// Alternatives

Alternatives to Hacks, Leaks, and Revelations

Books in our catalog with overlapping topics and a similar reading level to Hacks, Leaks, and Revelations. If Hacks, Leaks, and Revelations is the wrong fit at beginner level, start here.

  1. 01 · 2024

    Extreme Privacy

    Michael Bazzell's defender-side companion to OSINT Techniques: a step-by-step program for removing yourself from data brokers, public records, and the everyday surveillance economy without going off-grid.

    Intermediate
    5/5Michael Bazzell
  2. 02 · 2024

    OSINT Techniques

    Michael Bazzell's relentlessly updated technical manual for finding people, accounts, breach data, geolocation evidence, and online identifiers — the de facto reference of the modern OSINT field.

    Intermediate
    5/5Michael Bazzell
  3. 03 · 2018

    Open Source Intelligence Techniques and Tools

    Hassan and Hijazi's pedagogical introduction to OSINT framed inside the broader intelligence cycle (collection → processing → analysis → dissemination) rather than around a specific toolchain.

    Beginner
    3/5Nihad A. Hassan, Rami Hijazi
  4. 04 · 2019

    Permanent Record

    Edward Snowden's first-person memoir: the technical work that led him into the NSA's mass-surveillance programs, his reasoning for disclosure, and the Hong Kong handoff to the journalists who broke the story.

    Beginner
    4/5Edward Snowden
  5. 05 · 2022

    Practical Social Engineering

    Joe Gray's working manual for the social-engineering side of red team and threat intel: OSINT-driven recon, pretexting, phishing infrastructure, and the legal and ethical boundaries that separate professional work from criminal activity.

    Intermediate
    4/5Joe Gray
  6. 06 · 2022

    Tracers in the Dark

    Andy Greenberg's investigative narrative of how Bitcoin's allegedly-anonymous public ledger became, in the hands of researchers and federal investigators, the most powerful OSINT tool of the last decade.

    Beginner
    5/5Andy Greenberg
  7. 07 · 2020

    The Hacker and the State

    Ben Buchanan's argument that state-on-state cyber operations are not deterrence-shaped (like nuclear) but signaling-shaped: countries use cyber to shape the environment, not to threaten escalation. Builds the case from declassified incidents.

    Beginner
    5/5Ben Buchanan
  8. 08 · 2019

    Sandworm

    Long-form journalism on the GRU's hacking operations, the best non-technical book on what state-level cyber actually looks like.

    Beginner
    5/5Andy Greenberg
  9. 09 · 2019

    The Pragmatic Programmer

    Thomas and Hunt's career-defining set of practical heuristics for writing software professionally — orthogonality, broken-windows, DRY, tracer bullets, and the underlying argument that craftsmanship is a posture, not a process.

    Beginner
    5/5David Thomas, Andrew Hunt
  10. 10 · 2014

    Countdown to Zero Day

    Kim Zetter's investigative reconstruction of Stuxnet, the joint US/Israeli operation that physically damaged Iranian uranium-enrichment centrifuges via a worm, and what its discovery revealed about state-level cyber capability.

    Beginner
    5/5Kim Zetter
Back to Hacks, Leaks, and RevelationsWhat to read after Hacks, Leaks, and Revelations