// Prerequisites
What to read before Sandworm
If Sandworm feels too steep at beginner level, here is what to read first. Lighter books in the same topics that build the prerequisites this one assumes.
01 · 1989
The Cuckoo's Egg
Clifford Stoll's first-person account of investigating a 75-cent accounting discrepancy at LBNL that turned into a year-long pursuit of a KGB-paid intruder across early-internet networks.
Beginner5/5Clifford Stoll02 · 2020
The Hacker and the State
Ben Buchanan's argument that state-on-state cyber operations are not deterrence-shaped (like nuclear) but signaling-shaped: countries use cyber to shape the environment, not to threaten escalation. Builds the case from declassified incidents.
Beginner5/5Ben Buchanan03 · 2014
@War
Shane Harris on the entanglement of US military doctrine, the intelligence community, and private contractors after cyberspace was declared the fifth warfighting domain.
Beginner4/5Shane Harris04 · 2016
Dark Territory
Fred Kaplan's policy-side history of US cyber capability, from Reagan-era panic about WarGames to the institutional buildup of NSA's offensive arm and the political fights over its use.
Beginner4/5Fred Kaplan05 · 2021
This Is How They Tell Me the World Ends
Nicole Perlroth's reporting on the global zero-day market: how exploits get bought, by whom, and how the gray-then-black market shapes which vulnerabilities get fixed and which get hoarded.
Beginner4/5Nicole Perlroth06 · 2014
Countdown to Zero Day
Kim Zetter's investigative reconstruction of Stuxnet, the joint US/Israeli operation that physically damaged Iranian uranium-enrichment centrifuges via a worm, and what its discovery revealed about state-level cyber capability.
Beginner5/5Kim Zetter07 · 2011
Kingpin
Kevin Poulsen's reconstruction of Max Butler's career — from white-hat consultant to running CardersMarket, the carding forum that consolidated the early-2000s underground — and the FBI investigation that finally took him down.
Beginner5/5Kevin Poulsen08 · 2023
A Hacker's Mind
Bruce Schneier extends the security-engineering frame of "hacking" to law, finance, politics, and tax: every rule-based system has exploitable seams, and the wealthy and powerful exploit them constantly.
Beginner4/5Bruce Schneier