Here are 86 books that Ghost Fleet fans have personally recommended if you like
Ghost Fleet.
Book DNA is a community of 12,000+ authors and super readers sharing their favorite books with the world.
I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.
The first person to ever catch a hacker wasn’t an FBI or CIA agent. It was an astronomer, and his name was Clifford Stoll. This book is a biographical account of how he took on a German hacker who was selling secrets to the KGB in the 1980s. I love this book because it shows how anyone can play a role in cybersecurity.
As a kid, I watched the TV adaptation of the book for PBS’s NOVA program and went into cybersecurity in large part because of Stoll. Because cybersecurity wasn’t a profession at the time, Stoll created his own innovative techniques, like building the first computer honeypot to help catch the hacker in action. When his book was made into a PBS documentary, as a thank you for putting up with him and all the crazy things he had to do to track the hacker, he had all of…
Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name…
It is April 1st, 2038. Day 60 of China's blockade of the rebel island of Taiwan.
The US government has agreed to provide Taiwan with a weapons system so advanced that it can disrupt the balance of power in the region. But what pilot would be crazy enough to run…
I’ve been passionate about science as a way of learning how nature works and approaching truth since I was a pre-teen. After five decades of basic research, teaching, and management in physics, I can distinguish good science from pseudoscience even beyond my own areas of expertise. I am greatly disturbed by attempts to undermine science in public policy-making when its findings conflict with ideology, religious beliefs, or business bottom lines. My passion project, via my blog debunkingdenial.com, is to explain to teachers and the public the underlying science and the flaws in science denial across a wide range of topics at the interface with public policy.
I love this book because Perlroth chronicles the proliferation of cyberweapons, which began in the hands of mischievous young hackers exploiting vulnerabilities in widely used software. Once some of those hackers joined the NSA, their tools were developed into sophisticated weapons to undercut technological developments in enemy states like Iran.
Once NSA’s hacks leaked to the wider world, they spawned an arms race and fueled rampant criminal ransomware attacks on vulnerable institutions. Informed by Perlroth’s book, I see a future in which dwindling human fertility and the ballooning costs of advanced weaponry will enhance the military role of cyber-attacks, leading to Mutually Assured Cyber Destruction, in which many countries have cyberweapons deeply embedded in the critical infrastructure of their adversaries, just waiting to activate them.
THE NEW YORK TIMES BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations)
"Written in the hot, propulsive prose of a spy thriller" (The New York Times), the untold story of the cyberweapons market-the most secretive, government-backed market on earth-and a terrifying first look at a new kind of global warfare.
Zero-day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero-day has the power…
I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.
Amoroso’s experience started with academic research at Bell Labs and Stevens Institute of Technology but moved quickly to practically fill voids at AT&T and NSA. His book reduces technical concepts in cybersecurity to basic principles and explains generically how they are effectively implemented. For the true techy who wants to fully understand all the formal logic behind the theories in Cyber Attacks, reach back to Ed Amoroso’s Fundamentals of Computer Security Technology (1994).
Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well.
This book covers cyber security policy development for…
I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.
It is a reporter’s account of a cybersecurity entrepreneur stumbling into criminal and nation-state level cyberattacks, assisting in the investigation, and ultimately becoming a target. The writing is clear and accessible to the non-technical reader but it still conveys a good sense of what it is like to witness and investigate cyber-crime. It is a suspenseful human drama.
In 2004, a California computer whiz named Barrett Lyon uncovered the identity of a hacker running major assaults on business websites. Without fully grasping the repercussions, he set on an investigation that led him into the heart of the Russian mob. Cybercrime was evolving. No longer the domain of small-time thieves, it had been discovered by sophisticated gangs. They began by attacking corporate websites but increasingly stole financial data from consumers and defence secrets from governments. While Barrett investigated the cutting edge of technology crime, the U.S. government struggled to catch up. Britain, however, was a different story. In the…
My firsthand experience of the Cold War influenced my taste in reading and entertainment from an early age. I’ve spent my entire adult life collecting books and movies that showcase adventure and adversity in situations where combinations of war and climate change have brought about the end of life as we knew it. All those influences have inspired me to make my own contributions to this form of literature.
This storyline blew me away with its fast pace and realism. All the heartaches and firefights come so fast, you barely have time to catch your breath. I was fascinated by the way so many of the chapters read like scenes from a movie. It made me want to read more.
This story is the first novel in a series about the adventures of a four man elite survival team, set up to keep things under control in post World War III America. In this first story they have to transport the President from war ravaged Washington to a fortress 1000 miles away.
I started telling Sea Stories around February 1992, when I reported to the Recruit Training Center, Great Lakes, Illinois. Since then, I’ve been entertaining anyone who would listen with my hyperbolic storytelling, a loose relationship with the facts, and a total disregard for modesty. Writing these stories really showcases my experiences not only in the Navy but as a student of history and international relations. I couldn’t possibly write the whole story without having received my BA in International Relations from the University of California at Riverside and my Law Degree from Southern Methodist University.
This is the brass ring of Cold War turns Hot military fiction. I loved what Tom Clancy put down on paper back in 1986 and truly believe that without this book, none of the others on this list would have been written. I loved the depth and detail that Clancy digs into with regard to operational planning as well as tactical combat operations.
I can’t compliment him enough on his easy explanation of complex systems and operations. If you like “rivet counting” this book is going to blow your mind. As a former Russian linguist for the Navy, I’m impressed with Clancy’s understanding of Soviet politics and strategy. As a self taught civilian, he knocks it out of the park.
Tom Clancy's second classic No 1 bestselling thriller - a chillingly authentic vision of modern war - now reissued in a new cover.
Three Muslim terrorists who destroyed the Soviet Union's largest petrochemical plant thought they were striking a blow for freedom. What they had done, unknowingly, was fire the first shots in World War III.
Desperately short of oil, the Kremlin hawks see only one way of solving their problem: seize supplies in the Persian Gulf. To do that, they must first neutralise NATO's forces and eliminate their response - and so they develop Red Storm, a dazzling master…
Simo Laakkonen is director of Degree Program in Digital Culture, Landscape and Cultural Heritage, University of Turku, Finland. He is an environmental historian who has specialized among other things on the global environmental history of warfare during Industrial Age. He has coedited on this theme two special issues and three books, the latest one is The Resilient City in World War II: Urban Environmental Histories. He has selected five books that cover some main phases of the long environmental history of wars and mass violence.
How has nature influenced war and how have these changes presented? These kinds of basic questions make everyone interested in environmental history of war think.
This comprehensive book is easy to read but it provides valuable insights to the interaction between societies and nature from pre-colonial India to post-war Japan and serves as an excellent introduction to the field.
Contributors to this volume explore the dynamic between war and the physical environment from a variety of provocative viewpoints. The subjects of their essays range from conflicts in colonial India and South Africa to the U.S. Civil War and twentieth-century wars in Japan, Finland, and the Pacific Islands. Among the topics explored are: - the ways in which landscape can influence military strategies - why the decisive battle of the American Civil War was fought - the impact of war and peace on timber resources - the spread of pests and disease in wartime.
One might read for many reasons, but one of the main reasons for me is to connect and relate to the character. Female voices are very underheard, and I feel incredibly passionate about changing that and creating and reading stories where the female protagonists have strong voices and are not afraid to be heard. I think it’s important that we continue to create female characters that are raw and real and that portray subjects and feelings that need to be heard more.
I loved this book for so many reasons. The world-building is beautiful, the plot line is intriguing, and the main female character has a lot of depth to her. She’s beautiful and courageous, kind but strong, and she does anything for those she loves.
I saw much of myself in her character, which helped immerse me in the book as I read it. I’m a sucker for any book with a female protagonist that has a lot of depth; I feel it makes them more real, as we all have different sides to our personalities.
THE INSTANT SUNDAY TIMES BESTSELLER
'Epic, romantic, and enthralling from start to finish' Stephanie Garber
The stunning conclusion to the Celestial Kingdom Duology
After winning her mother's freedom from the Celestial Emperor, Xingyin thrives in the enchanting tranquility of her home. But her fragile peace is threatened by the discovery of a strange magic on the moon, and the unsettling changes in the Celestial Kingdom as the emperor tightens his grip on power.
While Xingyin is determined to keep clear of the rising danger, the discovery of a shocking truth spurs her into a perilous confrontation. Forced to flee her…
Books have been with me all my life as my father was a librarian and fed me books from an early age; I cannot remember being taught to read, I just could. Adventure and detective were my favourites. Then I found my local library and the horizons expanded; when I worked in a library there was the joy of being able to ‘stop’ a book I wanted to read but couldn't find. I graduated as a Biochemist and then got into computer programming. I completed my first novel in 1980 but put it away for thirty years before rewriting and publishing it. I got the writing bug and four more books followed as a series.
More magic and another enchanting new world to explore. Again I found I could dissolve into the story and be there with the characters. You are taken on adventures through this strange land where magic creeps from every stone. Start with a young girl who must face trials, partake in battles and defeat those who would enslave her people. She inherits the Kystrel a magical pendant with which she can both give and take. The first of three books which I could not put down.
In a world full of magic and mystery, eighteen-year-old Maia is the exiled princess of Comoros and rightful heir to the throne. Forced to live as a servant in her enemy's home, Maia flees her captors and begins a perilous quest to save her people. To survive, she must use magic she has learned in secret-despite the fact that women are forbidden to control it. Hunted by enemies at every turn, Maia realizes that danger lurks within her, too. Her powers threaten to steal not only her consciousness but also her sense of right and wrong. Can she set herself…
I spent the better part of a decade honing my writing skills and pushing the bounds of imagination after my debut fantasy novel Mercury Dagger - A Tale From Kraydenia. When I am not off exploring the wilds of Australia, I am dreaming up new adventures and monsters to cause chaos in a fantastical world filled with twists, loyalty, honour, and great and terrible battles.Originally from South Africa, I have travelled the African continent, visiting numerous countries, seeing first-hand the differences in many cultures who roam the lands and found it fascinating. It is this fascination that inspires my love for creating new characters and finding out what makes them tick.
If you like to be toyed with emotionally, pick up this novel. It will make you want to cry, laugh, turn away in disgust while wanting more. I have never had a book play with my emotions so much, especially when reaching the end and knowing the series was finished. As the tenth and final book of the Malazan book of the fallen, I tip my hat to Steven Erikson for his creation. Some of the best characters I have come to love are from this series. I loved every second of it.
The climax to the epic Malazan Book of the Fallen series that will determine how the world is ruled.
Savaged by the K'Chain Nah'Ruk, the Bonehunters march for Kolanse, where waits an unknown fate. Tormented by questions, the army totters on the edge of mutiny, but Adjunct Tavore will not relent. One final act remains, if it is in her power, if she can hold her army together, if the shaky allegiances she has forged can survive all that is to come. A woman with no gifts of magic, deemed plain, unprepossessing, displaying nothing to instill loyalty or confidence, Tavore…