// Prerequisites
What to read before Ghost in the Wires
If Ghost in the Wires feels too steep at beginner level, here is what to read first. Lighter books in the same topics that build the prerequisites this one assumes.
01 · 2011
Kingpin
Kevin Poulsen's reconstruction of Max Butler's career — from white-hat consultant to running CardersMarket, the carding forum that consolidated the early-2000s underground — and the FBI investigation that finally took him down.
Beginner5/5Kevin Poulsen02 · 1989
The Cuckoo's Egg
Clifford Stoll's first-person account of investigating a 75-cent accounting discrepancy at LBNL that turned into a year-long pursuit of a KGB-paid intruder across early-internet networks.
Beginner5/5Clifford Stoll03 · 2014
@War
Shane Harris on the entanglement of US military doctrine, the intelligence community, and private contractors after cyberspace was declared the fifth warfighting domain.
Beginner4/5Shane Harris04 · 2019
Cult of the Dead Cow
Joseph Menn's history of cDc — the Texas-rooted hacking collective that coined 'hacktivism', shipped Back Orifice, and threaded its way through three decades of the security industry's coming-of-age.
Beginner4/5Joseph Menn05 · 2016
Dark Territory
Fred Kaplan's policy-side history of US cyber capability, from Reagan-era panic about WarGames to the institutional buildup of NSA's offensive arm and the political fights over its use.
Beginner4/5Fred Kaplan06 · 2014
Spam Nation
Brian Krebs's investigative deep-dive into the Russian-speaking pharma-spam economy of the late 2000s — the affiliate networks, the rivalries, and the people who ran them.
Beginner4/5Brian Krebs07 · 2002
The Art of Deception
Kevin Mitnick and William Simon's case-study collection of social-engineering attacks: PBX scams, helpdesk impersonation, dumpster-diving, the casual lies that sound true. The technology dates the book; the human side is timeless.
Beginner4/5Kevin Mitnick, William L. Simon08 · 2005
The Art of Intrusion
Mitnick and Simon's follow-up to The Art of Deception: third-party stories from working hackers — casino slot exploits, prison-network breaches, post-9/11 intelligence ops — reconstructed and annotated by Mitnick.
Beginner4/5Kevin Mitnick, William L. Simon