Sidetracked (Mindf*ck, #2)

Continue Reading...

Coders: The Making of a New Tribe and the Remaking of the World

From acclaimed tech writer Clive Thompson, a brilliant and immersive anthropological reckoning with the most powerful tribe in the world today, computer programmers where they come from, how they think, what makes for greatness in their world, and what should give us pause n nYou use software nearl

Continue Reading...

Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien"

This taut, true thriller dives into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker a woman known only as Alien When she arrived at MIT in the 1990s, Alien was quickly drawn to the school s tradition of high risk physical trespassing the

Continue Reading...

White-Hot Hack (Kate and Ian, #2)

Their love story began in Heart Shaped Hack Join Kate and Ian for the thrilling conclusion in White Hot Hack n nWhen cybercriminals doxed undercover hacker Ian Bradshaw and forced him to flee, he begged Kate Watts for forgiveness and vowed never to hurt her again He also convinced her to marry him,

Continue Reading...

Playing With Fire (#Hacker, #1)

One brilliant young hacker n nOne experimental government aircraft n nOne chance to keep it all from going up in flames n nStill recovering from her troubled past, Farris is no stranger to change But when the military transfers her father across the country to an experimental aircraft squadron, settli

Continue Reading...

@War: The Rise of the Military-Internet Complex

A surprising, page turning account of how the wars of the future are already being fought todayThe United States military currently views cyberspace as the fifth domain of warfare alongside land, air, sea, and space , and the Department of Defense, the National Security Agency, and the CIA all fi

Continue Reading...

Kill Process (Kill Chain, #1)

By day, Angie, a twenty year veteran of the tech industry, is a data analyst at Tomo, the world s largest social networking company by night, she exploits her database access to profile domestic abusers and kill the worst of them She can t change her own traumatic past, but she can save other wome

Continue Reading...

Black Dawn (Titan, #6)

Parker Black wants the one woman he shouldn t have his buddy s girl She s sweet and smart, but clueless about how deep Parker lives in Titan s virtual world Everything is controlled Chaos is mastered Black and white data and risk analysis That is the way he understands his world, how he plays h

Continue Reading...

Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News

A former FBI Special Agent and leading cyber security expert offers a devastating and essential look at the misinformation campaigns, fake news, and electronic espionage operations that have become the cutting edge of modern warfare and how we can protect ourselves and our country against them n nCli

Continue Reading...

Immoral Code

For Nari, aka Narioka Diane, aka hacker digital alter ego d0l0s, it s college and then a career at one of the big ones, like Google or Apple Keagan, her sweet, sensitive boyfriend, is happy to follow her wherever she may lead Reese is an ace aro visual artist with plans to travel the world Sa

Continue Reading...

Hacking with Smart Phones

At a recent event I came across someone who had read both my previous books but was still unable to grasp anything about hacking The language and tasks discussed in my former books are very complex He asked me to write something basic that everyone can understand So, I thought to write about Hack

Continue Reading...

Threat Modeling: Designing for Security

The only security book to be chosen as a Dr Dobbs Jolt Award Finalist since Bruce Schneier s Secrets and Lies and Applied Cryptography Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world Now, h

Continue Reading...

Ethical Hacking and Penetration Testing Guide

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end You will learn how to properly utilize and interpret the results of modern day hacking t

Continue Reading...

Zero Hour (Wired & Dangerous, #1)

The Fast and the Furious meets Mr Robot in USA Today bestselling author Megan Erickson s thrilling new romantic suspense series n nHacker extraordinaire Roarke Brennan lives each hour each breath to avenge his brother s murder His first move put together a team of the best coders he knows The

Continue Reading...

Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying

The NSA hates Tor So does the FBI Even Google wants it gone, as do Facebook and Yahoo and every other soul draining, identity tracking vampiric media cartel that scans your emails and spies on your private browsing sessions to better target you But there s hope This manual will give you the inco

Continue Reading...

Hacking: The Art of Exploitation

A comprehensive introduction to the techniques of exploitation and creative problem solving methods commonly referred to as hacking It shows how hackers exploit programs and write exploits, instead of just how to run other people s exploits This book explains the technical aspects of hacking, in

Continue Reading...

The Girl Who Played with Fire (Millennium, #2)

Part blistering espionage thriller, part riveting police procedural, and part piercing expos on social injustice, The Girl Who Played with Fire is a masterful, endlessly satisfying novel Mikael Blomkvist, crusading publisher of the magazine Millennium, has decided to run a story that will expose

Continue Reading...

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

If they were a hall of fame or shame for computer hackers, a Kevin Mitnick plaque would be mounted the near the entrance While other nerds were fumbling with password possibilities, this adept break artist was penetrating the digital secrets of Sun Microsystems, Digital Equipment Corporation, Nokia

Continue Reading...

The Girl with the Dragon Tattoo (Millennium, #1)

Harriet Vanger, a scion of one of Sweden s wealthiest families disappeared over forty years ago All these years later, her aged uncle continues to seek the truth He hires Mikael Blomkvist, a crusading journalist recently trapped by a libel conviction, to investigate He is aided by the pierced and

Continue Reading...

Little Brother (Little Brother, #1)

Marcus aka w1n5t0n, is only seventeen years old, but he figures he already knows how the system works and how to work the system Smart, fast, and wise to the ways of the networked world, he has no trouble outwitting his high school s intrusive but clumsy surveillance systems n nBut his whole world

Continue Reading...