Fans pick 13 books like We Are Anonymous

By Parmy Olson,

Here are 13 books that We Are Anonymous fans have personally recommended if you like We Are Anonymous. Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.

When you buy books, we may earn a commission that helps keep our lights on (or join the rebellion as a member).

Book cover of The Journal of the Institute for Hacks, Tomfoolery & Pranks at MIT

Jeremy N. Smith Author Of Breaking and Entering: The Extraordinary Story of a Hacker Called Alien

From my list on hackers and hacking.

Why am I passionate about this?

Jeremy N. Smith is the author of three acclaimed narrative non-fiction books, including Breaking and Entering, about a female hacker called “Alien” and the birth of our information insecurity age. He has written for The Atlantic, Discover, Slate, and the New York Times, among other outlets, and he and his work have been featured by CNN, NPR, NBC Nightly News, The Today Show, and Wired. He hosts The Hacker Next Door podcast and lives in Missoula, Montana.

Jeremy's book list on hackers and hacking

Jeremy N. Smith Why did Jeremy love this book?

The Journal of IHTFP (look up that acronym!) is a delightful introduction to the original hacking scene at MIT, where hacks were elaborate, extremely clever student pranks—handing out colored cards at a Harvard-Yale football game to spell MIT rather than BEAT YALE when raised by eleven hundred Harvard fans, for example, or sneaking a power supply, multi-piece wooden frame, and the outer metal parts of a Chevrolet Cavalier atop the school’s Great Dome, so it appeared that the building was mounted by a real police cruiser, complete with flashing lights and boxes of Dunkin’ Donuts. The oversized book includes numerous photographs. Now out of print, it has been replaced by Nightwork by T. F. Peterson, which includes more recent hacks.

Book cover of Hackers: Heroes of the Computer Revolution

Jeremy N. Smith Author Of Breaking and Entering: The Extraordinary Story of a Hacker Called Alien

From my list on hackers and hacking.

Why am I passionate about this?

Jeremy N. Smith is the author of three acclaimed narrative non-fiction books, including Breaking and Entering, about a female hacker called “Alien” and the birth of our information insecurity age. He has written for The Atlantic, Discover, Slate, and the New York Times, among other outlets, and he and his work have been featured by CNN, NPR, NBC Nightly News, The Today Show, and Wired. He hosts The Hacker Next Door podcast and lives in Missoula, Montana.

Jeremy's book list on hackers and hacking

Jeremy N. Smith Why did Jeremy love this book?

Hackers is a classic account of the computer revolution, centered on the pioneering tinkerers, gamers, social theorists, entrepreneurs, and other explorers who made military and corporate technology personal. These are not hackers in the criminal sense most people understand the term today, but men (and a few women) like Bill Gates, Steve Jobs, and others far less famous. Their interwoven biographies are brilliantly researched and reported, underpinned by what Levy calls a common “hacker ethic” whose tenets dominate our economy, politics, and culture today.

By Steven Levy,

Why should I read it?

1 author picked Hackers as one of their favorite books, and they share why you should read it.

What is this book about?

Steven Levy's classic book about the original hackers of the computer revolution is now available in a special 25th anniversary edition, with updated material from noteworthy hackers such as Bill Gates, Mark Zukerberg, Richard Stallman, and Tim O'Reilly. Hackers traces the exploits of innovators from the research labs in the late 1950s to the rise of the home computer in the mid-1980s. It's a fascinating story of brilliant and eccentric nerds such as Steve Wozniak, Ken Williams, and John Draper who took risks, bent the rules, and took the world in a radical new direction. "Hacker" is often a derogatory…


Book cover of The New Hacker's Dictionary

Jeremy N. Smith Author Of Breaking and Entering: The Extraordinary Story of a Hacker Called Alien

From my list on hackers and hacking.

Why am I passionate about this?

Jeremy N. Smith is the author of three acclaimed narrative non-fiction books, including Breaking and Entering, about a female hacker called “Alien” and the birth of our information insecurity age. He has written for The Atlantic, Discover, Slate, and the New York Times, among other outlets, and he and his work have been featured by CNN, NPR, NBC Nightly News, The Today Show, and Wired. He hosts The Hacker Next Door podcast and lives in Missoula, Montana.

Jeremy's book list on hackers and hacking

Jeremy N. Smith Why did Jeremy love this book?

The New Hacker’s Dictionary is the foremost compilation of the first fifty years of hacker lore, combining hilarious anecdotes and definitions to illuminate a hugely-influential but wildly-misunderstood culture more similar to beer-brewing monks than black-clad criminals. Though last updated in 1996, the technology, terms, and theories explained within still underlie the modern Internet, making this dictionary a dual cultural and architectural blueprint for anyone interested in how computing got to the present moment—and how to build a better future.

By Eric S. Raymond,

Why should I read it?

1 author picked The New Hacker's Dictionary as one of their favorite books, and they share why you should read it.

What is this book about?

This new edition of the hacker's own phenomenally successful lexicon includes more than 100 new entries and updates or revises 200 more.

This new edition of the hacker's own phenomenally successful lexicon includes more than 100 new entries and updates or revises 200 more. Historically and etymologically richer than its predecessor, it supplies additional background on existing entries and clarifies the murky origins of several important jargon terms (overturning a few long-standing folk etymologies) while still retaining its high giggle value.

Sample definition

hacker n. [originally, someone who makes furniture with an axe] 1. A person who enjoys exploring the…


Book cover of Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Jeremy N. Smith Author Of Breaking and Entering: The Extraordinary Story of a Hacker Called Alien

From my list on hackers and hacking.

Why am I passionate about this?

Jeremy N. Smith is the author of three acclaimed narrative non-fiction books, including Breaking and Entering, about a female hacker called “Alien” and the birth of our information insecurity age. He has written for The Atlantic, Discover, Slate, and the New York Times, among other outlets, and he and his work have been featured by CNN, NPR, NBC Nightly News, The Today Show, and Wired. He hosts The Hacker Next Door podcast and lives in Missoula, Montana.

Jeremy's book list on hackers and hacking

Jeremy N. Smith Why did Jeremy love this book?

A famous hacker’s real-life story, told from his own perspective, Ghost in the Wires explains how criminal hackers think and act and the diverse techniques they use, no keyboard necessary—all, in this case, with little motive beyond a compulsion to explore and exploit. The hacking community has no bigger characters than Kevin Mitnick and no better first-person accounts of the art of “social engineering,” or human hacking—manipulating people (including, in Mitnick’s case, the FBI and other would-be pursuers) to your own advantage.

By Kevin Mitnick, William L. Simon,

Why should I read it?

1 author picked Ghost in the Wires as one of their favorite books, and they share why you should read it.

What is this book about?

In this "intriguing, insightful and extremely educational" novel, the world's most famous hacker teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data (Frank W. Abagnale).

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies -- and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI's net finally began to tighten, Mitnick went on the run, engaging in an increasingly sophisticated game of hide-and-seek that escalated…


Book cover of Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World

George Finney Author Of Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

From my list on books on cybersecurity that anyone can understand.

Why am I passionate about this?

I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.

George's book list on books on cybersecurity that anyone can understand

George Finney Why did George love this book?

I loved this one because there are so many really influential people in the world today who started out as hackers. Former Texas Legislator and presidential candidate Beto O’Rourke was a member of one of the first hacker groups, The Cult of the Dead Cow.

What really makes this one stand out for me was how Menn was able to illustrate how our culture of cybersecurity today, things like responsible disclosure of security vulnerabilities, was shaped by the hacker ethos as a response to mega corporations actively trying to ignore the problem or even suing researchers to prevent them from talking rather than to fix the issues.

By Joseph Menn,

Why should I read it?

1 author picked Cult of the Dead Cow as one of their favorite books, and they share why you should read it.

What is this book about?

Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development of Tor, the most important privacy tool on the net, and helped build cyberweapons that advanced US security without injuring anyone. With its origins in the earliest…


Book cover of Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous

Gareth Southwell Author Of MUNKi

From my list on why we should rise up against our robot overlords.

Why am I passionate about this?

I’m a philosopher, writer, and illustrator from Wales, UK. I grew up on ’70s sci-fi—Star Wars (the original trilogy!), Battlestar Galactica (the original series!), The Black Hole (Remember that?! No? Oh well…). Space travel, flying cars, sassy computers you could banter with, cute robots who would be your best friend—it was a time when the future seemed just around the corner. But now, as these things finally start to arrive, I feel I’ve been mis-sold. Data theft? Mass surveillance? Killer drones? Election manipulation? Social media bot farms? This isn’t the future I signed up for! Or maybe I should have read the terms and conditions…

Gareth's book list on why we should rise up against our robot overlords

Gareth Southwell Why did Gareth love this book?

The Luddites supposedly got their name from their shadowy founder, a certain Ned Ludd, who was apparently the first to take a hammer to the instruments of industrial progress. As such, his name became a sort of protective disguise for the purposes of anonymous protest: Who smashed the loom? “Ned Ludd did it!” In a similar way, computer hackers such as Anonymous have adopted the Guy Fawkes mask as an emblem of disruption, pranking, and activism. In this fascinating study, anthropologist Gabriella Coleman investigates Anonymous, tracing its origins from the message boards of 4chan, through the Occupy movement and the Wikileaks controversy, revealing firsthand through her interaction with the community the diversity and complexity of the hacking world, and the varying motives of its actors.

By Gabriella Coleman,

Why should I read it?

1 author picked Hacker, Hoaxer, Whistleblower, Spy as one of their favorite books, and they share why you should read it.

What is this book about?

Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name Anonymous, by the writer the Huffington Post says "knows all of Anonymous' deepest, darkest secrets." Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely connected to Anonymous that the tricky story…


Book cover of Duty Free Art: Art in the Age of Planetary Civil War

David Joselit Author Of Heritage and Debt: Art in Globalization

From my list on art and globalization.

Why am I passionate about this?

I have been professionally involved with contemporary art since the 1980s, when I was a curator at the Institute of Contemporary Art in Boston. In the forty years since I've seen an enormous shift in the orientation of American curators and scholars from Western art to a global perspective. After earning my PhD at Harvard, and writing several books on contemporary art, I wanted to tackle the challenge of a truly comparative contemporary art history. To do so, I've depended on the burgeoning scholarship from a new more diverse generation of art historians, as well as on many decades of travel and research. My book Heritage and Debt is an attempt to synthesize that knowledge. 

David's book list on art and globalization

David Joselit Why did David love this book?

Hito Steyerl is one of the most prominent artists and media theorists in the world. Her essays draw unexpected and always stimulating connections between media technologies, surveillance, war, and political power. They are short, concise, and a pleasure to read, but they always engage with big ideas around the ethical and social challenges of a world made global through the framework of the Internet and digital communication more broadly.

By Hito Steyerl,

Why should I read it?

1 author picked Duty Free Art as one of their favorite books, and they share why you should read it.

What is this book about?

In Duty Free Art, filmmaker and writer Hito Steyerl wonders how we can appreciate, or even make art, in the present age. What can we do when arms manufacturers sponsor museums, and some of the world's most valuable artworks are used as a fictional currency in a global futures market that has nothing to do with the work itself? Can we distinguish between creativity and the digital white noise that bombards our everyday lives? Exploring artefacts as diverse as video games, Wikileaks files, the proliferation of spam, and political actions, she exposes the paradoxes within globalization, political economies, visual culture,…


Book cover of The Girl with the Dragon Tattoo

Rick Simonds Author Of Operation: Midnight

From my list on thrillers revealing government conspiracies.

Why am I passionate about this?

I have long had an interest in government conspiracies and have spent hundreds of hours researching the many experiments our government has foisted upon an unsuspecting populous. When the Church Committee released info on Projects MK Ultra, Bluebird, Artichoke, and others, people were stunned to realize what had been going on. Movies such as The Matrix dealt with mind control and the attempt to create the perfect soldier, and I am convinced such research and experimentation continues today.

Rick's book list on thrillers revealing government conspiracies

Rick Simonds Why did Rick love this book?

This wonderful novel features a journalist, Mikala Blomkvist, searching for a highly respected, long-lost member of a notable family. Once again, government corruption is rampant in the investigation.

A special aspect of this novel is the introduction of Lisbeth Salander, a brash, tattooed young woman with an abrasive personality matched only by her singular skills. I loved this character, who is incredibly unique.

By Stieg Larsson,

Why should I read it?

27 authors picked The Girl with the Dragon Tattoo as one of their favorite books, and they share why you should read it.

What is this book about?

Forty years ago, Harriet Vanger disappeared from a family gathering on the island owned and inhabited by the powerful Vanger clan. Her body was never found, yet her uncle is convinced it was murder - and that the killer is a member of his own tightly-knit but dysfunctional family.

He employs disgraced financial journalist Mikael Blomkvist and the tattooed, truculent computer hacker Lisbeth Salander to investigate. When the pair link Harriet's disappearance to a number of grotesque murders from forty years ago, they begin to unravel a dark and appalling family history.

But the Vangers are a secretive clan, and…


Book cover of Beat the Fraudster: How to Easily Protect Yourself Online and Offline

Paul Lewis Author Of Money Box: Your Toolkit for Balancing Your Budget, Growing Your Bank Balance and Living a Better Financial Life

From my list on money and your life.

Why am I passionate about this?

I realised in my twenties that there were millions of people who desperately needed advice about their money but could not afford an accountant or an adviser. Since then my passion has been to simplify the deliberately complex financial world, explain the obscure and often unintelligible rules about tax, childcare, benefits, investment, savings, and borrowing. Recently as the tsunami of fraud has swept across the UK I have devoted more time to help people avoid losing money to scammers – both criminal and respectable. Most people can’t afford professional advice, but they can afford me – I’m freely available in print, on air, and online. 

Paul's book list on money and your life

Paul Lewis Why did Paul love this book?

Fraud is now 40% of all crime. It is the crime we are most likely to come across. Yet the authorities seem powerless to stop it. This book explains how frauds work and, armed with that knowledge, how to prevent them happening to you. Doug has years of experience and understands the world of fraud as well as any fraudster. Read it and keep safe. 

By Doug McAdam,

Why should I read it?

1 author picked Beat the Fraudster as one of their favorite books, and they share why you should read it.

What is this book about?

Email protection, PayPal security, web browser attacks... how to prevent cybercrime and protect your digital self from being a target of scammers.

Not all frauds require your participation. Whilst scams require you to fall for their ruse, other frauds occur in the background completely without your knowledge or consent, such as identity theft.

Whilst millennials and the elderly are statistically at a higher risk, due to lack of life experience or technological advancements, fraudsters often actively target business owners aged between 30-60 as they often have better credit ratings. Even high-ranking police officers and fraud specialists have fallen victim. Anyone…


Book cover of The Code

William Fietzer Author Of Metadata Murders

From my list on technothrillers with a cyber-security protagonist.

Why am I passionate about this?

I’ve been fascinated by the potential of the Internet ever since I chaired the Metadata subcommittee for the American Library Association. Here was a device capable of benefiting lives or destroying mankind simultaneously. Particularly intriguing was its almost supernatural ability to accomplish these ends as if we were gods beyond the realms of morality or accountability. I’m not a very spiritual person, but such potential calls out for revising our old worldviews and/or exploring new ways of coping with our burgeoning technical prowess and moral responsibilities. Dealing with these conflicts is what I write about and what stories from other authors I recommend to readers.

William's book list on technothrillers with a cyber-security protagonist

William Fietzer Why did William love this book?

The plot twist at the beginning delighted me. Anti-heroine and computer hacker Nina Walker plays Robin Hood on behalf of her grandmother and pays the price—a mysterious man named Carter kidnaps and forces her to return the money she stole to the other unpaid claimants. But Carter, too, has been blackmailed by the gangster Dante to retrieve the funds and has other personal motivations for dealing with him.

This twist sets up unique moral dilemmas for both characters. Though needing each other to survive, each must decide whether their growing attraction for each other outweighs their family bonds. It is a fine thriller that operates on several levels; my sole reservation is how the book’s character descriptions provide only shadowy outlines instead of fully-fleshed individuals.

By Brooke Sivendra,

Why should I read it?

1 author picked The Code as one of their favorite books, and they share why you should read it.

What is this book about?

Look over your shoulder, you’re not alone…

When Nina's disabled grandmother’s insurance company refuses to pay for a recent hospital admission, the determined IT assistant decides she’ll teach them a lesson. Nina hacks their system, steals their data, and demands a ransom. Upon payment, she distributes the money to their customers—people like her grandmother who need it to survive. But not everyone sees her as a modern-day Robin Hood. Despite good intentions, her actions are...well, illegal.

Carter’s life—and career—is built on secrets that haunt him while he sleeps. Carter wants to leave it all behind him, but when his brother…


Book cover of The Journal of the Institute for Hacks, Tomfoolery & Pranks at MIT
Book cover of Hackers: Heroes of the Computer Revolution
Book cover of The New Hacker's Dictionary

Share your top 3 reads of 2024!

And get a beautiful page showing off your 3 favorite reads.

1,593

readers submitted
so far, will you?

5 book lists we think you will like!

Interested in computer security, cyber crimes, and hackers?

Cyber Crimes 15 books
Hackers 16 books