X

Cybersecurity reads for every hacker's bookshelf

Take a plunge into the world of hacking, exploits, and cybersecurity with these recommended reads this summer.
By Charlie Osborne, Contributing Writer
screen-shot-2017-05-07-at-17-03-52.jpg
1 of 13 Charlie Osborne/ZDNET

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security

Author: Tobias Klein

It isn't all about black-hat activities -- the white-hat work can be exciting, too. In A Bug Hunter's Diary, security expert Tobias Klein describes how he became involved in tracking down exploits and vulnerabilities, how vendors view the bug bounty industry, and all of the happiness and frustration which is part of the job.

screen-shot-2017-05-07-at-17-00-06.jpg
2 of 13 Charlie Osborne/ZDNET

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

Author: Kevin Mitnick

In The Art of Intrusion, Kevin Mitnick tells us through real-life examples how hacking is not just about breaking into large corporations, but also infiltrate other areas of live. Tales include how a group of friends reverse-engineered slot machines to win big and how computer hacking entered a Texas prison.

screen-shot-2017-05-07-at-17-02-59.jpg
3 of 13 Charlie Osborne/ZDNET

Black Hat Python: Python Programming for Hackers and Pentesters

Author: Justin Seitz

Python is a programming language which takes hackers beyond the basics and into the realm of the professional security expert. Black Hat Python is an excellent way to start by fully investigating how the language can be used for both the light -- and dark -- sides of hacking.

screen-shot-2017-05-07-at-16-48-08.jpg
4 of 13 Charlie Osborne/ZDNET

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Author: Kevin Mirnick

Kevin Mirnick's autobiography, Ghost in the Wires: My Adventures as the World's Most Wanted Hacker, speaks about the now-security consultant's time as a hacker led FBI agents a merry chase in his capture after hacking into some of the world's largest firms.

screen-shot-2017-05-07-at-17-02-09.jpg
5 of 13 Charlie Osborne/ZDNET

The Hacker Playbook 2: Practical Guide To Penetration Testing

Author: Peter Kim

For a practical guide to penetration testing right from the beginning, The Hacker Playbook is likely not just to appeal to beginners, but to professionals who might appreciate a reference guide to hand. The book covers everything from network infiltration to sandboxing, how to circumvent antivirus software and what damage can be caused when a system is breached.

screen-shot-2017-05-07-at-16-51-12.jpg
6 of 13 Charlie Osborne/ZDNET

Secrets and Lies: Digital Security in a Networked World

Author: Bruce Schneier

Bruce Schneier's Secrets and Lies: Digital Security in a Networked World focuses on how networks operate and the security themes and concepts important in today's world; especially useful for those in the field, and very interesting to any tech enthusiast.

screen-shot-2017-05-07-at-16-46-44.jpg
7 of 13 Charlie Osborne/ZDNET

Countdown to Zero Day

Author: Kim Zetter

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon follows the discovery of Stuxnet, a worm designed to attack industrial sectors.

Ketter's story is a fascinating insight into how cybersecurity firms operate and introduces the reader to a number of key themes and topics which can be applied to the threat landscape today.

screen-shot-2017-05-07-at-16-54-08.jpg
8 of 13 Charlie Osborne/ZDNET

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

Author: Bruce Schneier

Bruce Schneier's latest offering, Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, expands beyond network security to how our information is protected -- or left exposed. The main thrust of the book is a discussion of whether mass surveillance has a place in our world when it comes to security, and whether a balance between surveillance and privacy is possible.

screen-shot-2017-05-07-at-16-58-32.jpg
9 of 13 Charlie Osborne/ZDNET

We Are Anonymous

Author: Parmy Olson

Anonymous, a loose, global hacktivist collective which often targets groups online for political motives, has made the news many times in recent years. The group does not hide their activities but rather taunts their victims -- more often than not in order to promote a political message. If you would like to read up on them and their motives, We Are Anonymous is a fantastic read which follows the stories of four key members.

screen-shot-2017-05-07-at-16-59-23.jpg
10 of 13 Charlie Osborne/ZDNET

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Author: Kevin Poulsen

In this book, former hacker Kevin Poulsen takes us on a journey through modern-day cybercriminal rings and operations by following the story of an unlikely kingpin of the criminal world. If you want to know how a nondescript programmer managed to avoid authorities, hack fellow hackers and steal credit card data in the millions, check out the story.

screen-shot-2017-05-07-at-17-01-00.jpg
11 of 13 Charlie Osborne/ZDNET

Social Engineering: The Art of Human Hacking

Author: Kevin Mitnick

If you have an interest in social engineering -- the way that threat actors can utilize human behavior rather than software for their own ends -- this read is for you. The book delves into the science and behavioral patterns behind the concept, as well as ways to protect yourself from such manipulation.

screen-shot-2017-05-07-at-16-52-30.jpg
12 of 13 Charlie Osborne/ZDNET

Spam Nation

Author: Brian Krebs

Spam Nation: The Inside Story of Organized Cybercrime is a detailed look at spam and hacking operations today. Spam may be little more than a nuisance to most, but behind the scenes, such campaigns can mask vast underground cybercriminal operations, the flow of illegal cash, and the malware marketplace.

screen-shot-2017-05-07-at-17-04-35.jpg
13 of 13 Charlie Osborne/ZDNET

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Author: Kevin Mitnick

In this book, former most-wanted hacker and now security consultant Kevin Mitnick takes us on a journey using real-life examples of how your data is collected -- and how to fight back. From staying invisible online to keeping your accounts safe, Mitnick offers a variety of tactics to keep your privacy intact.

Related Galleries

Holiday wallpaper for your phone: Christmas, Hanukkah, New Year's, and winter scenes
Holiday lights in Central Park background

Related Galleries

Holiday wallpaper for your phone: Christmas, Hanukkah, New Year's, and winter scenes

21 Photos
Winter backgrounds for your next virtual meeting
Wooden lodge in pine forest with heavy snow reflection on Lake O'hara at Yoho national park

Related Galleries

Winter backgrounds for your next virtual meeting

21 Photos
Holiday backgrounds for Zoom: Christmas cheer, New Year's Eve, Hanukkah and winter scenes
3D Rendering Christmas interior

Related Galleries

Holiday backgrounds for Zoom: Christmas cheer, New Year's Eve, Hanukkah and winter scenes

21 Photos
Hyundai Ioniq 5 and Kia EV6: Electric vehicle extravaganza
img-8825

Related Galleries

Hyundai Ioniq 5 and Kia EV6: Electric vehicle extravaganza

26 Photos
A weekend with Google's Chrome OS Flex
img-9792-2

Related Galleries

A weekend with Google's Chrome OS Flex

22 Photos
Cybersecurity flaws, customer experiences, smartphone losses, and more: ZDNet's research roundup
shutterstock-1024665187.jpg

Related Galleries

Cybersecurity flaws, customer experiences, smartphone losses, and more: ZDNet's research roundup

8 Photos
Inside a fake $20 '16TB external M.2 SSD'
Full of promises!

Related Galleries

Inside a fake $20 '16TB external M.2 SSD'

8 Photos