Here are 72 books that Ghost in the Wires fans have personally recommended if you like
Ghost in the Wires.
Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.
Jeremy N. Smith is the author of three acclaimed narrative non-fiction books, including Breaking and Entering, about a female hacker called “Alien” and the birth of our information insecurity age. He has written for The Atlantic, Discover, Slate, and the New York Times, among other outlets, and he and his work have been featured by CNN, NPR, NBC Nightly News, The Today Show, and Wired. He hosts The Hacker Next Door podcast and lives in Missoula, Montana.
The Journal of IHTFP (look up that acronym!) is a delightful introduction to the original hacking scene at MIT, where hacks were elaborate, extremely clever student pranks—handing out colored cards at a Harvard-Yale football game to spell MIT rather than BEAT YALE when raised by eleven hundred Harvard fans, for example, or sneaking a power supply, multi-piece wooden frame, and the outer metal parts of a Chevrolet Cavalier atop the school’s Great Dome, so it appeared that the building was mounted by a real police cruiser, complete with flashing lights and boxes of Dunkin’ Donuts. The oversized book includes numerous photographs. Now out of print, it has been replaced by Nightwork by T. F. Peterson, which includes more recent hacks.
It is April 1st, 2038. Day 60 of China's blockade of the rebel island of Taiwan.
The US government has agreed to provide Taiwan with a weapons system so advanced that it can disrupt the balance of power in the region. But what pilot would be crazy enough to run…
Jeremy N. Smith is the author of three acclaimed narrative non-fiction books, including Breaking and Entering, about a female hacker called “Alien” and the birth of our information insecurity age. He has written for The Atlantic, Discover, Slate, and the New York Times, among other outlets, and he and his work have been featured by CNN, NPR, NBC Nightly News, The Today Show, and Wired. He hosts The Hacker Next Door podcast and lives in Missoula, Montana.
Hackers is a classic account of the computer revolution, centered on the pioneering tinkerers, gamers, social theorists, entrepreneurs, and other explorers who made military and corporate technology personal. These are not hackers in the criminal sense most people understand the term today, but men (and a few women) like Bill Gates, Steve Jobs, and others far less famous. Their interwoven biographies are brilliantly researched and reported, underpinned by what Levy calls a common “hacker ethic” whose tenets dominate our economy, politics, and culture today.
Steven Levy's classic book about the original hackers of the computer revolution is now available in a special 25th anniversary edition, with updated material from noteworthy hackers such as Bill Gates, Mark Zukerberg, Richard Stallman, and Tim O'Reilly. Hackers traces the exploits of innovators from the research labs in the late 1950s to the rise of the home computer in the mid-1980s. It's a fascinating story of brilliant and eccentric nerds such as Steve Wozniak, Ken Williams, and John Draper who took risks, bent the rules, and took the world in a radical new direction. "Hacker" is often a derogatory…
Jeremy N. Smith is the author of three acclaimed narrative non-fiction books, including Breaking and Entering, about a female hacker called “Alien” and the birth of our information insecurity age. He has written for The Atlantic, Discover, Slate, and the New York Times, among other outlets, and he and his work have been featured by CNN, NPR, NBC Nightly News, The Today Show, and Wired. He hosts The Hacker Next Door podcast and lives in Missoula, Montana.
The New Hacker’s Dictionary is the foremost compilation of the first fifty years of hacker lore, combining hilarious anecdotes and definitions to illuminate a hugely-influential but wildly-misunderstood culture more similar to beer-brewing monks than black-clad criminals. Though last updated in 1996, the technology, terms, and theories explained within still underlie the modern Internet, making this dictionary a dual cultural and architectural blueprint for anyone interested in how computing got to the present moment—and how to build a better future.
This new edition of the hacker's own phenomenally successful lexicon includes more than 100 new entries and updates or revises 200 more.
This new edition of the hacker's own phenomenally successful lexicon includes more than 100 new entries and updates or revises 200 more. Historically and etymologically richer than its predecessor, it supplies additional background on existing entries and clarifies the murky origins of several important jargon terms (overturning a few long-standing folk etymologies) while still retaining its high giggle value.
Sample definition
hacker n. [originally, someone who makes furniture with an axe] 1. A person who enjoys exploring the…
A Duke with rigid opinions, a Lady whose beliefs conflict with his, a long disputed parcel of land, a conniving neighbour, a desperate collaboration, a failure of trust, a love found despite it all.
Alexander Cavendish, Duke of Ravensworth, returned from war to find that his father and brother had…
Jeremy N. Smith is the author of three acclaimed narrative non-fiction books, including Breaking and Entering, about a female hacker called “Alien” and the birth of our information insecurity age. He has written for The Atlantic, Discover, Slate, and the New York Times, among other outlets, and he and his work have been featured by CNN, NPR, NBC Nightly News, The Today Show, and Wired. He hosts The Hacker Next Door podcast and lives in Missoula, Montana.
We Are Anonymous, along with Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous by Gabriella Coleman, explores the politics and personalities of the best-known real-world hacktivist group, Anonymous, how it rose to prominence and power, its impact and influence, and the government machinations that ultimately turned members against each other. Its pages reveal hackers at their most human—brilliant, idealistic, vulnerable, and conflicted.
A thrilling, exclusive exposè of the hacker collectives Anonymous and LulzSec.
We Are Anonymous is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds -- and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec.
In late 2010, thousands of hacktivists joined a mass digital…
Researching DevilsGame, about an Internet meltdown caused by an unknown evil, I exposed myself to some harrowing truths. I learned how astonishingly frail our internet ecosystem is and how imperiled it is by bad actors who have burrowed deeply and often invisibly into its infrastructure. So, beyond writing a fictional thriller, I was moved to ring a warning bell! And I hope by formatting DevilsGame as “hyperlinked fiction,” mixing real news sites with fictional sites created for the novel, readers will experience the story in a way that parallels and parodies the way we experience real, live crises these days: navigating from fact to fiction, often without observing the boundaries.
I found myself catching my breath as I read this riveting nonfiction tale chronicling "perhaps the first true, wide-scale cyberwar in history,” launched by the hacker group now known as Sandworm.
I was thrilled to be swept along on the high-stakes hunt for an “invisible force….striking out from an unknown origin to sabotage, on a massive scale, the technologies that underpin civilization,” and I was gratified by the meticulous tracing, tracking, and revelation of the Russian villains of Sandworm.
"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy
The true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times).
My family moved from America to rural China when I was four. We never stayed in one place for very long. Ever since, I’ve been searching for home in books and countries around the world. The themes of home, belonging, and identity are important ones to me that I explore in my young adult novels. My love of travel, martial arts, and tech also lend themselves well to writing fast-paced adventure books with epic battles and fight scenes. I hope you enjoy the novels on this list as much as I do!
Warcross hooked me from page one and never let go.
First off, the near future American and Japanese settings were super fun to explore. Secondly, there were hackers, dark web bounty hunters, and virtual reality games—I mean, come on!
This book had all the fun tropes that I love in a series.
From #1 New York Times bestselling author Marie Lu - when a game called Warcross takes the world by storm, one girl hacks her way into its dangerous depths.
For the millions who log in every day, Warcross isn't just a game - it's a way of life. Struggling to make ends meet, teenage hacker Emika Chen works as a bounty hunter, tracking down players who bet on the game illegally. Needing to make some quick cash, Emika takes a risk and hacks into the opening game of the international Warcross Championships -…
The Duke's Christmas Redemption
by
Arietta Richmond,
A Duke who has rejected love, a Lady who dreams of a love match, an arranged marriage, a house full of secrets, a most unneighborly neighbor, a plot to destroy reputations, an unexpected love that redeems it all.
Lady Charlotte Wyndham, given in an arranged marriage to a man she…
I love computers, and especially computer systems. I’m interested in how different pieces of hardware and software, like processors, operating systems, compilers, and linkers, work together to get things done. Early in my career, as a software security tester, I studied how different components interacted to find vulnerabilities. Now that I work on compilers, I focus on the systems that transform source code into a running program. I’m also interested in how computer systems are shaped by the people who build and use them—I believe that creating safer, more reliable software is a social problem as much as a technical one.
One of the best ways to understand how software works is to study how it fails. When I was just starting my career in software security, I read this book to learn about binary exploits like buffer overflows. It’s been a long time since I’ve written a binary exploit, but digging into the nitty-gritty, low-level details of how software runs on a real system has helped with everything I’ve done as an engineer since.
A lot has changed since this book was published in 2008 (and running the accompanying Live CD has gotten trickier), but the fundamental concepts are as relevant as ever.
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a…
I’m the Head of Trend and Innovation Scouting for Nokia, and I’ve been with the company since the glory days of Nokia mobile phone world dominance. I know first-hand what happens when a company focuses exclusively on the technology, not the humans that use it, and how quickly that can lead to disaster. One of the lessons that I see repeated continuously in the field of innovation is that a huge amount of attention gets paid to the new technology, and not nearly enough on how the technology will interact with our existing systems, beliefs, attitudes, and culture. Learning from the mistakes is the best way to make sure that the future doesn’t repeat them!
Stepping away from the topic of immersive technology, The Ransomware Hunting Team instead looks at the realities of cybercrime in the US, and why especially our government infrastructure has such a hard time fighting it effectively.
Like all the other books on my list, it’s an examination of what happens when the rubber meets the road with a new technology, and how we humans often just aren’t very good at adapting to change.
Part of the key problem is that hackers – including the white hat hackers that you want on your side to bring down the bad guys – tend not to be social animals, and our official organizations are far happier hiring a smiling guy in a suit than a scowling nerd who would rather work from his dark bedroom at home. (Apologies for the stereotypes, but – this really is a problem!)
Scattered across the world, an elite team of code-cracking techies is working tirelessly on your behalf to thwart the most notorious cyber scourge of our time. You've probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, especially if its cybersecurity is imperfect, chances are that you're painfully familiar with the group's sworn enemy: ransomware. Again and again, these ordinary people, mostly self-taught and often struggling to make ends meet, have outwitted the shadowy networks of hackers and criminal gangs that lock computer networks and extort huge payments in return…
I’m just a book-loving girl working in a corporate world who’s sick to death of the inaccurate representations of technology in fiction. FYI, tracing a phone call is instantaneous, no need to keep that pesky murderer on the line these days. Technology is so ingrained in our daily lives and most people have very limited knowledge of what it actually does, so I became fascinated with the idea of using real modern-day tech in murder mysteries. I got so obsessed with the idea I decided to write it. No Sci-Fi of future tech, it may seem farfetched, but all the electronic wizardry used in my novels is real and accurately represented.
Cory Doctorow, the champion of nerds everywhere really hit the nail on the head with his book about the state of current politics and society with Little Brother. This book was released in 2008 but seems truer to life now than ever. His protagonist Marcus, watches appalled as the government begins to strip away citizens' rights under the guise of our protection. This book has been called dystopian young adult fiction, but I disagree. It all feels very familiar to the current climate we live in. It can get a little preachy but regardless of your personal politics it’s a must-read for all.
Marcus, a.k.a "w1n5t0n," is only seventeen years old, but he figures he already knows how the system works–and how to work the system. Smart, fast, and wise to the ways of the networked world, he has no trouble outwitting his high school's intrusive but clumsy surveillance systems.
But his whole world changes when he and his friends find themselves caught in the aftermath of a major terrorist attack on San Francisco. In the wrong place at the wrong time, Marcus and his crew are apprehended by the Department of Homeland Security and whisked away to a secret prison where they're…
This book follows the journey of a writer in search of wisdom as he narrates encounters with 12 distinguished American men over 80, including Paul Volcker, the former head of the Federal Reserve, and Denton Cooley, the world’s most famous heart surgeon.
In these and other intimate conversations, the book…
I’m a scholar of gender and state violence, and I live and work at the US-Mexico border. For the past several years, I’ve worked collaboratively with large teams of Latinx-identified students to study the impacts of US immigration policies on migrants from Mexico and Central America. We realized that even though about half of immigrants are women, around 95% of deportees are men. So, we started to think about how US policies criminalize immigrant men. I became especially interested in how immigration enforcement (at the border and beyond) intersects with mass incarceration. In the list, I pick up books that trace the multinational reach of the carceral apparatus that comes to treat migrants as criminals.
This is the incredibly gripping tale of the friendship and interdependency between Levi, a young (23-year-old) anthropological researcher who joins a migrant caravan, and Axel, a migrant and hacker who ends up employed by many bigshots in the migrant-aid industry within Mexico.
It uncovers a terrible set of abuses in migrant shelters, as shelter leaders spy on one another, brutally mistreat migrants, and manipulate migrants and the government. I read it in three days.
An unlikely friendship, a four-thousand-mile voyage, and an impenetrable frontier—this dramatic odyssey reveals the chaos and cruelty US immigration policies have unleashed beyond our borders.
Axel Kirschner was a lifelong New Yorker, all Queens hustle and bravado. But he was also undocumented. After a minor traffic violation while driving his son to kindergarten, Axel was deported to Guatemala, a country he swore he had not lived in since he was a baby. While fighting his way back through Mexico on a migrant caravan, Axel met Levi Vonk, a young anthropologist and journalist from the US. That chance encounter would change…