Here are 100 books that The Cuckoo's Egg fans have personally recommended if you like
The Cuckoo's Egg.
Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.
My dad and Uncle (who was not my uncle!) were both WWII veterans; I was fortunate to receive an artist’s grant to gather stories from WWII veterans in Minnesota and told several at concerts honoring the anniversary of D-Day. My counseling background unexpectedly came into play as their stories left me understanding their heroism, sacrifice, shell shock, and grief. These vets grew up never leaving a circle about a hundred miles across and were suddenly thrown into a foreign country and war. I was compelled to research and write about the 1930’s, life on the farm, young romance, and trying to heal PTSD after the war.
Every now and then, I discover a book that has imagined a world and/or a character that takes me by surprise, and I can’t stop reading about them. Again, it’s all about character! In this book, I met a human cyborg enslaved by a computer program and built as a security unit rented out to corporate groups exploring planets for profit.
This sentient cyborg frees itself from enslavement, hilariously staves off the boredom of security work by watching its favorite media series, and as it watches characters in these shows, begins to learn about human behavior. I enjoyed the awkward, touching way it developed friendships and emotional connections. The character, which calls itself Murderbot, presents as if it’s on the spectrum.
Its first-person narration is snarky, occasionally hilarious, and endearing as it slowly learns what it means to have friendships. And oh, it finds all this wildly inconvenient, hates eye…
All Systems Red by Martha Wells begins The Murderbot Diaries, a new science fiction action and adventure series that tackles questions of the ethics of sentient robotics. It appeals to fans of Westworld, Ex Machina, Ann Leckie's Imperial Raadch series, or lain M. Banks' Culture novels. The main character is a deadly security droid that has bucked its restrictive programming and is balanced between contemplative self discovery and an idle instinct to kill all humans. In a corporate dominated s pa cef a ring future, planetary missions must be approved and supplied by the Company. Exploratory teams are accompanied by…
The Victorian mansion, Evenmere, is the mechanism that runs the universe.
The lamps must be lit, or the stars die. The clocks must be wound, or Time ceases. The Balance between Order and Chaos must be preserved, or Existence crumbles.
Appointed the Steward of Evenmere, Carter Anderson must learn the…
Ever since reading Heir to the Empire (Timothy Zahn), I’ve been fascinated by science fiction stories with amazing characters and intriguing concepts. I love finding a new story, especially one that isn’t being talked about, and falling into that world. I still get lost in the worlds of the Deathgate Cycle and Rose of the Prophets because they introduced me to concepts and places I’d never imagined or thought to imagine before reading them. I crafted a world and characters both familiar and alien because of these influences and I’m still drawn to them when I start a new book no one is talking about, like those on this list.
From the moment I first began listening to the audiobook, I fell in love with this story. I was all in the moment Ryland Grace stumbled through answering the question “What is 2 plus 2?” The layering of the story, the threat to Earth concept, the educational presentation of very high-level scientific concepts to an audience of all ages, and the way Andy Weir made this reader feel so many emotions over a rock just keep drawing me back to it.
I literally just finished another listen less than a month ago and already want to go back to a story. I still don’t see many people talking about it. And the ending? Every story has its own perfect dismount landing, and this one nailed it.
Ryland Grace is the sole survivor on a desperate, last-chance mission—and if he fails, humanity and the earth itself will perish.
Except that right now, he doesn’t know that. He can’t even remember his own name, let alone the nature of his assignment or how to complete it.
All he knows is that he’s been asleep for a very, very long time. And he’s just been awakened to find himself millions of miles from home, with nothing but two corpses for company.
His crewmates dead, his memories fuzzily returning, Ryland realizes that an impossible task now confronts him. Hurtling through…
Since first reading dystopian novels as a teenager, I’ve been fascinated by the new worlds that authors create and the fight that the protagonist endures to survive a hostile world. The difference from then to now is that it was previously a mostly male-dominated world. We like to see ourselves reflected in the protagonist, so I’ve been delighted to find so many strong and powerful women at the core of many contemporary dystopian novels. I find that they often include more thoughtful and complex characters with subtle storytelling.
I read this while on vacation, and though it was a wonderful trip, I kept thinking how much I was looking forward to getting back to the hotel room to continue reading.
The protagonist’s all-consuming job working for a tech company made me realize how much I wished I had used social media less. I loved how the book made us see how Mae’s job, at first exciting, took her to places she didn’t want to go.
In today’s online world, the completely interconnected one of this book is a cautionary tale.
NOW A MAJOR MOTION PICTURE starring Tom Hanks, Emma Watson and John Boyega
THE NEW YORK TIMES BESTSELLER - a dark, thrilling and unputdownable novel about our obsession with the internet
'Prepare to be addicted' Daily Mail
'A gripping and highly unsettling read' Sunday Times
'The Circle is 'Brave New World' for our brave new world... Fast, witty and troubling' Washington Post
When Mae is hired to work for the Circle, the world's most powerful internet company, she feels she's been given the opportunity of a lifetime. Run out of a sprawling California campus, the Circle links users' personal emails,…
The Guardian of the Palace is the first novel in a modern fantasy series set in a New York City where magic is real—but hidden, suppressed, and dangerous when exposed.
When an ancient magic begins to leak into the world, a small group of unlikely allies is forced to act…
I taught myself to code back in 1994 while working the graveyard shift as a geologist in the environmental industry. My job consisted of sitting in a chair during the dark hours of the night in a shopping center in Stockton, CA, watching another geologist take samples from wells in the parking lot. A friend of mine suggested I learn to code because I liked computers. I don’t mean to make this out to be a “it’s so simple anyone can do it!” You need to have a relentless drive to learn, which is why I wrote my book, The Imposter’s Handbook - as an active step to learning what I didn’t know I didn’t know.
This book makes me jealous as the author has an incredible ability to communicate the densest of topics (Cryptography) in an engaging, wonderful way.
It draws you in and you find yourself transported to battlefields and war rooms of the past. I’ve always taken cryptography for granted - I type httpsinto my browser and navigate to a site and all’s well. I know things are reasonably secure - but why?
It turns out that RSA, the algorithm that underpins things like SSL and SSH, is a landmark of human achievement and did something that millennia of mathematicians and scientists could not: provide secure, end-to-end encryption. A wonderful story.
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.
Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable…
I am a cryptography professor, which sadly doesn’t mean I spend my time breaking secret messages (at least not every day). I first studied cryptography simply because it was fun and interesting. It still is – but today it is unbelievably important, underpinning the security of almost everything we do in the digital world. I believe that developing a notion of 'cyber common sense’ is a vital life skill since so much of what we do is digital. A basic understanding of cryptography and its societal impact provides a superb foundation for making sense of digital security, so I’ve selected some of my favourite reads to get you started.
I always knew cryptography was political, but I had no idea how political until I read this book. Seeing the subject I am so fascinated by through the words of a political journalist was truly eye-opening. Steven Levy navigates a deeply fascinating period in modern technological history – the late twentieth-century battles between governments trying to maintain power and control over communications, and technologists who saw the fledgling internet as an opportunity to build a new world. Cryptography, which protects digital communications, sat plum on the frontline between these two communities, hence battles over cryptography turned into so-called 'crypto wars’ (although nobody died). Nobody who read this book was surprised with much that Edward Snowden had to say to the world in 2013 – Snowden was just reportage of the latest chapter in the same ongoing conflict.
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy the author who made "hackers" a household word comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the…
I am a cryptography professor, which sadly doesn’t mean I spend my time breaking secret messages (at least not every day). I first studied cryptography simply because it was fun and interesting. It still is – but today it is unbelievably important, underpinning the security of almost everything we do in the digital world. I believe that developing a notion of 'cyber common sense’ is a vital life skill since so much of what we do is digital. A basic understanding of cryptography and its societal impact provides a superb foundation for making sense of digital security, so I’ve selected some of my favourite reads to get you started.
This is a very short (of course!) introduction to cryptography, but it is masterful in its concise conveyance of all that really matters on this topic. I have no hesitation in admitting a close relationship with both authors, but most particularly Fred Piper, who was my doctoral supervisor. Fred has been a mentor throughout my professional life, and this book presents his take on the crucial components of modern cryptography, written for a general audience. I’ve seen this book in airport bookshops and thought `how cool – you can buy a book on cryptography that is written so well you could read it on a plane!’ I have now written two books about cryptography that are less short, and might need longer plane journeys, but Cryptography: A Very Short Introduction remains an inspiration to me.
This book is a clear and informative introduction to cryptography and data protection - subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are highlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce. This book highlights the explosive impact of cryptography on modern society, with, for example, the evolution of the internet and the introduction of more sophisticated banking methods.
ABOUT THE SERIES: The Very Short Introductions series from Oxford University…
Aury and Scott travel to the Finger Lakes in New York’s wine country to get to the bottom of the mysterious happenings at the Songscape Winery. Disturbed furniture and curious noises are one thing, but when a customer winds up dead, it’s time to dig into the details and see…
I am a cryptography professor, which sadly doesn’t mean I spend my time breaking secret messages (at least not every day). I first studied cryptography simply because it was fun and interesting. It still is – but today it is unbelievably important, underpinning the security of almost everything we do in the digital world. I believe that developing a notion of 'cyber common sense’ is a vital life skill since so much of what we do is digital. A basic understanding of cryptography and its societal impact provides a superb foundation for making sense of digital security, so I’ve selected some of my favourite reads to get you started.
Most digital technologies crucially rely on cryptography for their security, but few are entirely built from cryptography. Bitcoin is – simply – cryptography. The idea that money can be created from cryptography is a little bit mind-blowing, even for a cryptographer like myself. Dominic Frisby wrote one of the first, and finest, books about the leading cryptocurrency Bitcoin. He explores not just the incredible story of the founding of Bitcoin, but also gives an accessible explanation of how it works and what role it might play in our wider financial system. If you have let the term 'cryptocurrency’ wash over you but remain just a tiny bit curious, this book is your best route towards enlightenment. Whether you then decide to invest in any cryptocurrency is another matter altogether!
Following the economic crisis of 2008, the website `bitcoin.org' was registered by a mysterious computer programmer called Satoshi Nakamoto. A new form of money was born: electronic cash. Does Bitcoin have the potential to change how the world transacts financially? Or is it just a passing fad, even a major scam?
In Bitcoin: The Future of Money?, MoneyWeek's Dominic Frisby's explains this controversial new currency and how it came about, interviewing some of the key players in its development while casting light on its strange and murky origins, in particular the much-disputed identity of Nakamoto himself.
I’ve been passionate about science as a way of learning how nature works and approaching truth since I was a pre-teen. After five decades of basic research, teaching, and management in physics, I can distinguish good science from pseudoscience even beyond my own areas of expertise. I am greatly disturbed by attempts to undermine science in public policy-making when its findings conflict with ideology, religious beliefs, or business bottom lines. My passion project, via my blog debunkingdenial.com, is to explain to teachers and the public the underlying science and the flaws in science denial across a wide range of topics at the interface with public policy.
I love this book because Perlroth chronicles the proliferation of cyberweapons, which began in the hands of mischievous young hackers exploiting vulnerabilities in widely used software. Once some of those hackers joined the NSA, their tools were developed into sophisticated weapons to undercut technological developments in enemy states like Iran.
Once NSA’s hacks leaked to the wider world, they spawned an arms race and fueled rampant criminal ransomware attacks on vulnerable institutions. Informed by Perlroth’s book, I see a future in which dwindling human fertility and the ballooning costs of advanced weaponry will enhance the military role of cyber-attacks, leading to Mutually Assured Cyber Destruction, in which many countries have cyberweapons deeply embedded in the critical infrastructure of their adversaries, just waiting to activate them.
THE NEW YORK TIMES BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations)
"Written in the hot, propulsive prose of a spy thriller" (The New York Times), the untold story of the cyberweapons market-the most secretive, government-backed market on earth-and a terrifying first look at a new kind of global warfare.
Zero-day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero-day has the power…
I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.
The book portrays a scenario in which nation-state adversaries launch a sophisticated cyberattack against the United States.Though it is science fiction, the political scenario it depicts is a realistic description of how today’s nation-states consider technology options when they are engaged in traditional war. For people interested in cybersecurity and attracted to that genre, it will be an eye-opening experience because the basic scenarios it describes are very easy to project into the near future. It is also a tale of adventure.
Ghost Fleet is a page-turning imagining of a war set in the not-too-distant future. Navy captains battle through a modern-day Pearl Harbour; fighter pilots duel with stealthy drones; teenage hackers fight in digital playgrounds; Silicon Valley billionaires mobilise for cyber-war; and a serial killer carries out her own vendetta. Ultimately, victory will depend on who can best blend the lessons of the past with the weapons of the future. But what makes the story even more notable is that every trend and technology in book - no matter how sci-fi it may seem - is real. The debut novel by…
Magical realism meets the magic of Christmas in this mix of Jewish, New Testament, and Santa stories–all reenacted in an urban psychiatric hospital!
On locked ward 5C4, Josh, a patient with many similarities to Jesus, is hospitalized concurrently with Nick, a patient with many similarities to Santa. The two argue…
I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.
Amoroso’s experience started with academic research at Bell Labs and Stevens Institute of Technology but moved quickly to practically fill voids at AT&T and NSA. His book reduces technical concepts in cybersecurity to basic principles and explains generically how they are effectively implemented. For the true techy who wants to fully understand all the formal logic behind the theories in Cyber Attacks, reach back to Ed Amoroso’s Fundamentals of Computer Security Technology (1994).
Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well.
This book covers cyber security policy development for…