of echo chambers in which brainwashed messages sow political polarization that threatens to make nations ungovernable.

By Kathleen Taylor,

Why should I read it?

1 author picked Brainwashing as one of their favorite books, and they share why you should read it.

What is this book about?

Throughout history, humans have attempted to influence and control the thoughts of others. Since the word 'brainwashing' was coined in the aftermath of the Korean War, it has become part of the popular culture and been exploited to create sensational headlines. It has also been the subject of learned discussion from many disciplines: including history, sociology, psychology, and psychotherapy. But until now, a crucial part of the debate has been missing: that of any serious reference to the science of the human brain. Descriptions of how opinions can be changed, whether by persuasion, deceit, or force, have been almost entirely…


Book cover of The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Eric J. Rzeszut Author Of 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

From my list on to help you protect your personal information.

Why am I passionate about this?

I have been an information technology and cybersecurity professional for over two decades. I’ve learned over and over again that “people are the weakest link.” You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via “social engineering” – to trick a human being into giving you the access you need, rather than trying to hack the system itself. The books on this list will help the reader lower their chances of being exploited like this.

Eric's book list on to help you protect your personal information

Eric J. Rzeszut Why did Eric love this book?

Kevin Mitnick is often called the “world’s most famous hacker,” and he spent years in prison for his crimes. However, he’s since reformed, and now advises individuals and corporations on how to protect their data. In this book, he talks about strategies that we can all use to better protect our data from exploitation by corporations and governments. Although it’s never possible to be truly “invisible” (despite the title of his book) he presents some great strategies to lower your risk profile.

By Kevin D. Mitnick,

Why should I read it?

1 author picked The Art of Invisibility as one of their favorite books, and they share why you should read it.

What is this book about?

Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and…


Book cover of The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

Sean McFate Author Of The New Rules of War: How America Can Win--Against Russia, China, and Other Threats

From my list on mercenaries from a former military contractor.

Why am I passionate about this?

Dr. Sean McFate is an expert on international relations and a former military contractor. He is a Senior Fellow at the Atlantic Council, a Washington DC think tank, and a professor at Georgetown University's School of Foreign Service, Syracuse University's Maxwell School, and the National Defense University. He began his career as a paratrooper and officer in the U.S. Army's 82nd Airborne Division. 

Sean's book list on mercenaries from a former military contractor

Sean McFate Why did Sean love this book?

There are cyber mercenaries too. Called “hackback” companies, they are illegal, offshore hackers who hack the hackers. While they cannot retrieve hacked material, they can cause a world of hurt for anyone who tries to hack you, and that’s why they matter: deterrence. CEOs and others around the world sometimes turn to hackback firms to make them hard targets. Also, countries like the United Arab Emirates hire former NSA hackers. New York Times reporter details some of this industry in his book about cyberwar. Like many in cyberspace, his claims are often sensationalized, but his reportage cannot be beat.

By David E. Sanger,

Why should I read it?

1 author picked The Perfect Weapon as one of their favorite books, and they share why you should read it.

What is this book about?

From Russia's tampering with the US election to the WannaCry hack that temporarily crippled the NHS, cyber has become the weapon of choice for democracies, dictators, and terrorists.

Cheap to acquire, easily deniable, and used for a variety of malicious purposes - from crippling infrastructure to sowing discord and doubt - cyberweapons are re-writing the rules of warfare. In less than a decade, they have displaced terrorism and nuclear missiles as the biggest immediate threat to international security and to democracy.

Here, New York Times correspondent David E. Sanger takes us from the White House Situation Room to the dens…


Book cover of The Code Breaker: Jennifer Doudna, Gene Editing, and the Future of the Human Race
Book cover of Merchants of Doubt: How a Handful of Scientists Obscured the Truth on Issues from Tobacco Smoke to Climate Change
Book cover of The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

Share your top 3 reads of 2024!

And get a beautiful page showing off your 3 favorite reads.

1,187

readers submitted
so far, will you?

5 book lists we think you will like!

Interested in cyber crimes, computer security, and the Internet?

Cyber Crimes 14 books
The Internet 24 books