These are our favorite cyber books on hacking, espionage, crypto, surveillance, and more

Spread the love

In the last 5 years or more, a niche in the larger field of computer science, starting from the specialty of a niche, estimates that hackers are worth more than $ 170 billion $ 170 billion made by a globe-spaning community. Instead of, industrial growth and high-profile hacks such as 2015 Sony breachThe 2016 US selection hack and leaked operationsThe Colon Polynative Pipeline Attack ReductionAnd a Apparently Endless List Of Chinese Government HacksCyberSSICURT AND HACKING GO MADE AD.

Pop Culture Hit TV shows hackers with hackers Mr. RobotAnd movies like Leave the world behindThe But perhaps the most widespread medium for cybersic work stories – on both fiction and reality – books.

Based on the books we read on ourselves and the advice that the community gave us is based on the best Cyber Security books we have made its own list Mast And BluskyThe

This list of the book (in a particular order) will be updated periodically.

Counting zero dayKim jetter

CyberTac, which is integrated by Israeli and US government hackers, is known as Staxnet, which damaged centrifus in Natanz’s Iranian nuclear facility, almost of course The The most well -known hack in history. Due to its impact, its sophistication and its perfect courage, the attack imagined not only in the cyberquacy community but also the larger people.

Veteran journalist Kim jetter The story of Staxnet is treating the malware to give a character like a character. To achieve this, the jetter virtually interviewed all the major investigators who found the contaminated code, analyzed how it works and discovered what it did. It must be read for anyone who works on the cyber field, but it also serves as a great role in the world of cybercopenez and cyberspanez for people regularly.

The darkness of the darkJoseph Cox

The FBI’s Operation Trojan Shield did not have any sting operations, where Feds Annome had run a startup called encrypted phones to the worst criminals in the world to smugglers high-profile drug smugglers.

These criminals thought they were using specially designed communication devices to avoid surveillance. In reality, all their supposed protected messages, pictures and audio notes are being delicious to the FBI and its international law enforcement partners. 404 Media journalist Joseph Cox With the interview with the Masterminds of the FBI’s sting operation, Anom’s story efficiently tells the startup, the developers and workers and the devices using the devices.

CokeCliff stall

In 1986, astronomer Cliff Stall was given the responsibility of finding the significance of $ 0.75 in the use of his lab computer network. At this point, the Internet had a network for most governments and academic organizations and paid depending on how much time these companies spent online. Over the following year, the stall seemed like a minor incident, and his threads were perfectly pulled and in this case, run by the KGB of Russia, the first time the official cyberSpionage was invented by the discovery of a case recorded.

Not only did the stall solve the mystery, but he made it long and turned it into a gripping spy thriller. It is hard to explain how important this book was. When it was published in 1989, the hackers were just a blip in public imagination. Coke Young cybercuity enthusiasts showed how a cyber event could be investigated and it showed to the more broad public that stories about computer spy could be as exciting as a real -life James Bond personality.

Your face belongs to usKashmir heel

The recognition of the mouth has gone faster from a technology that seemed to be almighty in the movie and TV shows-but it was an important and comparatively accurate equipment for the law enforcement of the daily activities of the junkie and in real life. Long -term tech reporter Kashmir heel It is the history of technology by the rise of a controversial startup that creates Clearview AI.

Not like other books, which is partially involved in the story of Clearview AI, partially involved in the story’s own side, but the journalist did a lot of work for the factor-and in some cases he heard from the source of his company. Hill is the best position to tell the story of Clearview AI after the first existence in 2020, which gives the book an interesting first person in some categories.

The dead cow cultureJoseph

Investigator Cyber Reporter Joseph One of the oldest hacking supergroups in the ’80 and 90s and how they helped convert the primary internet to the primary Internet today, telling the incredible true back story of the dominant Cult of the Dead cow. Members of these groups include mainstream names from Technology CEO and staff, some of whom went to advise the presidents and testified to lawyers, who testified to the heroes who testified Have helped to protect most of the world’s modern technology and communicationThe

Men’s book hackers have celebrated both what he has, created and broken the name of the right of the freedom of speech, speech and expression and the right to privacy, and has celebrated the history of the initial internet hacking as it is said to be very surviving people.

Hack the futureEmily

“Hack to Future” is a necessary lesson for someone who wants to understand the incredible and rich history of hacking world and its many cultures. The author of the book, EmilyA hacker and protection researcher by trade, in modern times, a few of the primary hacks that were in the root, have not been released in decades in decades.

This book has been deeply studied, well presented, and both part of the hacker community-History and Part-Selibration, which to score free distance calls from a telephone-misery from the curiosity-mind, becomes a powerful community and become a geological power in the mainstream culture.

Tracer in the darkAndy Greenberg

The concept of cryptocurrency was born on the 21st, a white paper published by a mysterious (and still unknown) image called Satoshi Nakamoto. It laid the foundation of Bitcoin and now, about 20 years later, Crypto has become its own industry and embeds itself in the global financial system. Crypto is also very popular among low -level scammers to sophisticated North Korean government and hackers among thieves.

In this book, wired Andy Greenberg Depending on following digital meaning through blockchain, multiple high-profile investigations are details. Interview with investigators working in this case, Greenburg Agrani Dark Web Marketplace Silk Road has noted the screen behind the tachdown on Silk Road as well as the Operations (Alpha Bay) and the “world’s largest” child sexual abuse website. “Welcome to the video.”

DarkBurton Gelman

A decade ago, former NSA contractor Edward Snowden leaked thousands of top secret files to thousands of top journalists and blew up the vast majority of the US government’s global surveillance operation. Was one of those journalists Burton GelmanThe reporter of the then Washington Post who was later chronic in his book Dark The internal story of Snowden’s initial promotion and the process of verifying and reporting the cache of classified government files provided by Whistle Blower.

Personal fiber optic cables connect the datacenters of some of the world’s largest organizations, in secret snooping on lawyers and world leaders, from the national security agencies and its global allies to be able to spy almost anyone in the world. Dark There is no eye on history, but how the jailman has investigated, reported and broke a new foundation on several influential and important journalism of the 21st Century and his first person’s details and all cyber journalists needed to read.

Leave a Reply

Your email address will not be published. Required fields are marked *