Electrifying Nonfiction Books on Cybersecurity and Hacking

These fast-paced true stories and investigative reports explore the world of cybersecurity and hacking with crimes ranging from identity theft to attempts at overthrowing world powers. You may never open your computer again.

Share This List

1. Ghost in the Wires: My Adventures as the World's Most Wanted Hacker by Kevin Mitnick and William L. Simon

Ghost in the Wires- My Adventures as the World's Most Wanted Hacker by Kevin Mitnick and William L. Simon

Does this book
belong on the list?

From the editor:

world’s biggest companies — and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI’s net finally began to tighten, Mitnick went on the run, engaging in an increasingly sophisticated game of hide-and-seek that escalated through false identities, a host of cities, and plenty of close shaves, to an ultimate showdown with the Feds, who would stop at nothing to bring him down.

Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escapes — and a portrait of a visionary who forced the authorities to rethink the way they pursued him, and forced companies to rethink the way they protect their most sensitive information.

Amazon Logo
Kindle Logo
Audible Logo
Barnes and Noble Logo
Nook Logo
iBooks Logo

Amazon Logo
Audible Logo
Barnes and Noble Logo

Kindle Logo
iBooks Logo
Nook Logo

What people are saying

Loved it and sometimes I wish to forget the book to read it again.

@L4Z4R3

GHOST IN THE WIRES by Kevin Mitnick – this book is filled with creativity, craziness, and suspense. It’s how hackers think, perform and prevent. Well explained by his real story. Overall, this book is awesome – you feel the power of hacking.

@Sky_l3nd3R

2. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage by Cliff Stoll

The Cuckoo's Egg- Tracking a Spy Through the Maze of Computer Espionage by Cliff Stoll

Does this book
belong on the list?

From the editor:

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll’s dramatic firsthand account is “a computer-age detective story, instantly fascinating [and] astonishingly gripping” (Smithsonian).

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker’s code name was “Hunter” — a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases — a one-man sting operation that finally gained the attention of the CIA…and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.

Amazon Logo
Kindle Logo
Audible Logo
Barnes and Noble Logo
Nook Logo
iBooks Logo

Amazon Logo
Audible Logo
Barnes and Noble Logo

Kindle Logo
iBooks Logo
Nook Logo

What people are saying

Cuckoo’s Egg is an absolute must for anyone interested in the defending or intel sides of security!

@AnIrregularRegular

The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage by Cliff Stoll is a great book about the hunt for a hacker who broke into a German computer system. It’s a great blend of story and technical details.

@Techryptic

3. Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers by Andy Greenberg

Sandworm- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers by Andy Greenberg

Does this book
belong on the list?

From the editor:

In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world’s largest businesses—from drug manufacturers to software developers to shipping companies. At the attack’s epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen.

The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia’s military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.

A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin’s role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia’s global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur—with world-shaking implications.

Amazon Logo
Kindle Logo
Audible Logo
Barnes and Noble Logo
Nook Logo
iBooks Logo

Amazon Logo
Audible Logo
Barnes and Noble Logo

Kindle Logo
iBooks Logo
Nook Logo

What people are saying

Sandworm by Andy Greenberg was really well done.

@deekaph

The best book on the matter Sandworm by Andy Greenberg. It is so in-depth and well-researched that I seriously doubt I could add anything beyond that book’s value.

@comrade-linux

4. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon by Kim Zetter

Countdown to Zero Day- Stuxnet and the Launch of the World's First Digital Weapon by Kim Zetter

Does this book
belong on the list?

From the editor:

The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.

In these pages, journalist Kim Zetter tells the whole story behind the world’s first cyberweapon, covering its genesis in the corridors of the White House and its effects in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a top secret sabotage campaign years in the making.

But Countdown to Zero Day also ranges beyond Stuxnet itself, exploring the history of cyberwarfare and its future, showing us what might happen should our infrastructure be targeted by a Stuxnet-style attack, and ultimately, providing a portrait of a world at the edge of a new kind of war.

Amazon Logo
Kindle Logo
Audible Logo
Barnes and Noble Logo
Nook Logo
iBooks Logo

Amazon Logo
Audible Logo
Barnes and Noble Logo

Kindle Logo
iBooks Logo
Nook Logo

What people are saying

I just read Countdown to Zero Day and I absolutely loved it.

@ApachePlantiff

Countdown to Zero Day by Kim Zetter. Although it’s related to an old virus “Stuxnet”, it’s definitely a fantastic read.

@digi-quake

5. This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth

This Is How They Tell Me the World Ends- The Cyberweapons Arms Race by Nicole Perlroth

Does this book
belong on the list?

From the editor:

Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy’s arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine).

For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days. U.S. government agents paid top dollar―first thousands, and later millions of dollars― to hackers willing to sell their lock-picking code and their silence.

Then the United States lost control of its hoard and the market.

Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down.

Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.

Amazon Logo
Kindle Logo
Audible Logo
Barnes and Noble Logo
Nook Logo
iBooks Logo

Amazon Logo
Audible Logo
Barnes and Noble Logo

Kindle Logo
iBooks Logo
Nook Logo

What people are saying

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perloff goes into extreme detail about this. It is rampant.

@MrDERPMcDERP

Nicole Perlroth’s This is How They Tell Me the World Ends. Best book I’ve read in a long time in the cybersecurity area.

@fpaddict

6. Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen

Kingpin- How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen

Does this book
belong on the list?

From the editor:

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first century’s signature form of organized crime.

The word spread through the hacking underground like some unstoppable new virus: Someone—some brilliant, audacious crook—had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy.

The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin; other agencies around the world deployed dozens of moles and double agents. Together, the cybercops lured numerous unsuspecting hackers into their clutches. . . . Yet at every turn, their main quarry displayed an uncanny ability to sniff out their snitches and see through their plots.

The culprit they sought was the most unlikely of criminals: a brilliant programmer with a hippie ethic and a supervillain’s double identity. As prominent “white-hat” hacker Max “Vision” Butler, he was a celebrity throughout the programming world, even serving as a consultant to the FBI. But as the black-hat “Iceman,” he found in the world of data theft an irresistible opportunity to test his outsized abilities. He infiltrated thousands of computers around the country, sucking down millions of credit card numbers at will. He effortlessly hacked his fellow hackers, stealing their ill-gotten gains from under their noses. Together with a smooth-talking con artist, he ran a massive real-world crime ring.

And for years, he did it all with seeming impunity, even as countless rivals ran afoul of police.

Yet as he watched the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, he began to see in their dysfunction the ultimate challenge: He would stage his coup and fix what was broken, run things as they should be run—even if it meant painting a bull’s-eye on his forehead.

Through the story of this criminal’s remarkable rise, and of law enforcement’s quest to track him down, Kingpin lays bare the workings of a silent crime wave still affecting millions of Americans. In these pages, we are ushered into vast online-fraud supermarkets stocked with credit card numbers, counterfeit checks, hacked bank accounts, dead drops, and fake passports. We learn the workings of the numerous hacks—browser exploits, phishing attacks, Trojan horses, and much more—these fraudsters use to ply their trade, and trace the complex routes by which they turn stolen data into millions of dollars. And thanks to Poulsen’s remarkable access to both cops and criminals, we step inside the quiet, desperate arms race that law enforcement continues to fight with these scammers today.

Ultimately, Kingpin is a journey into an underworld of startling scope and power, one in which ordinary American teenagers work hand in hand with murderous Russian mobsters and where a simple Wi-Fi connection can unleash a torrent of gold worth millions.

Amazon Logo
Kindle Logo
Audible Logo
Barnes and Noble Logo
Nook Logo
iBooks Logo

Amazon Logo
Audible Logo
Barnes and Noble Logo

Kindle Logo
iBooks Logo
Nook Logo

What people are saying

Kevin Poulsen’s Kingpin is worth a read.

@schizorobo

Kingpin was much better. Read like a very long magazine article but the author was very skilled to explaining the finer aspects of hacking.

@roocarpal

7. The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age by David E. Sanger

The Perfect Weapon- War, Sabotage, and Fear in the Cyber Age by David E. Sanger

Does this book
belong on the list?

From the editor:

The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents—Bush and Obama—drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump’s first year, turned back on the United States and its allies. And if Obama would begin his presidency by helping to launch the new era of cyberwar, he would end it struggling unsuccessfully to defend against Russia’s broad attack on the 2016 US election.

Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger reveals a world coming face-to-face with the perils of technological revolution, where everyone is a target.

Amazon Logo
Kindle Logo
Audible Logo
Barnes and Noble Logo
Nook Logo
iBooks Logo

Amazon Logo
Audible Logo
Barnes and Noble Logo

Kindle Logo
iBooks Logo
Nook Logo

What people are saying

I highly recommend the book The Perfect Weapon by David Sanger. I’m almost done with it. It describes the “Early era” of cyber warfare and how so many administrations (and foreign govs) wrangled with the challenge of deleting malware or “hacking back” when doing so sometimes betrayed (in some cases) the fact that you know about it, or even that you are doing the same thing and that’s how you found it. The book doesn’t pull any punches, but I think does do a good job of highlighting through a bunch of stories how each case is often so different. It also interviews key players after the fact and views their actions “then” through the lens of history and tackles their own opinions about what they wished they had done. I found it a fascinating book.

@pootastic

It’s a few years old, but still highly relevant. The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age by David Sanger. Talks about everything from North Korea to Stuxnet. I had it in both paperback and audio format and probably listened to the audiobook at least a few times. Really entertaining.

@fassaction

8. The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats by Richard A. Clarke and Robert K. Knake

The Fifth Domain- Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats by Richard A. Clarke and Robert K. Knake

Does this book
belong on the list?

From the editor:

There is much to fear in the dark corners of cyberspace. From well-covered stories like the Stuxnet attack which helped slow Iran’s nuclear program, to lesser-known tales like EternalBlue, the 2017 cyber battle that closed hospitals in Britain and froze shipping crates in Germany in midair, we have entered an age in which online threats carry real-world consequences. But we do not have to let autocrats and criminals run amok in the digital realm. We now know a great deal about how to make cyberspace far less dangerous–and about how to defend our security, economy, democracy, and privacy from cyber attack.

This is a book about the realm in which nobody should ever want to fight a war: the fifth domain, the Pentagon’s term for cyberspace. Our guides are two of America’s top cybersecurity experts, seasoned practitioners who are as familiar with the White House Situation Room as they are with Fortune 500 boardrooms. Richard A. Clarke and Robert K. Knake offer a vivid, engrossing tour of the often unfamiliar terrain of cyberspace, introducing us to the scientists, executives, and public servants who have learned through hard experience how government agencies and private firms can fend off cyber threats.

Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the U.S. intelligence community with officials working to defend America’s elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for “cyber resilience”–building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding the trap of overreaction to digital attacks.

Above all, Clarke and Knake show us how to keep the fifth domain a humming engine of economic growth and human progress by not giving in to those who would turn it into a wasteland of conflict. Backed by decades of high-level experience in the White House and the private sector, The Fifth Domain delivers a riveting, agenda-setting insider look at what works in the struggle to avoid cyberwar.

Amazon Logo
Kindle Logo
Audible Logo
Barnes and Noble Logo
Nook Logo
iBooks Logo

Amazon Logo
Audible Logo
Barnes and Noble Logo

Kindle Logo
iBooks Logo
Nook Logo

What people are saying

The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats by Robert K. Knake and Richard A. Clarke is a great read. It got me into cybersecurity.

@vAntagonizer

Anybody who is wondering what is the risk of doing nothing should read the The Fifth Domain by Richard A.Clarke.

@apiek1

9. Spam Nation: The Inside Story of Organized Cybercrime―from Global Epidemic to Your Front Door by Brian Krebs

Spam Nation- The Inside Story of Organized Cybercrime―from Global Epidemic to Your Front Door by Brian Krebs

Does this book
belong on the list?

From the editor:

There is a Threat Lurking Online with the Power to Destroy Your Finances, Steal Your Personal Data, and Endanger Your Life.

In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies―and countless viruses, phishing, and spyware attacks―he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.

Blending cutting-edge research, investigative reporting, and firsthand interviews, this terrifying true story reveals how we unwittingly invite these digital thieves into our lives every day. From unassuming computer programmers right next door to digital mobsters like “Cosma”―who unleashed a massive malware attack that has stolen thousands of Americans’ logins and passwords―Krebs uncovers the shocking lengths to which these people will go to profit from our data and our wallets.

Not only are hundreds of thousands of Americans exposing themselves to fraud and dangerously toxic products from rogue online pharmacies, but even those who never open junk messages are at risk. As Krebs notes, spammers can―and do―hack into accounts through these emails, harvest personal information like usernames and passwords, and sell them on the digital black market. The fallout from this global epidemic doesn’t just cost consumers and companies billions, it costs lives too.

Fast-paced and utterly gripping, Spam Nation ultimately proposes concrete solutions for protecting ourselves online and stemming this tidal wave of cybercrime―before it’s too late.

Amazon Logo
Kindle Logo
Audible Logo
Barens and Noble Logo
Nook Logo
iBooks Logo

Amazon Logo
Audible Logo
Barens and Noble Logo

Kindle Logo
iBooks Logo
Nook Logo

What people are saying

You NEED to read the book Spam Nation by Brian Krebs.

Basically, spam is in large parts a huge business. With this particular thing, you have all these memes probably sent from Russian disinformation campaigns.

@comrade-linux

Brian Krebs gets into the informal relationship between the Russian government and FSB in his book Spam Nation. It allows Russia to disavow attacks and to maintain a large network of cyber capabilities without paying for it.

@elmonoenano

10. Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World by Joseph Menn

Cult of the Dead Cow- How the Original Hacking Supergroup Might Just Save the World by Joseph Menn

Does this book
belong on the list?

From the editor:

The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom, and even democracy itself.

Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development of Tor, the most important privacy tool on the net, and helped build cyberweapons that advanced US security without injuring anyone.

With its origins in the earliest days of the Internet, the cDc is full of oddball characters — activists, artists, even future politicians. Many of these hackers have become top executives and advisors walking the corridors of power in Washington and Silicon Valley. The most famous is former Texas Congressman and current presidential candidate Beto O’Rourke, whose time in the cDc set him up to found a tech business, launch an alternative publication in El Paso, and make long-shot bets on unconventional campaigns.

Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.

Amazon Logo
Kindle Logo
Audible Logo
Barnes and Noble Logo
Nook Logo
iBooks Logo

Amazon Logo
Audible Logo
Barnes and Noble Logo

Kindle Logo
iBooks Logo
Nook Logo

What people are saying

CULT OF THE DEAD COW by Joseph Menn is an excellent book on one of the most infamous hacking groups of all time, and offers some valuable insight into the history and roots of hacking culture.

@TheRenaissanceMan_

Cult of the Dead Cow is a great nonfiction book that reads like fiction

@MarvelPresents