Picked by The Firewall Series fans

Here are 4 books that The Firewall Series fans have personally recommended once you finish the The Firewall Series series. Book DNA is a community of authors and super-readers sharing their favorite books with the world.

Book cover of Wired In

William Fietzer Author Of Metadata Murders

From my list on technothrillers with a cyber-security protagonist.

Why am I passionate about this?

I’ve been fascinated by the potential of the Internet ever since I chaired the Metadata subcommittee for the American Library Association. Here was a device capable of benefiting lives or destroying mankind simultaneously. Particularly intriguing was its almost supernatural ability to accomplish these ends as if we were gods beyond the realms of morality or accountability. I’m not a very spiritual person, but such potential calls out for revising our old worldviews and/or exploring new ways of coping with our burgeoning technical prowess and moral responsibilities. Dealing with these conflicts is what I write about and what stories from other authors I recommend to readers.

William's book list on technothrillers with a cyber-security protagonist

William Fietzer Why William loves this book

This book grabbed my attention by literally plunging me into the middle of the action. As she often does, special agent Sophie Ang defies FBI protocol by breaking through a closet ceiling to rescue a nine-year-old kidnap victim.

Her computer skills protect her from professional reprimand; however, a mysterious figure called the Ghost challenges her to the fullest by using Sophie’s childhood trauma against her to pull off his next caper. The narrative starts fine, slows a bit while establishing her budding romance with her Tae Kwon Do instructor, then returns her cat-and-mouse game with the Ghost center stage in a nail-biter ride all the way to the end.

By Toby Neal ,

Why should I read it?

1 author picked Wired In as one of their favorite books, and they share why you should read it.

What is this book about?

Paradise has no protection from a hacker with a hidden agenda. Do you love a woman sleuth with a dark past, a great dog, and a complicated romantic life?

Meet tech agent Sophie Ang.

Sophie’s emotions are battered by a child kidnapping case, and in tracking the criminal ring, her rogue data analysis program D.A.V.I.D. identifies an anomaly that leads her into a cat-and-mouse game online with a deadly enemy whose motives are unclear. The chase lures her through dark corridors of cyberspace into a confrontation with the violence from her past that sent her fleeing to the United States.…


Book cover of 26 Below

William Fietzer Author Of Metadata Murders

From my list on technothrillers with a cyber-security protagonist.

Why am I passionate about this?

I’ve been fascinated by the potential of the Internet ever since I chaired the Metadata subcommittee for the American Library Association. Here was a device capable of benefiting lives or destroying mankind simultaneously. Particularly intriguing was its almost supernatural ability to accomplish these ends as if we were gods beyond the realms of morality or accountability. I’m not a very spiritual person, but such potential calls out for revising our old worldviews and/or exploring new ways of coping with our burgeoning technical prowess and moral responsibilities. Dealing with these conflicts is what I write about and what stories from other authors I recommend to readers.

William's book list on technothrillers with a cyber-security protagonist

William Fietzer Why William loves this book

The book’s opening scene caught me off-guard. An older lady dies from out-of-season Alaskan cold. Meanwhile, the heroine, Darcie Phillips, contends with the demands of her new job as Fairbanks’ Emergency Operations Center director.

Among her headaches are a rejected candidate for that position, a protest group demanding she shut down a newly installed oil pipeline, and insecurities regarding her qualifications for her position. Little does Darcie suspect the old lady’s death heralds ecological disaster if she fails to meet the demands of an unknown terrorist before the outside temperature reaches 26 degrees below zero.

The author’s use of Alaskan localisms, along with each chapter heading’s time and temperature measurements, intensifies the suspense; however, little character description and minimal display of the protagonist’s Internet abilities dampens her authenticity as a cyber expert.

By Kimberley Woodhouse ,

Why should I read it?

1 author picked 26 Below as one of their favorite books, and they share why you should read it.

What is this book about?

"A thrill ride. . . as current as today's front-page news!"
--Colleen Coble, USA Today best-selling author

In her new role as Emergency Operations Center director for Fairbanks, Alaska, Darcie Phillips prevents disasters. But none of her training can prepare her for the terror that's coming.

As a cybersecurity specialist, Jason Myers is determined to ferret out any threats to the town he now calls home--and that includes his reckless brother and his ecoterrorist friends.

When an old woman's wild prediction--widespread destruction as soon as the Fairbanks temperature falls to 26 below--hits national headlines, neither Darcie nor Jason sees a…


Book cover of Constant Risk

William Fietzer Author Of Metadata Murders

From my list on technothrillers with a cyber-security protagonist.

Why am I passionate about this?

I’ve been fascinated by the potential of the Internet ever since I chaired the Metadata subcommittee for the American Library Association. Here was a device capable of benefiting lives or destroying mankind simultaneously. Particularly intriguing was its almost supernatural ability to accomplish these ends as if we were gods beyond the realms of morality or accountability. I’m not a very spiritual person, but such potential calls out for revising our old worldviews and/or exploring new ways of coping with our burgeoning technical prowess and moral responsibilities. Dealing with these conflicts is what I write about and what stories from other authors I recommend to readers.

William's book list on technothrillers with a cyber-security protagonist

William Fietzer Why William loves this book

This book’s narrative zooms from the get-go. When Crouch introduces the controlled and calculating master villain, Michael Jeter, plotting his revenge in the first chapter, the tension never disappears.

Detective Tanner Dempsy’s marriage proposal to computer security expert Bree Daniels takes a back seat to their preventing murders by slow drowning that they witness over the Internet. I was thrilled at how the author filled each page with tension, terror, and repressed longing as his hunters became the hunted.

By Janie Crouch ,

Why should I read it?

1 author picked Constant Risk as one of their favorite books, and they share why you should read it.

What is this book about?

Constant Risk
By Janie Crouch

The hunters
Become the hunted.

Deputy Tanner Dempsey and Bree Daniels are tasked with tracking a killer on the loose, and Bree's computer genius is their only hope at solving the crime. Tanner is determined to make sure both solve the crime but what happens when they both become a killer's next target...

Colton on the Run
By Anna J. Stewart

A mysterious woman...
And a killer on the lose

When he finds a half-dead woman stranded in his barn, rancher Leo Slattery feels his blood run cold. Though she can't remember who she is,…


Book cover of Deadly Protocol

William Fietzer Author Of Metadata Murders

From my list on technothrillers with a cyber-security protagonist.

Why am I passionate about this?

I’ve been fascinated by the potential of the Internet ever since I chaired the Metadata subcommittee for the American Library Association. Here was a device capable of benefiting lives or destroying mankind simultaneously. Particularly intriguing was its almost supernatural ability to accomplish these ends as if we were gods beyond the realms of morality or accountability. I’m not a very spiritual person, but such potential calls out for revising our old worldviews and/or exploring new ways of coping with our burgeoning technical prowess and moral responsibilities. Dealing with these conflicts is what I write about and what stories from other authors I recommend to readers.

William's book list on technothrillers with a cyber-security protagonist

William Fietzer Why William loves this book

I could not put this book down. Lavish settings, exotic locales, hardened professionals—this book has it all—and that describes the good guys. Each chapter introduces a new, fully-developed character with his or her justifiable motivation for engaging in a sinister plot to disrupt Singapore’s financial system.

Cyber-attack expert Wendy Chen and her spy-lover Guy Anderson must thwart the attack before it happens, but will her computer expertise and his secret agent skills accomplish it before they are killed? I loved the fast-paced and colorful description done in the best Ian Fleming fashion. Added bonus: Kinsey’s narrative increased my cyber-thriller writer vocabulary.

By Gary Ivan Kinsley ,

Why should I read it?

1 author picked Deadly Protocol as one of their favorite books, and they share why you should read it.

What is this book about?

A talented Russian hacker is hired to cripple Singapore with a cyberattack. Wendy Chen and Guy Andersons life had returned to normal. Their exploits in North Korea, where they had neutralised a malware designed to trigger a missile attack on Japan now seemed like a distant dream. But for Wendy, this was to turn into a nightmare when she encountered Talon, a Korean assassin in Singapore. With help from Plug, their friend at MI6 in Hong Kong, the trio unravel a sophisticated cyberattack designed to economically cripple Singapore, and Wendy once again finds herself face-to-face with her nemesis.From the author:…