Here are 81 books that Cyber Attacks fans have personally recommended if you like Cyber Attacks. Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.

When you buy books, we may earn a commission that helps keep our lights on (or join the rebellion as a member).

Book cover of The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

George Finney Author Of Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

From my list on books on cybersecurity that anyone can understand.

Why am I passionate about this?

I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.

George's book list on books on cybersecurity that anyone can understand

George Finney Why George loves this book

The first person to ever catch a hacker wasn’t an FBI or CIA agent. It was an astronomer, and his name was Clifford Stoll. This book is a biographical account of how he took on a German hacker who was selling secrets to the KGB in the 1980s. I love this book because it shows how anyone can play a role in cybersecurity.

As a kid, I watched the TV adaptation of the book for PBS’s NOVA program and went into cybersecurity in large part because of Stoll. Because cybersecurity wasn’t a profession at the time, Stoll created his own innovative techniques, like building the first computer honeypot to help catch the hacker in action. When his book was made into a PBS documentary, as a thank you for putting up with him and all the crazy things he had to do to track the hacker, he had all of…

By Clifford Stoll ,

Why should I read it?

4 authors picked The Cuckoo's Egg as one of their favorite books, and they share why you should read it.

What is this book about?

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name…


If you love Cyber Attacks...

Ad

Book cover of The High House

The High House by James Stoddard,

The Victorian mansion, Evenmere, is the mechanism that runs the universe.

The lamps must be lit, or the stars die. The clocks must be wound, or Time ceases. The Balance between Order and Chaos must be preserved, or Existence crumbles.

Appointed the Steward of Evenmere, Carter Anderson must learn the…

Book cover of This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

Steve Vigdor Author Of Signatures of the Artist: The Vital Imperfections That Make Our Universe Habitable

From my list on science that should inform public policy.

Why am I passionate about this?

I’ve been passionate about science as a way of learning how nature works and approaching truth since I was a pre-teen. After five decades of basic research, teaching, and management in physics, I can distinguish good science from pseudoscience even beyond my own areas of expertise. I am greatly disturbed by attempts to undermine science in public policy-making when its findings conflict with ideology, religious beliefs, or business bottom lines. My passion project, via my blog debunkingdenial.com, is to explain to teachers and the public the underlying science and the flaws in science denial across a wide range of topics at the interface with public policy. 

Steve's book list on science that should inform public policy

Steve Vigdor Why Steve loves this book

I love this book because Perlroth chronicles the proliferation of cyberweapons, which began in the hands of mischievous young hackers exploiting vulnerabilities in widely used software. Once some of those hackers joined the NSA, their tools were developed into sophisticated weapons to undercut technological developments in enemy states like Iran.

Once NSA’s hacks leaked to the wider world, they spawned an arms race and fueled rampant criminal ransomware attacks on vulnerable institutions. Informed by Perlroth’s book, I see a future in which dwindling human fertility and the ballooning costs of advanced weaponry will enhance the military role of cyber-attacks, leading to Mutually Assured Cyber Destruction, in which many countries have cyberweapons deeply embedded in the critical infrastructure of their adversaries, just waiting to activate them.

By Nicole Perlroth ,

Why should I read it?

3 authors picked This Is How They Tell Me the World Ends as one of their favorite books, and they share why you should read it.

What is this book about?

THE NEW YORK TIMES BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations)

"Written in the hot, propulsive prose of a spy thriller" (The New York Times), the untold story of the cyberweapons market-the most secretive, government-backed market on earth-and a terrifying first look at a new kind of global warfare.

Zero-day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero-day has the power…


Book cover of Ghost Fleet: A Novel of the Next World War

Jennifer L. Bayuk Author Of Enterprise Security for the Executive: Setting the Tone from the Top

From my list on cybersecurity for every type of reader.

Why am I passionate about this?

I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.

Jennifer's book list on cybersecurity for every type of reader

Jennifer L. Bayuk Why Jennifer loves this book

The book portrays a scenario in which nation-state adversaries launch a sophisticated cyberattack against the United States. Though it is science fiction, the political scenario it depicts is a realistic description of how today’s nation-states consider technology options when they are engaged in traditional war. For people interested in cybersecurity and attracted to that genre, it will be an eye-opening experience because the basic scenarios it describes are very easy to project into the near future. It is also a tale of adventure.

By P.W. Singer , August Cole ,

Why should I read it?

1 author picked Ghost Fleet as one of their favorite books, and they share why you should read it.

What is this book about?

Ghost Fleet is a page-turning imagining of a war set in the not-too-distant future. Navy captains battle through a modern-day Pearl Harbour; fighter pilots duel with stealthy drones; teenage hackers fight in digital playgrounds; Silicon Valley billionaires mobilise for cyber-war; and a serial killer carries out her own vendetta. Ultimately, victory will depend on who can best blend the lessons of the past with the weapons of the future. But what makes the story even more notable is that every trend and technology in book - no matter how sci-fi it may seem - is real. The debut novel by…


If you love Edward Amoroso...

Ad

Book cover of The Guardian of the Palace

The Guardian of the Palace by Steven J. Morris,

The Guardian of the Palace is the first novel in a modern fantasy series set in a New York City where magic is real—but hidden, suppressed, and dangerous when exposed.

When an ancient magic begins to leak into the world, a small group of unlikely allies is forced to act…

Book cover of Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet

Jennifer L. Bayuk Author Of Enterprise Security for the Executive: Setting the Tone from the Top

From my list on cybersecurity for every type of reader.

Why am I passionate about this?

I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.

Jennifer's book list on cybersecurity for every type of reader

Jennifer L. Bayuk Why Jennifer loves this book

It is a reporter’s account of a cybersecurity entrepreneur stumbling into criminal and nation-state level cyberattacks, assisting in the investigation, and ultimately becoming a target. The writing is clear and accessible to the non-technical reader but it still conveys a good sense of what it is like to witness and investigate cyber-crime. It is a suspenseful human drama.

By Joseph Menn ,

Why should I read it?

1 author picked Fatal System Error as one of their favorite books, and they share why you should read it.

What is this book about?

In 2004, a California computer whiz named Barrett Lyon uncovered the identity of a hacker running major assaults on business websites. Without fully grasping the repercussions, he set on an investigation that led him into the heart of the Russian mob. Cybercrime was evolving. No longer the domain of small-time thieves, it had been discovered by sophisticated gangs. They began by attacking corporate websites but increasingly stole financial data from consumers and defence secrets from governments. While Barrett investigated the cutting edge of technology crime, the U.S. government struggled to catch up. Britain, however, was a different story. In the…


Book cover of Cyberspace in Peace and War

Marc Mangel Author Of Fighting The Virus

From my list on helpful books to get you ready to apply disease modeling to enhance cybersecurity.

Why am I passionate about this?

I became enthused about using mathematical models to understand the natural world as an undergraduate, got trained to do so, and spent my career working on a wide variety of applications. Most recently, I translated ideas from disease modeling to understand cyber variability and security.

To maximize success when applying mathematics to the natural or (for cyber) operational world, one needs to master the appropriate mathematical tools and have a deep knowledge of the subject matter. My recommendations are three really great books that will help you gain proficiency in the needed mathematical tools and how to apply them, and two equally great books on cyber systems.

Marc's book list on helpful books to get you ready to apply disease modeling to enhance cybersecurity

Marc Mangel Why Marc loves this book

This is a wonderfully informative introduction to cyber system variability, and is something to both read from cover to cover and have on your shelf (physical or electronic) to dip into from time to time, as I do.

Libicki’s ideas appear throughout my book, including the advice he gives on page 1 that "…when facing a problem such as the threat from cyberspace it pays to be serious but not desperate."

If you seriously want to understand how to use disease models to understand cybersecurity and variability, the books by Libicki and Singer and Friedman provide a fantastic background in the subject matter.

By Martin C. Libicki ,

Why should I read it?

1 author picked Cyberspace in Peace and War as one of their favorite books, and they share why you should read it.

What is this book about?

This updated and expanded edition of Cyberspace in Peace and War by Martin C. Libicki presents a comprehensive understanding of cybersecurity, cyberwar, and cyber-terrorism. From basic concepts to advanced principles, Libicki examines the sources and consequences of system compromises, addresses strategic aspects of cyberwar, and defines cybersecurity in the context of military operations while highlighting unique aspects of the digital battleground and strategic uses of cyberwar.

This new edition provides updated analysis on cyberespionage, including the enigmatic behavior of Russian actors, making this volume a timely and necessary addition to the cyber-practitioner's library.

Cyberspace in Peace and War guides readers…


Book cover of Cybersecurity and Cyberwar

Marc Mangel Author Of Fighting The Virus

From my list on helpful books to get you ready to apply disease modeling to enhance cybersecurity.

Why am I passionate about this?

I became enthused about using mathematical models to understand the natural world as an undergraduate, got trained to do so, and spent my career working on a wide variety of applications. Most recently, I translated ideas from disease modeling to understand cyber variability and security.

To maximize success when applying mathematics to the natural or (for cyber) operational world, one needs to master the appropriate mathematical tools and have a deep knowledge of the subject matter. My recommendations are three really great books that will help you gain proficiency in the needed mathematical tools and how to apply them, and two equally great books on cyber systems.

Marc's book list on helpful books to get you ready to apply disease modeling to enhance cybersecurity

Marc Mangel Why Marc loves this book

This is one of two books (the other is Cyberspace in Peace and War) that I think anybody seriously interested in cyber security (which should be everybody) should have on their shelf.

It is filled with insights on a wide range of topics. I refer to it many times in my book, including why biology is a better metaphor for cyber defense than war, how people new to analytical thinking about cyber systems should approach the topic, the general meaning of cyber security, what it means for a cyber system to be resilient, and the need for operational cyber drills (analogous to experiments in biology).

The writing in this book is accessible, and it is both fun to read and really informative.

By P.W. Singer , Allan Friedman ,

Why should I read it?

1 author picked Cybersecurity and Cyberwar as one of their favorite books, and they share why you should read it.

What is this book about?

Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear…


If you love Cyber Attacks...

Ad

Book cover of Oaky With a Hint of Murder

Oaky With a Hint of Murder by Dawn Brotherton,

Aury and Scott travel to the Finger Lakes in New York’s wine country to get to the bottom of the mysterious happenings at the Songscape Winery. Disturbed furniture and curious noises are one thing, but when a customer winds up dead, it’s time to dig into the details and see…

Book cover of The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

Sean McFate Author Of The New Rules of War: How America Can Win--Against Russia, China, and Other Threats

From my list on mercenaries from a former military contractor.

Why am I passionate about this?

Dr. Sean McFate is an expert on international relations and a former military contractor. He is a Senior Fellow at the Atlantic Council, a Washington DC think tank, and a professor at Georgetown University's School of Foreign Service, Syracuse University's Maxwell School, and the National Defense University. He began his career as a paratrooper and officer in the U.S. Army's 82nd Airborne Division. 

Sean's book list on mercenaries from a former military contractor

Sean McFate Why Sean loves this book

There are cyber mercenaries too. Called “hackback” companies, they are illegal, offshore hackers who hack the hackers. While they cannot retrieve hacked material, they can cause a world of hurt for anyone who tries to hack you, and that’s why they matter: deterrence. CEOs and others around the world sometimes turn to hackback firms to make them hard targets. Also, countries like the United Arab Emirates hire former NSA hackers. New York Times reporter details some of this industry in his book about cyberwar. Like many in cyberspace, his claims are often sensationalized, but his reportage cannot be beat.

By David E. Sanger ,

Why should I read it?

1 author picked The Perfect Weapon as one of their favorite books, and they share why you should read it.

What is this book about?

From Russia's tampering with the US election to the WannaCry hack that temporarily crippled the NHS, cyber has become the weapon of choice for democracies, dictators, and terrorists.

Cheap to acquire, easily deniable, and used for a variety of malicious purposes - from crippling infrastructure to sowing discord and doubt - cyberweapons are re-writing the rules of warfare. In less than a decade, they have displaced terrorism and nuclear missiles as the biggest immediate threat to international security and to democracy.

Here, New York Times correspondent David E. Sanger takes us from the White House Situation Room to the dens…


Book cover of The Eye of Minds

Randy C. Dockens Author Of Myeem

From my list on science fiction stories of amazing worlds.

Why am I passionate about this?

I’ve always been fascinated by science fiction and by Biblical Scripture. That may seem dichotomous to some, but not to me. I have a passion for science and for Scripture because both bring understanding about our world from the microcosm to the macrocosm. My writings are a mixture of science and mystery with a science fiction feel and a Christian perspective. I like stories that show how truth arises even from the dark, confusing, and ambiguity of life to help one discover something about God they may not have considered before, and at the same time enjoy a fun, fast-paced, and exciting journey as they read.

Randy's book list on science fiction stories of amazing worlds

Randy C. Dockens Why Randy loves this book

While not science fiction in the classical sense, it is a story of a different kind of world where virtual reality and reality blur. The main character almost lives in a virtual reality gaming program, but when he is to do something in the real world, he finds he can’t really tell the two apart and that leads to grave consequences.

By James Dashner ,

Why should I read it?

2 authors picked The Eye of Minds as one of their favorite books, and they share why you should read it. This book is for kids age 12, 13, 14, and 15.

What is this book about?

From James Dashner, the author of the New York Times bestselling Maze Runner series, comes an edge-of-your seat adventure. The Eye of Minds is the first book in The Mortality Doctrine, a series set in a world of hyper advanced technology, cyberterrorists, and gaming beyond your wildest dreams ...and your worst nightmares. To catch a hacker, you need a hacker. For Michael and the other gamers, the VirtNet can make your wildest fantasies become real. And the more hacking skills you have, the more fun. Who wants to play by the rules anyway? But some rules were made for a…


Book cover of Lights Out: A Cyberattack: A Nation Unprepared: Surviving the Aftermath

Christopher J. Lynch Author Of Dark State

From my list on electrical grid vulnerabilities and our survival.

Why am I passionate about this?

I worked as an industrial electrician for over two decades. At one point during a meeting to discuss an upcoming project, a question was posed about the delivery time of a specific piece of equipment. When the answer was given that it would be about a year away, it got me thinking: what if a specialized piece of equipment—critical to the grid and with an equally long lead time—was destroyed, how would the grid survive? More importantly; how would we survive? That single statement was the spark that ignited the fire in me to learn all about the grid, and to write Dark State.   

Christopher's book list on electrical grid vulnerabilities and our survival

Christopher J. Lynch Why Christopher loves this book

Lights Out is another great non-fiction book about electrical grid vulnerabilities. Koppel also spotlights High Power Transformers as the Achilles Heel of our electrical system 

But Koppel also does a deep dive on the survivability—or rather lack thereof, of our society if the grid were to be taken down. He even broke down various social classes of people: rural versus urban, and talked about how each group would survive based upon their skillsets and resources available to them. FYI: Ranchers fare best

He even discussed the amazing organization the Mormon Church has put together with regards to the preparedness of each of their members, as well as how they would leverage their collective strengths together as a group.

By Ted Koppel ,

Why should I read it?

2 authors picked Lights Out as one of their favorite books, and they share why you should read it.

What is this book about?

NEW YORK TIMES BESTSELLER • Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared.

“Fascinating, frightening, and beyond timely.”—Anderson Cooper

Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and…


If you love Edward Amoroso...

Ad

Book cover of December on 5C4

December on 5C4 by Adam Strassberg,

Magical realism meets the magic of Christmas in this mix of Jewish, New Testament, and Santa stories–all reenacted in an urban psychiatric hospital!

On locked ward 5C4, Josh, a patient with many similarities to Jesus, is hospitalized concurrently with Nick, a patient with many similarities to Santa. The two argue…

Book cover of Battlefield Cyber: How China and Russia are Undermining Our Democracy and National Security

Michael Wolk

From my list on feed your internet paranoia.

Why am I passionate about this?

Researching DevilsGame, about an Internet meltdown caused by an unknown evil, I exposed myself to some harrowing truths. I learned how astonishingly frail our internet ecosystem is and how imperiled it is by bad actors who have burrowed deeply and often invisibly into its infrastructure. So, beyond writing a fictional thriller, I was moved to ring a warning bell! And I hope by formatting DevilsGame as “hyperlinked fiction,” mixing real news sites with fictional sites created for the novel, readers will experience the story in a way that parallels and parodies the way we experience real, live crises these days: navigating from fact to fiction, often without observing the boundaries.

Michael's book list on feed your internet paranoia

Michael Wolk Why Michael loves this book

I was stunned by the authors' dire and dramatic warning that the interests and methods of two mighty authoritarian regimes–China and Russia–are increasingly coming into alignment, and this alignment is spawning increasingly deadly threats to, and attacks on, the very foundations of our democracy and national security.

I found myself agreeing as the authors demonstrate how the United States government is failing to fully acknowledge and effectively respond to these massive threats–but I was also somewhat encouraged, as they do offer solutions and provide a ray of hope that we can restructure our approach to Chinese and Russian threats by streamlining our bureaucratic agencies and purpose-building them to directly confront them.

By Michael McLaughlin , William J. Holstein ,

Why should I read it?

1 author picked Battlefield Cyber as one of their favorite books, and they share why you should read it.

What is this book about?

The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain and corporate email servers, malicious cyber activities have reached an all-time high. Russia attracts the most attention, but China is vastly more sophisticated. They have a common interest in exploiting the openness of the Internet and social media—and our democracy—to erode confidence in our institutions and to exacerbate our societal rifts to prevent us from mounting an effective response. Halting this digital aggression will require Americans to undertake sweeping changes in how we educate, organize…


Book cover of The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Book cover of This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Book cover of Ghost Fleet: A Novel of the Next World War

Share your top 3 reads of 2025!

And get a beautiful page showing off your 3 favorite reads.

1,210

readers submitted
so far, will you?

5 book lists we think you will like!

Interested in national security, computer security, and the CIA?

The CIA 149 books