Here are 100 books that The Cuckoo's Egg fans have personally recommended if you like
The Cuckoo's Egg.
Book DNA is a community of 12,000+ authors and super readers sharing their favorite books with the world.
I grew up when the space race was starting, and I became fascinated by all things regarding the planets, rockets, and the cosmos. For several years, I lived in the Houston area and spent hours and hours at the Johnson Space Center, where the history and future of space exploration are on display. The books on my list represent a major theme in my writing, which is futuristic in concept and asks the question: what we would do if our planet became uninhabitable. The answer provides the canvas to explore the advantages of technology, but most importantly, the determination of the human spirit.
I love books that are clever, imaginative, and portray a particular person or character as the main theme. This book does it for me.
The character is a murderer robot, but I came to like him and his weird but insightful perspective. I could see his world through his eyes. I felt sorry for him by the end of the book and was rooting for him. That was great.
I always like a bit of technology thrown in, but not have it be the main story or too complicated that it gets in the way of the characters. The writing was especially good, and I found myself turning page after page, engrossed in the story.
All Systems Red by Martha Wells begins The Murderbot Diaries, a new science fiction action and adventure series that tackles questions of the ethics of sentient robotics. It appeals to fans of Westworld, Ex Machina, Ann Leckie's Imperial Raadch series, or lain M. Banks' Culture novels. The main character is a deadly security droid that has bucked its restrictive programming and is balanced between contemplative self discovery and an idle instinct to kill all humans. In a corporate dominated s pa cef a ring future, planetary missions must be approved and supplied by the Company. Exploratory teams are accompanied by…
Magical realism meets the magic of Christmas in this mix of Jewish, New Testament, and Santa stories–all reenacted in an urban psychiatric hospital!
On locked ward 5C4, Josh, a patient with many similarities to Jesus, is hospitalized concurrently with Nick, a patient with many similarities to Santa. The two argue…
I grew up when the space race was starting, and I became fascinated by all things regarding the planets, rockets, and the cosmos. For several years, I lived in the Houston area and spent hours and hours at the Johnson Space Center, where the history and future of space exploration are on display. The books on my list represent a major theme in my writing, which is futuristic in concept and asks the question: what we would do if our planet became uninhabitable. The answer provides the canvas to explore the advantages of technology, but most importantly, the determination of the human spirit.
I love this book because it blends real science with an incredibly human story about survival and connection.
Andy Weir makes complex physics feel accessible, while still keeping the stakes intense and the pacing fast. What really stands out for me is the unexpected friendship at the heart of the story—it turns what could have been a solitary mission into something deeply emotional.
Ryland Grace is the sole survivor on a desperate, last-chance mission—and if he fails, humanity and the earth itself will perish.
Except that right now, he doesn’t know that. He can’t even remember his own name, let alone the nature of his assignment or how to complete it.
All he knows is that he’s been asleep for a very, very long time. And he’s just been awakened to find himself millions of miles from home, with nothing but two corpses for company.
His crewmates dead, his memories fuzzily returning, Ryland realizes that an impossible task now confronts him. Hurtling through…
Since first reading dystopian novels as a teenager, I’ve been fascinated by the new worlds that authors create and the fight that the protagonist endures to survive a hostile world. The difference from then to now is that it was previously a mostly male-dominated world. We like to see ourselves reflected in the protagonist, so I’ve been delighted to find so many strong and powerful women at the core of many contemporary dystopian novels. I find that they often include more thoughtful and complex characters with subtle storytelling.
I read this while on vacation, and though it was a wonderful trip, I kept thinking how much I was looking forward to getting back to the hotel room to continue reading.
The protagonist’s all-consuming job working for a tech company made me realize how much I wished I had used social media less. I loved how the book made us see how Mae’s job, at first exciting, took her to places she didn’t want to go.
In today’s online world, the completely interconnected one of this book is a cautionary tale.
NOW A MAJOR MOTION PICTURE starring Tom Hanks, Emma Watson and John Boyega
THE NEW YORK TIMES BESTSELLER - a dark, thrilling and unputdownable novel about our obsession with the internet
'Prepare to be addicted' Daily Mail
'A gripping and highly unsettling read' Sunday Times
'The Circle is 'Brave New World' for our brave new world... Fast, witty and troubling' Washington Post
When Mae is hired to work for the Circle, the world's most powerful internet company, she feels she's been given the opportunity of a lifetime. Run out of a sprawling California campus, the Circle links users' personal emails,…
Former model Kira McGovern picks up the paint brushes of her youth and through an unexpected epiphany she decides to mix ashes of the deceased with her paints to produce tributes for grieving families.
Unexpectedly this leads to visions and images of the subjects of her work and terrifying changes…
I taught myself to code back in 1994 while working the graveyard shift as a geologist in the environmental industry. My job consisted of sitting in a chair during the dark hours of the night in a shopping center in Stockton, CA, watching another geologist take samples from wells in the parking lot. A friend of mine suggested I learn to code because I liked computers. I don’t mean to make this out to be a “it’s so simple anyone can do it!” You need to have a relentless drive to learn, which is why I wrote my book, The Imposter’s Handbook - as an active step to learning what I didn’t know I didn’t know.
This book makes me jealous as the author has an incredible ability to communicate the densest of topics (Cryptography) in an engaging, wonderful way.
It draws you in and you find yourself transported to battlefields and war rooms of the past. I’ve always taken cryptography for granted - I type httpsinto my browser and navigate to a site and all’s well. I know things are reasonably secure - but why?
It turns out that RSA, the algorithm that underpins things like SSL and SSH, is a landmark of human achievement and did something that millennia of mathematicians and scientists could not: provide secure, end-to-end encryption. A wonderful story.
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.
Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable…
I am a cryptography professor, which sadly doesn’t mean I spend my time breaking secret messages (at least not every day). I first studied cryptography simply because it was fun and interesting. It still is – but today it is unbelievably important, underpinning the security of almost everything we do in the digital world. I believe that developing a notion of 'cyber common sense’ is a vital life skill since so much of what we do is digital. A basic understanding of cryptography and its societal impact provides a superb foundation for making sense of digital security, so I’ve selected some of my favourite reads to get you started.
I always knew cryptography was political, but I had no idea how political until I read this book. Seeing the subject I am so fascinated by through the words of a political journalist was truly eye-opening. Steven Levy navigates a deeply fascinating period in modern technological history – the late twentieth-century battles between governments trying to maintain power and control over communications, and technologists who saw the fledgling internet as an opportunity to build a new world. Cryptography, which protects digital communications, sat plum on the frontline between these two communities, hence battles over cryptography turned into so-called 'crypto wars’ (although nobody died). Nobody who read this book was surprised with much that Edward Snowden had to say to the world in 2013 – Snowden was just reportage of the latest chapter in the same ongoing conflict.
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy the author who made "hackers" a household word comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the…
I am a cryptography professor, which sadly doesn’t mean I spend my time breaking secret messages (at least not every day). I first studied cryptography simply because it was fun and interesting. It still is – but today it is unbelievably important, underpinning the security of almost everything we do in the digital world. I believe that developing a notion of 'cyber common sense’ is a vital life skill since so much of what we do is digital. A basic understanding of cryptography and its societal impact provides a superb foundation for making sense of digital security, so I’ve selected some of my favourite reads to get you started.
This is a very short (of course!) introduction to cryptography, but it is masterful in its concise conveyance of all that really matters on this topic. I have no hesitation in admitting a close relationship with both authors, but most particularly Fred Piper, who was my doctoral supervisor. Fred has been a mentor throughout my professional life, and this book presents his take on the crucial components of modern cryptography, written for a general audience. I’ve seen this book in airport bookshops and thought `how cool – you can buy a book on cryptography that is written so well you could read it on a plane!’ I have now written two books about cryptography that are less short, and might need longer plane journeys, but Cryptography: A Very Short Introduction remains an inspiration to me.
This book is a clear and informative introduction to cryptography and data protection - subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are highlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce. This book highlights the explosive impact of cryptography on modern society, with, for example, the evolution of the internet and the introduction of more sophisticated banking methods.
ABOUT THE SERIES: The Very Short Introductions series from Oxford University…
Rusty Allen is an Iraqi War veteran with PTSD. He moves to his grandfather's cabin in the mountains to find some peace and go back to wilderness training.
He gets wrapped up in a kidnapping first, as a suspect and then as a guide. He tolerates the sheriff's deputy with…
I am a cryptography professor, which sadly doesn’t mean I spend my time breaking secret messages (at least not every day). I first studied cryptography simply because it was fun and interesting. It still is – but today it is unbelievably important, underpinning the security of almost everything we do in the digital world. I believe that developing a notion of 'cyber common sense’ is a vital life skill since so much of what we do is digital. A basic understanding of cryptography and its societal impact provides a superb foundation for making sense of digital security, so I’ve selected some of my favourite reads to get you started.
Most digital technologies crucially rely on cryptography for their security, but few are entirely built from cryptography. Bitcoin is – simply – cryptography. The idea that money can be created from cryptography is a little bit mind-blowing, even for a cryptographer like myself. Dominic Frisby wrote one of the first, and finest, books about the leading cryptocurrency Bitcoin. He explores not just the incredible story of the founding of Bitcoin, but also gives an accessible explanation of how it works and what role it might play in our wider financial system. If you have let the term 'cryptocurrency’ wash over you but remain just a tiny bit curious, this book is your best route towards enlightenment. Whether you then decide to invest in any cryptocurrency is another matter altogether!
Following the economic crisis of 2008, the website `bitcoin.org' was registered by a mysterious computer programmer called Satoshi Nakamoto. A new form of money was born: electronic cash. Does Bitcoin have the potential to change how the world transacts financially? Or is it just a passing fad, even a major scam?
In Bitcoin: The Future of Money?, MoneyWeek's Dominic Frisby's explains this controversial new currency and how it came about, interviewing some of the key players in its development while casting light on its strange and murky origins, in particular the much-disputed identity of Nakamoto himself.
I’ve been passionate about science as a way of learning how nature works and approaching truth since I was a pre-teen. After five decades of basic research, teaching, and management in physics, I can distinguish good science from pseudoscience even beyond my own areas of expertise. I am greatly disturbed by attempts to undermine science in public policy-making when its findings conflict with ideology, religious beliefs, or business bottom lines. My passion project, via my blog debunkingdenial.com, is to explain to teachers and the public the underlying science and the flaws in science denial across a wide range of topics at the interface with public policy.
I love this book because Perlroth chronicles the proliferation of cyberweapons, which began in the hands of mischievous young hackers exploiting vulnerabilities in widely used software. Once some of those hackers joined the NSA, their tools were developed into sophisticated weapons to undercut technological developments in enemy states like Iran.
Once NSA’s hacks leaked to the wider world, they spawned an arms race and fueled rampant criminal ransomware attacks on vulnerable institutions. Informed by Perlroth’s book, I see a future in which dwindling human fertility and the ballooning costs of advanced weaponry will enhance the military role of cyber-attacks, leading to Mutually Assured Cyber Destruction, in which many countries have cyberweapons deeply embedded in the critical infrastructure of their adversaries, just waiting to activate them.
THE NEW YORK TIMES BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations)
"Written in the hot, propulsive prose of a spy thriller" (The New York Times), the untold story of the cyberweapons market-the most secretive, government-backed market on earth-and a terrifying first look at a new kind of global warfare.
Zero-day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero-day has the power…
I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.
The book portrays a scenario in which nation-state adversaries launch a sophisticated cyberattack against the United States.Though it is science fiction, the political scenario it depicts is a realistic description of how today’s nation-states consider technology options when they are engaged in traditional war. For people interested in cybersecurity and attracted to that genre, it will be an eye-opening experience because the basic scenarios it describes are very easy to project into the near future. It is also a tale of adventure.
Ghost Fleet is a page-turning imagining of a war set in the not-too-distant future. Navy captains battle through a modern-day Pearl Harbour; fighter pilots duel with stealthy drones; teenage hackers fight in digital playgrounds; Silicon Valley billionaires mobilise for cyber-war; and a serial killer carries out her own vendetta. Ultimately, victory will depend on who can best blend the lessons of the past with the weapons of the future. But what makes the story even more notable is that every trend and technology in book - no matter how sci-fi it may seem - is real. The debut novel by…
Portrait of an Artist as a Young Woman
by
Alexis Krasilovsky,
Kate from Jules et Jim meets I Love Dick.
A young woman filmmaker’s journey of self-discovery, set against a backdrop of the sexual liberation movement of the 1970s and 1980s. In Portrait of an Artist as a Young Woman, we follow Ana Fried as she faces the ultimate…
I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.
Amoroso’s experience started with academic research at Bell Labs and Stevens Institute of Technology but moved quickly to practically fill voids at AT&T and NSA. His book reduces technical concepts in cybersecurity to basic principles and explains generically how they are effectively implemented. For the true techy who wants to fully understand all the formal logic behind the theories in Cyber Attacks, reach back to Ed Amoroso’s Fundamentals of Computer Security Technology (1994).
Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well.
This book covers cyber security policy development for…