// Prerequisites

What to read before Tribe of Hackers

If Tribe of Hackers feels too steep at beginner level, here is what to read first. Lighter books in the same topics that build the prerequisites this one assumes.

  1. 01 · 2019

    The Pragmatic Programmer

    Thomas and Hunt's career-defining set of practical heuristics for writing software professionally — orthogonality, broken-windows, DRY, tracer bullets, and the underlying argument that craftsmanship is a posture, not a process.

    Beginner
    5/5David Thomas, Andrew Hunt
  2. 02 · 2014

    Countdown to Zero Day

    Kim Zetter's investigative reconstruction of Stuxnet, the joint US/Israeli operation that physically damaged Iranian uranium-enrichment centrifuges via a worm, and what its discovery revealed about state-level cyber capability.

    Beginner
    5/5Kim Zetter
  3. 03 · 2011

    Kingpin

    Kevin Poulsen's reconstruction of Max Butler's career — from white-hat consultant to running CardersMarket, the carding forum that consolidated the early-2000s underground — and the FBI investigation that finally took him down.

    Beginner
    5/5Kevin Poulsen
  4. 04 · 2019

    Sandworm

    Long-form journalism on the GRU's hacking operations, the best non-technical book on what state-level cyber actually looks like.

    Beginner
    5/5Andy Greenberg
  5. 05 · 1989

    The Cuckoo's Egg

    Clifford Stoll's first-person account of investigating a 75-cent accounting discrepancy at LBNL that turned into a year-long pursuit of a KGB-paid intruder across early-internet networks.

    Beginner
    5/5Clifford Stoll
  6. 06 · 2020

    The Hacker and the State

    Ben Buchanan's argument that state-on-state cyber operations are not deterrence-shaped (like nuclear) but signaling-shaped: countries use cyber to shape the environment, not to threaten escalation. Builds the case from declassified incidents.

    Beginner
    5/5Ben Buchanan
  7. 07 · 2022

    Tracers in the Dark

    Andy Greenberg's investigative narrative of how Bitcoin's allegedly-anonymous public ledger became, in the hands of researchers and federal investigators, the most powerful OSINT tool of the last decade.

    Beginner
    5/5Andy Greenberg
  8. 08 · 2014

    @War

    Shane Harris on the entanglement of US military doctrine, the intelligence community, and private contractors after cyberspace was declared the fifth warfighting domain.

    Beginner
    4/5Shane Harris
Back to Tribe of HackersWhat to read after Tribe of Hackers