// Alternatives

Alternatives to Sandworm

Books in our catalog with overlapping topics and a similar reading level to Sandworm. If Sandworm is the wrong fit at beginner level, start here.

  1. 01 · 2020

    The Hacker and the State

    Ben Buchanan's argument that state-on-state cyber operations are not deterrence-shaped (like nuclear) but signaling-shaped: countries use cyber to shape the environment, not to threaten escalation. Builds the case from declassified incidents.

    Beginner
    5/5Ben Buchanan
  2. 02 · 1989

    The Cuckoo's Egg

    Clifford Stoll's first-person account of investigating a 75-cent accounting discrepancy at LBNL that turned into a year-long pursuit of a KGB-paid intruder across early-internet networks.

    Beginner
    5/5Clifford Stoll
  3. 03 · 2021

    This Is How They Tell Me the World Ends

    Nicole Perlroth's reporting on the global zero-day market: how exploits get bought, by whom, and how the gray-then-black market shapes which vulnerabilities get fixed and which get hoarded.

    Beginner
    4/5Nicole Perlroth
  4. 04 · 2016

    Dark Territory

    Fred Kaplan's policy-side history of US cyber capability, from Reagan-era panic about WarGames to the institutional buildup of NSA's offensive arm and the political fights over its use.

    Beginner
    4/5Fred Kaplan
  5. 05 · 2014

    @War

    Shane Harris on the entanglement of US military doctrine, the intelligence community, and private contractors after cyberspace was declared the fifth warfighting domain.

    Beginner
    4/5Shane Harris
  6. 06 · 2014

    Countdown to Zero Day

    Kim Zetter's investigative reconstruction of Stuxnet, the joint US/Israeli operation that physically damaged Iranian uranium-enrichment centrifuges via a worm, and what its discovery revealed about state-level cyber capability.

    Beginner
    5/5Kim Zetter
  7. 07 · 2011

    Kingpin

    Kevin Poulsen's reconstruction of Max Butler's career — from white-hat consultant to running CardersMarket, the carding forum that consolidated the early-2000s underground — and the FBI investigation that finally took him down.

    Beginner
    5/5Kevin Poulsen
  8. 08 · 2023

    A Hacker's Mind

    Bruce Schneier extends the security-engineering frame of "hacking" to law, finance, politics, and tax: every rule-based system has exploitable seams, and the wealthy and powerful exploit them constantly.

    Beginner
    4/5Bruce Schneier
  9. 09 · 2019

    Cult of the Dead Cow

    Joseph Menn's history of cDc — the Texas-rooted hacking collective that coined 'hacktivism', shipped Back Orifice, and threaded its way through three decades of the security industry's coming-of-age.

    Beginner
    4/5Joseph Menn
  10. 10 · 2019

    Permanent Record

    Edward Snowden's first-person memoir: the technical work that led him into the NSA's mass-surveillance programs, his reasoning for disclosure, and the Hong Kong handoff to the journalists who broke the story.

    Beginner
    4/5Edward Snowden
Back to SandwormWhat to read after Sandworm