The most recommended cyber crime books

Who picked these books? Meet our 14 experts.

14 authors created a book list connected to cyber crimes, and here are their favorite cyber crime books.
Shepherd is reader supported. When you buy books, we may earn an affiliate commission.

What type of cyber crime book?

Loading...
Loading...

Book cover of Managing the Risk of Fraud and Misconduct: Meeting the Challenges of a Global, Regulated and Digital Environment

Mónica Ramírez Chimal Author Of Don't Let Them Wash, Nor Dry!: A Simple and Easy Guide to Protect Your Company from the Risk of Money Laundering

From my list on tackling money laundering risk.

Why am I passionate about this?

The prevention of money laundering caught my attention, and at that time, with so little information on the market, I decided to write my first book so that more people can protect themselves from this crime. I have a gift: explain complicated topics in an easy way. This has helped me to write several articles on different topics in international magazines. I’m a passionate-effective trainer who believes that helping people to grow helps to make this world better. It’s my legacy! I like to do the right thing; take this as a reliable fact: I consult my own book and articles written. I hope to help you grow too!

Mónica's book list on tackling money laundering risk

Mónica Ramírez Chimal Why did Mónica love this book?

I worked at Arthur Andersen, and I was selected to be among the few teams that started to understand, learn, and apply risk assessments or business risk management methodology. In this book, I came across these concepts again, which are vital to identifying where the risk of money laundering and any other crime may occur. In addition, this book also includes useful information to be considered in the compliance program and how fraud and corruption are related to money laundering. It's a book that provides solid knowledge.

By Richard Girgenti, Timothy Hedley,

Why should I read it?

1 author picked Managing the Risk of Fraud and Misconduct as one of their favorite books, and they share why you should read it.

What is this book about?

Praise for Managing the Risk of Fraud and Misconduct: Meeting the Challenge of a Global, Regulated, and Digital Environment

"This book belongs on any desk where fraud and misconduct threaten. It is bristling with the kind of detail this field truly needs. Written by leading pros at the top of their game, its soup-to-nuts advice matches solutions to problems. Read it once to gain broad insight; come back again and again to manage particular risks."
Thomas Donaldson, Professor of Legal Studies and Business Ethics,Wharton School of the University of Pennsylvania

"A valuable road map for corporate fraud fighters in an…


Book cover of The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

Rebecca Cantrell Author Of The Girl Who Would Live Forever

From my list on nerds getting into trouble.

Why am I passionate about this?

I love nerds. I’ve always identified as one and years working in the high-tech world of Silicon Valley made me appreciate their passion, dedication to optimization, and wonderful senses of humor. I once scheduled a meeting with a programmer and afterwards he said “this meeting wasn’t the complete waste of time I expected,” and I took that as a compliment. A lot of books and movies make nerds pretty and shiny and one note. The nerds in these books all rang true to me—they approach difficult situations with logic and humor. They’re complex and compassionate and the kind of people I want to know more about.

Rebecca's book list on nerds getting into trouble

Rebecca Cantrell Why did Rebecca love this book?

A nonfiction book about an actual nerd who stubbornly investigated a 75 cent accounting error and ended up uncovering an international espionage ring during the Cold War. As nerds do. Along the way, he invented many techniques still used in cybersecurity. It ought to be dry, but it’s funny and charming and it perfectly evokes Berkeley in the 1980s. I was a computer operator at Carnegie Mellon and my workday was very similar to Stoll’s. For me this book was a time machine to my early 20s. I could see, hear, and feel every scene. If you ever think that your nerdy obsessions don’t matterthis shows that they do.

By Clifford Stoll,

Why should I read it?

3 authors picked The Cuckoo's Egg as one of their favorite books, and they share why you should read it.

What is this book about?

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name…


Book cover of Who Controls the Internet? Illusions of a Borderless World

Raphael Cohen-Almagor Author Of Confronting the Internet's Dark Side: Moral and Social Responsibility on the Free Highway

From my list on the internet's history, development, and challenges.

Why am I passionate about this?

Raphael Cohen-Almagor, DPhil, St. Catherine’s College, University of Oxford, is Professor of Politics, Olof Palme Visiting Professor, Lund University, Founding Director of the Middle East Study Centre, University of Hull, and Global Fellow, Woodrow Wilson International Center for Scholars. Raphael taught, inter alia, at Oxford (UK), Jerusalem, Haifa (Israel), UCLA, Johns Hopkins (USA), and Nirma University (India). With more than 300 publications, Raphael has published extensively in the field of political philosophy, including Liberal Democracy and the Limits of Tolerance; Challenges to Democracy; The Right to Die with Dignity; The Scope of Tolerance; Confronting the Internet's Dark Side; Just, Reasonable Multiculturalism, and The Republic, Secularism and Security: France versus the Burqa and the Niqab.

Raphael's book list on the internet's history, development, and challenges

Raphael Cohen-Almagor Why did Raphael love this book?

Due to its global nature and reach, some people think that because the internet knows no borders, it also does not have limits. This concept is wrong. Goldsmith and Wu tell the fascinating story of the internet's challenges to governmental rule. They ask: who is really in control of the internet? And does the internet liberate us from government, borders, and even our physical selves? In a lively prose, the authors peppered their arguments with real-life examples concerning disagreements between giants of the internet and democratic and authoritarian governments. They show that governments have been asserting their power to direct the future of the internet.

Internet intermediaries have to filter content geographically to comply with local law for a small fraction of their communications. This imposes costs on them, and forces them to adjust to this cost of business. But in light of the internet’s many advantages, the authors argue…

By Jack Goldsmith, Tim Wu,

Why should I read it?

1 author picked Who Controls the Internet? Illusions of a Borderless World as one of their favorite books, and they share why you should read it.

What is this book about?

Will cyberanarchy rule the net? And if we do find a way to regulate our cyberlife will national borders dissolve as the Internet becomes the first global state? In this provocative new work, Jack L. Goldsmith and Tim Wu dismiss the fashionable talk of both a 'borderless' net and of a single governing 'code'. Territorial governments can and will, they contend, exercise significant control over all aspects of Internet communications. Examining policy puzzles from
e-commerce to privacy, speech and pornography, intellectual property, and cybercrime, Who Controls the Internet demonstrates that individual governments rather than private or global bodies will play…


Book cover of Beat the Fraudster: How to Easily Protect Yourself Online and Offline

Paul Lewis Author Of Money Box: Your Toolkit for Balancing Your Budget, Growing Your Bank Balance and Living a Better Financial Life

From my list on money and your life.

Why am I passionate about this?

I realised in my twenties that there were millions of people who desperately needed advice about their money but could not afford an accountant or an adviser. Since then my passion has been to simplify the deliberately complex financial world, explain the obscure and often unintelligible rules about tax, childcare, benefits, investment, savings, and borrowing. Recently as the tsunami of fraud has swept across the UK I have devoted more time to help people avoid losing money to scammers – both criminal and respectable. Most people can’t afford professional advice, but they can afford me – I’m freely available in print, on air, and online. 

Paul's book list on money and your life

Paul Lewis Why did Paul love this book?

Fraud is now 40% of all crime. It is the crime we are most likely to come across. Yet the authorities seem powerless to stop it. This book explains how frauds work and, armed with that knowledge, how to prevent them happening to you. Doug has years of experience and understands the world of fraud as well as any fraudster. Read it and keep safe. 

By Doug McAdam,

Why should I read it?

1 author picked Beat the Fraudster as one of their favorite books, and they share why you should read it.

What is this book about?

Email protection, PayPal security, web browser attacks... how to prevent cybercrime and protect your digital self from being a target of scammers.

Not all frauds require your participation. Whilst scams require you to fall for their ruse, other frauds occur in the background completely without your knowledge or consent, such as identity theft.

Whilst millennials and the elderly are statistically at a higher risk, due to lack of life experience or technological advancements, fraudsters often actively target business owners aged between 30-60 as they often have better credit ratings. Even high-ranking police officers and fraud specialists have fallen victim. Anyone…


Book cover of The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime

Leslie Shannon Author Of Interconnected Realities: How the Metaverse Will Transform Our Relationship with Technology Forever

From my list on when hot new technology meets reality.

Why am I passionate about this?

I’m the Head of Trend and Innovation Scouting for Nokia, and I’ve been with the company since the glory days of Nokia mobile phone world dominance. I know first-hand what happens when a company focuses exclusively on the technology, not the humans that use it, and how quickly that can lead to disaster. One of the lessons that I see repeated continuously in the field of innovation is that a huge amount of attention gets paid to the new technology, and not nearly enough on how the technology will interact with our existing systems, beliefs, attitudes, and culture. Learning from the mistakes is the best way to make sure that the future doesn’t repeat them!

Leslie's book list on when hot new technology meets reality

Leslie Shannon Why did Leslie love this book?

Stepping away from the topic of immersive technology, The Ransomware Hunting Team instead looks at the realities of cybercrime in the US, and why especially our government infrastructure has such a hard time fighting it effectively. 

Like all the other books on my list, it’s an examination of what happens when the rubber meets the road with a new technology, and how we humans often just aren’t very good at adapting to change.  

Part of the key problem is that hackers – including the white hat hackers that you want on your side to bring down the bad guys – tend not to be social animals, and our official organizations are far happier hiring a smiling guy in a suit than a scowling nerd who would rather work from his dark bedroom at home.  (Apologies for the stereotypes, but – this really is a problem!) 

This book is an absorbing…

By Renee Dudley, Daniel Golden,

Why should I read it?

1 author picked The Ransomware Hunting Team as one of their favorite books, and they share why you should read it.

What is this book about?

Scattered across the world, an elite team of code-cracking techies is working tirelessly on your behalf to thwart the most notorious cyber scourge of our time. You've probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, especially if its cybersecurity is imperfect, chances are that you're painfully familiar with the group's sworn enemy: ransomware. Again and again, these ordinary people, mostly self-taught and often struggling to make ends meet, have outwitted the shadowy networks of hackers and criminal gangs that lock computer networks and extort huge payments in return…


Book cover of SafeCyberHome: Protect Your Family From Fraud, Identity Theft and Computer Hackers

Eric J. Rzeszut Author Of 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

From my list on to help you protect your personal information.

Why am I passionate about this?

I have been an information technology and cybersecurity professional for over two decades. I’ve learned over and over again that “people are the weakest link.” You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via “social engineering” – to trick a human being into giving you the access you need, rather than trying to hack the system itself. The books on this list will help the reader lower their chances of being exploited like this.

Eric's book list on to help you protect your personal information

Eric J. Rzeszut Why did Eric love this book?

SafeCyberHome focuses on understanding how corporations and governments collect and use our personal data. The book also gives strategies for opting out of this data collection whenever possible. And, where it is not possible to opt-out, the book gives clear explanations on why we should be as restrictive with our personal data as possible. Vancannon uses an example similar to one from my own book: if someone is really determined to get your data, they will. But if they’re just looking for an easy target, and you’re not one, they’ll move on. Same reason you lock your front door – a determined master thief can defeat even the best lock, if they really want to – but do you want to make your house the easiest target on the block?

By Billy VanCannon,

Why should I read it?

1 author picked SafeCyberHome as one of their favorite books, and they share why you should read it.

What is this book about?

Online security and data privacy is one of the most pressing yet misunderstood issues of our time.

Today we use the internet to shop, work, learn, and be entertained. At the same time, we leave a trail that others can use to steal from us, assume our identity to commit crimes in our names, and hack our computers. If you ever felt helpless because governments and corporations can’t protect themselves with all their resources, then this book is for you. The vast majority of fraud and cybercrime can be stopped with basic knowledge about how your data is collected and…


Book cover of American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road

Brady Dale Author Of SBF: How The FTX Bankruptcy Unwound Crypto's Very Bad Good Guy

From my list on cryptocurrency, aka, magic space money.

Why am I passionate about this?

I’ve been writing about cryptocurrency since 2015, and full-time since 2017. I’ve worked for the biggest crypto news site in the world, CoinDesk, but now I write about it every day for a more mainstream audience. Cryptocurrency fits at a nexus at the kind of things I’m drawn to: It’s technological, it’s economic and it freaks people out. Unlike a lot of people who write about crypto, I’ve actually played around with the stuff. I’m not an investor, but I have used it. Using it is really the only way anyone gets to the point of grokking it, and I grok the stuff.

Brady's book list on cryptocurrency, aka, magic space money

Brady Dale Why did Brady love this book?

I’ve never read a non-fiction book that felt so much like a novel as American Kingpin. The book absolutely bounds from event to event. 

It presents a solid cast of law enforcement misfits who all get sucked into chasing down the people behind The Silk Road website that’s giving so many people access to illicit drugs, and it details all the quirky little mistakes that The Dread Pirate Roberts made on his way to getting arrested. 

This is crucial to bitcoin history, like it or not, because The Silk Road was the first marketplace where there was real demand for paying in bitcoin. 

This book isn’t going to really help anyone develop a deeper understanding of cryptocurrency, but it will help them understand something that’s endemic in the scene: ideologues who gets sucked into a way of thinking and take it much too far. 

This is a great read for…

By Nick Bilton,

Why should I read it?

1 author picked American Kingpin as one of their favorite books, and they share why you should read it.

What is this book about?


A NEW YORK TIMES BESTSELLER

The unbelievable true story of the man who built a billion-dollar online drug empire from his bedroom - and almost got away with it.

In 2011, a twenty-six-year-old programmer named Ross Ulbricht launched the ultimate free market: the Silk Road, a clandestine Web site hosted on the Dark Web where anyone could trade anything - drugs, hacking software, forged passports, counterfeit cash, poisons - free of the government's watchful eye. While the federal government were undertaking an epic two-year manhunt for the site's elusive proprietor, the Silk Road quickly ballooned into a $1.2 billion enterprise.…


Book cover of Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Jeremy N. Smith Author Of Breaking and Entering: The Extraordinary Story of a Hacker Called Alien

From my list on hackers and hacking.

Why am I passionate about this?

Jeremy N. Smith is the author of three acclaimed narrative non-fiction books, including Breaking and Entering, about a female hacker called “Alien” and the birth of our information insecurity age. He has written for The Atlantic, Discover, Slate, and the New York Times, among other outlets, and he and his work have been featured by CNN, NPR, NBC Nightly News, The Today Show, and Wired. He hosts The Hacker Next Door podcast and lives in Missoula, Montana.

Jeremy's book list on hackers and hacking

Jeremy N. Smith Why did Jeremy love this book?

A famous hacker’s real-life story, told from his own perspective, Ghost in the Wires explains how criminal hackers think and act and the diverse techniques they use, no keyboard necessary—all, in this case, with little motive beyond a compulsion to explore and exploit. The hacking community has no bigger characters than Kevin Mitnick and no better first-person accounts of the art of “social engineering,” or human hacking—manipulating people (including, in Mitnick’s case, the FBI and other would-be pursuers) to your own advantage.

By Kevin Mitnick, William L. Simon,

Why should I read it?

1 author picked Ghost in the Wires as one of their favorite books, and they share why you should read it.

What is this book about?

In this "intriguing, insightful and extremely educational" novel, the world's most famous hacker teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data (Frank W. Abagnale).

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies -- and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI's net finally began to tighten, Mitnick went on the run, engaging in an increasingly sophisticated game of hide-and-seek that escalated…


Book cover of Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet

Jennifer L. Bayuk Author Of Enterprise Security for the Executive: Setting the Tone from the Top

From my list on cybersecurity for every type of reader.

Why am I passionate about this?

I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.

Jennifer's book list on cybersecurity for every type of reader

Jennifer L. Bayuk Why did Jennifer love this book?

It is a reporter’s account of a cybersecurity entrepreneur stumbling into criminal and nation-state level cyberattacks, assisting in the investigation, and ultimately becoming a target. The writing is clear and accessible to the non-technical reader but it still conveys a good sense of what it is like to witness and investigate cyber-crime. It is a suspenseful human drama.

By Joseph Menn,

Why should I read it?

1 author picked Fatal System Error as one of their favorite books, and they share why you should read it.

What is this book about?

In 2004, a California computer whiz named Barrett Lyon uncovered the identity of a hacker running major assaults on business websites. Without fully grasping the repercussions, he set on an investigation that led him into the heart of the Russian mob. Cybercrime was evolving. No longer the domain of small-time thieves, it had been discovered by sophisticated gangs. They began by attacking corporate websites but increasingly stole financial data from consumers and defence secrets from governments. While Barrett investigated the cutting edge of technology crime, the U.S. government struggled to catch up. Britain, however, was a different story. In the…


Book cover of This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

Jennifer L. Bayuk Author Of Enterprise Security for the Executive: Setting the Tone from the Top

From my list on cybersecurity for every type of reader.

Why am I passionate about this?

I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.

Jennifer's book list on cybersecurity for every type of reader

Jennifer L. Bayuk Why did Jennifer love this book?

A reporter’s account of nation-states' relentless pursuit of superior offensive capability. Although former NSA officials may not agree with every word, it is generally acknowledged to be a true trail of facts available to reporters. Most cybersecurity staff are routinely muzzled by legal confidentiality agreements in the same manner as staff who have access to business trade secrets. There are few reporters who have had as much access as Perlroth to those individuals. 

By Nicole Perlroth,

Why should I read it?

1 author picked This Is How They Tell Me the World Ends as one of their favorite books, and they share why you should read it.

What is this book about?

THE NEW YORK TIMES BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations)

"Written in the hot, propulsive prose of a spy thriller" (The New York Times), the untold story of the cyberweapons market-the most secretive, government-backed market on earth-and a terrifying first look at a new kind of global warfare.

Zero-day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero-day has the power…