Here are 86 books that Ghost Fleet fans have personally recommended if you like
Ghost Fleet.
Book DNA is a community of 12,000+ authors and super readers sharing their favorite books with the world.
I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.
The first person to ever catch a hacker wasn’t an FBI or CIA agent. It was an astronomer, and his name was Clifford Stoll. This book is a biographical account of how he took on a German hacker who was selling secrets to the KGB in the 1980s. I love this book because it shows how anyone can play a role in cybersecurity.
As a kid, I watched the TV adaptation of the book for PBS’s NOVA program and went into cybersecurity in large part because of Stoll. Because cybersecurity wasn’t a profession at the time, Stoll created his own innovative techniques, like building the first computer honeypot to help catch the hacker in action. When his book was made into a PBS documentary, as a thank you for putting up with him and all the crazy things he had to do to track the hacker, he had all of…
Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name…
It is April 1st, 2038. Day 60 of China's blockade of the rebel island of Taiwan.
The US government has agreed to provide Taiwan with a weapons system so advanced that it can disrupt the balance of power in the region. But what pilot would be crazy enough to run…
I’ve been passionate about science as a way of learning how nature works and approaching truth since I was a pre-teen. After five decades of basic research, teaching, and management in physics, I can distinguish good science from pseudoscience even beyond my own areas of expertise. I am greatly disturbed by attempts to undermine science in public policy-making when its findings conflict with ideology, religious beliefs, or business bottom lines. My passion project, via my blog debunkingdenial.com, is to explain to teachers and the public the underlying science and the flaws in science denial across a wide range of topics at the interface with public policy.
I love this book because Perlroth chronicles the proliferation of cyberweapons, which began in the hands of mischievous young hackers exploiting vulnerabilities in widely used software. Once some of those hackers joined the NSA, their tools were developed into sophisticated weapons to undercut technological developments in enemy states like Iran.
Once NSA’s hacks leaked to the wider world, they spawned an arms race and fueled rampant criminal ransomware attacks on vulnerable institutions. Informed by Perlroth’s book, I see a future in which dwindling human fertility and the ballooning costs of advanced weaponry will enhance the military role of cyber-attacks, leading to Mutually Assured Cyber Destruction, in which many countries have cyberweapons deeply embedded in the critical infrastructure of their adversaries, just waiting to activate them.
THE NEW YORK TIMES BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations)
"Written in the hot, propulsive prose of a spy thriller" (The New York Times), the untold story of the cyberweapons market-the most secretive, government-backed market on earth-and a terrifying first look at a new kind of global warfare.
Zero-day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero-day has the power…
I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.
Amoroso’s experience started with academic research at Bell Labs and Stevens Institute of Technology but moved quickly to practically fill voids at AT&T and NSA. His book reduces technical concepts in cybersecurity to basic principles and explains generically how they are effectively implemented. For the true techy who wants to fully understand all the formal logic behind the theories in Cyber Attacks, reach back to Ed Amoroso’s Fundamentals of Computer Security Technology (1994).
Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well.
This book covers cyber security policy development for…
I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.
It is a reporter’s account of a cybersecurity entrepreneur stumbling into criminal and nation-state level cyberattacks, assisting in the investigation, and ultimately becoming a target. The writing is clear and accessible to the non-technical reader but it still conveys a good sense of what it is like to witness and investigate cyber-crime. It is a suspenseful human drama.
In 2004, a California computer whiz named Barrett Lyon uncovered the identity of a hacker running major assaults on business websites. Without fully grasping the repercussions, he set on an investigation that led him into the heart of the Russian mob. Cybercrime was evolving. No longer the domain of small-time thieves, it had been discovered by sophisticated gangs. They began by attacking corporate websites but increasingly stole financial data from consumers and defence secrets from governments. While Barrett investigated the cutting edge of technology crime, the U.S. government struggled to catch up. Britain, however, was a different story. In the…
My firsthand experience of the Cold War influenced my taste in reading and entertainment from an early age. I’ve spent my entire adult life collecting books and movies that showcase adventure and adversity in situations where combinations of war and climate change have brought about the end of life as we knew it. All those influences have inspired me to make my own contributions to this form of literature.
This storyline blew me away with its fast pace and realism. All the heartaches and firefights come so fast, you barely have time to catch your breath. I was fascinated by the way so many of the chapters read like scenes from a movie. It made me want to read more.
This story is the first novel in a series about the adventures of a four man elite survival team, set up to keep things under control in post World War III America. In this first story they have to transport the President from war ravaged Washington to a fortress 1000 miles away.
I started telling Sea Stories around February 1992, when I reported to the Recruit Training Center, Great Lakes, Illinois. Since then, I’ve been entertaining anyone who would listen with my hyperbolic storytelling, a loose relationship with the facts, and a total disregard for modesty. Writing these stories really showcases my experiences not only in the Navy but as a student of history and international relations. I couldn’t possibly write the whole story without having received my BA in International Relations from the University of California at Riverside and my Law Degree from Southern Methodist University.
This is the brass ring of Cold War turns Hot military fiction. I loved what Tom Clancy put down on paper back in 1986 and truly believe that without this book, none of the others on this list would have been written. I loved the depth and detail that Clancy digs into with regard to operational planning as well as tactical combat operations.
I can’t compliment him enough on his easy explanation of complex systems and operations. If you like “rivet counting” this book is going to blow your mind. As a former Russian linguist for the Navy, I’m impressed with Clancy’s understanding of Soviet politics and strategy. As a self taught civilian, he knocks it out of the park.
Tom Clancy's second classic No 1 bestselling thriller - a chillingly authentic vision of modern war - now reissued in a new cover.
Three Muslim terrorists who destroyed the Soviet Union's largest petrochemical plant thought they were striking a blow for freedom. What they had done, unknowingly, was fire the first shots in World War III.
Desperately short of oil, the Kremlin hawks see only one way of solving their problem: seize supplies in the Persian Gulf. To do that, they must first neutralise NATO's forces and eliminate their response - and so they develop Red Storm, a dazzling master…
My fascination with dragons began at a young age and has intensified over the years. I think I’ve watched every movie with a dragon in it and read many of the books. I've tried to incorporate as much as I can, plus my own little twists, into each species of dragon in my world. The most excited I've been about dragons was while watching a special documentary on Discovery Channel. They explained how dragons could fly, the mechanics behind them breathing fire, and what their diet consisted of. It was a great speculative show but had enough science to make you wonder! I hope you enjoy the books on my list!
I love the way this novel portrays the relationship that can exist between humans and dragons. It is a beautiful friendship that is protective and loyal, but does not diminish their savage and vicious nature. Daenerys has raised them from hatchlings in the prior books, but in this book we start to see individual personalities developing, laying a foundation for what’s to come.
THE BOOK BEHIND THE THIRD SEASON OF GAME OF THRONES, AN ORIGINAL SERIES NOW ON HBO.
Here is the third volume in George R. R. Martin’s magnificent cycle of novels that includes A Game of Thrones and A Clash of Kings. As a whole, this series comprises a genuine masterpiece of modern fantasy, bringing together the best the genre has to offer. Magic, mystery, intrigue, romance, and adventure fill these pages and transport us to a world unlike any we have ever experienced. Already hailed as a classic, George R. R. Martin’s stunning series is destined to stand as one…
After teaching high school English for thirty-one years, I retired and began my second career in writing. I have published five novels and one collection of poetry. When I met Jane Tucker in 1974, she became a good friend, fellow church member, and my dental hygienist. I had no idea she had worked as a welder on Liberty Ships during World War II when she was only sixteen years old. After I learned this in 2012, I began my journey into learning all about the Rosies during World War II and writing my fourth novel Becoming Jestina. Jane’s story is an amazing one, and I still talk to her regularly.
No list of books about women’s work during World War II would be complete without Penny Coleman’s book. If you just want an overall picture of how eighteen million women, many of whom had never before held a job, entered the workforce in 1942-45 to help the US fight World War II, then this is the book for you! The book is illustrated with black and white photographs. It is an ALA Best Book for Young Adults.
Illustrated with black-and-white photographs. When America's men went off to war in 1942, millions of women were recruited, through posters and other propaganda, to work at non-traditional jobs. In defense plants, factories, offices, and everywhere else workers were needed, they were--for the first time--well paid and financially independent. But eventually the war ended, and the government and industries that had once persuaded them to work for the war effort now instructed them to return home and take care of their husbands and children. Based on interviews and original research by noted historian Penny Colman, Rosie the Riveter shows young readers…
One might read for many reasons, but one of the main reasons for me is to connect and relate to the character. Female voices are very underheard, and I feel incredibly passionate about changing that and creating and reading stories where the female protagonists have strong voices and are not afraid to be heard. I think it’s important that we continue to create female characters that are raw and real and that portray subjects and feelings that need to be heard more.
I loved this book for so many reasons. The world-building is beautiful, the plot line is intriguing, and the main female character has a lot of depth to her. She’s beautiful and courageous, kind but strong, and she does anything for those she loves.
I saw much of myself in her character, which helped immerse me in the book as I read it. I’m a sucker for any book with a female protagonist that has a lot of depth; I feel it makes them more real, as we all have different sides to our personalities.
THE INSTANT SUNDAY TIMES BESTSELLER
'Epic, romantic, and enthralling from start to finish' Stephanie Garber
The stunning conclusion to the Celestial Kingdom Duology
After winning her mother's freedom from the Celestial Emperor, Xingyin thrives in the enchanting tranquility of her home. But her fragile peace is threatened by the discovery of a strange magic on the moon, and the unsettling changes in the Celestial Kingdom as the emperor tightens his grip on power.
While Xingyin is determined to keep clear of the rising danger, the discovery of a shocking truth spurs her into a perilous confrontation. Forced to flee her…
I love America. I was born here, I live here, and I will die here. Like Walt Whitman, I am mad for this place, and I treasure the soil beneath my feet, the water I drink, and the air I breathe. Unfortunately, the soil I love so much has been marinated in the blood of previous generations, the water I drink is filled with the filthy effluent of a greedy, industry-centered culture, and the air I breathe is bitter, choking me with cancer-causing toxins. Why do I care so much about books that describe the destruction of the North American continent? Because the destruction has not stopped!!!!!!!!
The Frontiersmen by Allan Eckert was a life-changing experience for me. I read it as a youth, and Eckert’s compelling writing and meticulous research opened my eyes to just a few of the horrific events that happened right here in my backyard—events that enabled me to have a backyard in North America. This book is history as it should be written: a vivid description of true events without editorializing or interpretation. Eckert was a master storyteller who let the facts speak for themselves, and he is a personal hero of mine.
The frontiersmen were a remarkable breed of men. They were often rough and illiterate, sometimes brutal and vicious, often seeking an escape in the wilderness of mid-America from crimes committed back east. In the beautiful but deadly country which would one day come to be known as West Virginia, Kentucky, Michigan, Ohio, Indiana, and Illinois, more often than not they left their bones to bleach beside forest paths or on the banks of the Ohio River, victims of Indians who claimed the vast virgin territory and strove to turn back the growing tide of whites. These frontiersmen are the subjects…