// Alternatives

Alternatives to Countdown to Zero Day

Books in our catalog with overlapping topics and a similar reading level to Countdown to Zero Day. If Countdown to Zero Day is the wrong fit at beginner level, start here.

  1. 01 · 2020

    The Hacker and the State

    Ben Buchanan's argument that state-on-state cyber operations are not deterrence-shaped (like nuclear) but signaling-shaped: countries use cyber to shape the environment, not to threaten escalation. Builds the case from declassified incidents.

    Beginner
    5/5Ben Buchanan
  2. 02 · 2019

    Sandworm

    Long-form journalism on the GRU's hacking operations, the best non-technical book on what state-level cyber actually looks like.

    Beginner
    5/5Andy Greenberg
  3. 03 · 2021

    This Is How They Tell Me the World Ends

    Nicole Perlroth's reporting on the global zero-day market: how exploits get bought, by whom, and how the gray-then-black market shapes which vulnerabilities get fixed and which get hoarded.

    Beginner
    4/5Nicole Perlroth
  4. 04 · 2016

    Dark Territory

    Fred Kaplan's policy-side history of US cyber capability, from Reagan-era panic about WarGames to the institutional buildup of NSA's offensive arm and the political fights over its use.

    Beginner
    4/5Fred Kaplan
  5. 05 · 2014

    @War

    Shane Harris on the entanglement of US military doctrine, the intelligence community, and private contractors after cyberspace was declared the fifth warfighting domain.

    Beginner
    4/5Shane Harris
  6. 06 · 2012

    Practical Malware Analysis

    Still the gold standard textbook for static and dynamic malware analysis on Windows.

    Intermediate
    5/5Michael Sikorski, Andrew Honig
  7. 07 · 2024

    La cyberdéfense

    French academic textbook on cyber defense — political, military, legal. The authors (researchers and former military-school faculty) cover the French organizational layer and the international ecosystem.

    Intermediate
    4/5Stéphane Taillat, Amaël Cattaruzza, Didier Danet
  8. 08 · 2018

    Malware Data Science

    Saxe and Sanders apply machine-learning techniques (classification, clustering, deep learning) to malware detection and attribution, with working Python code and real corpora.

    Intermediate
    4/5Joshua Saxe, Hillary Sanders
  9. 09 · 2014

    The Art of Memory Forensics

    Ligh, Case, Levy, and Walters' canonical reference on memory analysis with Volatility — the technique, the tooling, and the operating-system internals it depends on, across Windows, Linux, and macOS.

    Advanced
    5/5Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
  10. 10 · 2022

    Tracers in the Dark

    Andy Greenberg's investigative narrative of how Bitcoin's allegedly-anonymous public ledger became, in the hands of researchers and federal investigators, the most powerful OSINT tool of the last decade.

    Beginner
    5/5Andy Greenberg
Back to Countdown to Zero DayWhat to read after Countdown to Zero Day