We haven’t done this in quite awhile, but I think its time we give you the entire list of books.
Keep in mind that this is in no particular order. We started with one author and just made our way through.
The first list is author, the second list are the books. The books listed may be in the correct order if in a series or it may not be. I don’t claim to know if series are out there except for two complete ones, but if you find others that are part of the series that are not listed, let us know. Send the book title, author(s) and a link.
This list was last updated 12:34 PM Pacific time on 4/30/2024.
- Mark Russinovich
- Zero Day: A Jeff Aiken Novel (Jeff Aiken Series Book 1)
- Trojan Horse: A Jeff Aiken Novel (Jeff Aiken Series Book 2)
- Rogue Code: A Jeff Aiken Novel
- Scott Schober
- Hacked Again
- Cybersecurity Is Everybody’s Business: Solve the Security Puzzle for Your Small Business and Home
- Senior Cyber: Best Security Practices for Your Golden Years
- Kim Zetter
- Mikko Hyponnen
- Kai Roer and Perry Carpenter
- Robert Kerbeck
- Renee Dudley and Daniel Golden
- The Ransomware Hunting Team: A Band of Misfits’ Improbable Crusade to Save the World from Cybercrime
- Andy Greenberg
- Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency
- Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers
- This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers
- Christopher Hadnagy, Michele Fincher and Robin Dreeke
- Adam Levin
- Kevin Mitnick, Steve Wozniak and William L. Simon
- Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
- The Art of Deception: Controlling the Human Element of Security
- The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers 1st Edition
- Kevin Mitnick and Mikko Hypponnen
- Dave Eggers
- Frank Abagnale
- Stealing Your Life: The Ultimate Identity Theft Prevention Plan
- Catch Me If You Can: The True Story of a Real Fake
- The Art of the Steal: How to Protect Yourself and Your Business from Fraud, America’s #1 Crime
- Scam Me If You Can: Simple Strategies to Outsmart Today’s Rip-off Artists
- Marsha Bertrand
- Daniel J. Solove
- Paul Larosa and Maria Cramer
- Phil Lapsley
- Ron Smith
- Mitchell Zuckoff
- Matthew Danda
- Leigh Baker
- John E Douglas and Stephen Singular
- Ian Leaf and Ian Andrews
- John Gower III
- Scott J. Shapiro
- Laurent Richard, Sandrine Rigaud and Rachel Maddow
- Glenn Greenwald
- Geoff White
- Brian Krebs
- Nick Bilton
- Jamie Bartlett
- Paul Wilson with Christopher Hadnagy and A. T. Chandler
- Noah Zhang and Gary Westphalen
- Marc Goodman and Robertson Dean
- Jeff Horwitz
- Christopher Hadnagy
- Ben McKenzie and Jacob Silverman
- Jeff White
- Maxie Reynolds
- Nicole Perlroth
- Matt Potter
- Kevin Poulsen
- Joseph Menn
- Bruce Sterling
- David E. Sanger
- Parmy Olson
- Michelle Slatalla and Joshua Quittner
- Thomas Rid
- Active Measures: The Secret History of Disinformation and Political Warfare
- Cyber War Will Not Take Place
- Bruce Schneier
- Bruce Schneier and Ken Maxon
- Bobby Hundreds
- Ted Koppel
- Cris Thomas
- Roger A. Grimes
- Kashmir Hill
- United States Department of Labor
- Thomas A. Jacobs
- Thomas Keenan
- Laura Shin
- Keith Martin, Matthew Waterson, et al
- Steven Levi
- Daniel Susskind
- Samuel Woolley
- Max Fisher, Peter Ganim, et al
- Michael Brooks, Sam Seder, et al.
- Neil Wilkins and Brian R. Scott
- Artificial Intelligence: A Comprehensive Guide to AI, Machine Learning, Internet of Things, Robotics, Deep Learning, Predictive Analytics, Neural Networks, Reinforcement Learning, and Our Future
- Internet of Things: What You Need to Know About loT, Big Data, Predictive Analytics, Artificial Intelligence, Machine Learning, Cybersecurity, Business Intelligence, Augmented Reality and Our Future
- Elijah Lewis
- Noah Zhang, Gary Westphalen, et al.
- Cyber Security: The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats book 1 Discover Cyber Security Series
- Cyber Security: Learn the Basics of Cyber Security, Threat Management, Cyber Warfare Concepts and Executive-Level Policies book 2 Discover Cyber Security Series
- Lance Henderson and James C. Lewis
- Ben Mezrich, Will Collyer, et al.