//Topic

Best Narrative books

18 books in our catalog cover Narrative, ranked by rating. Each entry is an opinionated review with who the book is for and who should skip it.

  1. 01 · 2020

    The Hacker and the State

    Cyber Attacks and the New Normal of Geopolitics

    Ben Buchanan's argument that state-on-state cyber operations are not deterrence-shaped (like nuclear) but signaling-shaped: countries use cyber to shape the environment, not to threaten escalation. Builds the case from declassified incidents.

    Beginner5/5Ben Buchanan
  2. 02 · 2019

    Sandworm

    A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

    Long-form journalism on the GRU's hacking operations, the best non-technical book on what state-level cyber actually looks like.

    Beginner5/5Andy Greenberg
  3. 03 · 2011

    Kingpin

    How One Hacker Took Over the Billion-Dollar Cybercrime Underground

    Kevin Poulsen's reconstruction of Max Butler's career — from white-hat consultant to running CardersMarket, the carding forum that consolidated the early-2000s underground — and the FBI investigation that finally took him down.

    Beginner5/5Kevin Poulsen
  4. 04 · 1989

    The Cuckoo's Egg

    Tracking a Spy Through the Maze of Computer Espionage

    Clifford Stoll's first-person account of investigating a 75-cent accounting discrepancy at LBNL that turned into a year-long pursuit of a KGB-paid intruder across early-internet networks.

    Beginner5/5Clifford Stoll
  5. 05 · 2023

    A Hacker's Mind

    How the Powerful Bend Society's Rules, and How to Bend Them Back

    Bruce Schneier extends the security-engineering frame of "hacking" to law, finance, politics, and tax: every rule-based system has exploitable seams, and the wealthy and powerful exploit them constantly.

    Beginner4/5Bruce Schneier
  6. 06 · 2021

    This Is How They Tell Me the World Ends

    The Cyberweapons Arms Race

    Nicole Perlroth's reporting on the global zero-day market: how exploits get bought, by whom, and how the gray-then-black market shapes which vulnerabilities get fixed and which get hoarded.

    Beginner4/5Nicole Perlroth
  7. 07 · 2019

    Cult of the Dead Cow

    How the Original Hacking Supergroup Might Just Save the World

    Joseph Menn's history of cDc — the Texas-rooted hacking collective that coined 'hacktivism', shipped Back Orifice, and threaded its way through three decades of the security industry's coming-of-age.

    Beginner4/5Joseph Menn
  8. 08 · 2019

    Permanent Record

    Edward Snowden's first-person memoir: the technical work that led him into the NSA's mass-surveillance programs, his reasoning for disclosure, and the Hong Kong handoff to the journalists who broke the story.

    Beginner4/5Edward Snowden
  9. 09 · 2016

    Dark Territory

    The Secret History of Cyber War

    Fred Kaplan's policy-side history of US cyber capability, from Reagan-era panic about WarGames to the institutional buildup of NSA's offensive arm and the political fights over its use.

    Beginner4/5Fred Kaplan
  10. 10 · 2014

    @War

    The Rise of the Military-Internet Complex

    Shane Harris on the entanglement of US military doctrine, the intelligence community, and private contractors after cyberspace was declared the fifth warfighting domain.

    Beginner4/5Shane Harris
  11. 11 · 2014

    Spam Nation

    The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door

    Brian Krebs's investigative deep-dive into the Russian-speaking pharma-spam economy of the late 2000s — the affiliate networks, the rivalries, and the people who ran them.

    Beginner4/5Brian Krebs
  12. 12 · 2012

    We Are Anonymous

    Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency

    Parmy Olson's reconstruction of LulzSec, AntiSec, and the early-2010s Anonymous moment — the chat logs, the infighting, the Sabu turn, and the FBI takedown that ended the era.

    Beginner4/5Parmy Olson
  13. 13 · 2011

    A Bug Hunter's Diary

    A Guided Tour Through the Wilds of Software Security

    Tobias Klein walks through seven real vulnerabilities he found and exploited, in the form of personal lab notes, what he tried, what failed, and what eventually shipped to vendors.

    Intermediate4/5Tobias Klein
  14. 14 · 2011

    Ghost in the Wires

    My Adventures as the World's Most Wanted Hacker

    Kevin Mitnick's first-person account of his 1990s social-engineering and phone-system intrusions, foreword by Steve Wozniak. Self-promotional in tone but a primary source on a defining era.

    Beginner4/5Kevin Mitnick, William L. Simon
  15. 15 · 2005

    The Art of Intrusion

    The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

    Mitnick and Simon's follow-up to The Art of Deception: third-party stories from working hackers — casino slot exploits, prison-network breaches, post-9/11 intelligence ops — reconstructed and annotated by Mitnick.

    Beginner4/5Kevin Mitnick, William L. Simon
  16. 16 · 2002

    The Art of Deception

    Controlling the Human Element of Security

    Kevin Mitnick and William Simon's case-study collection of social-engineering attacks: PBX scams, helpdesk impersonation, dumpster-diving, the casual lies that sound true. The technology dates the book; the human side is timeless.

    Beginner4/5Kevin Mitnick, William L. Simon
  17. 17 · 2021

    Cyberjutsu

    Cybersecurity for the Modern Ninja

    Ben McCarty maps declassified medieval ninja scrolls onto modern adversary tradecraft. More analogy-driven than technical, useful for security-program framing.

    Beginner3/5Ben McCarty
  18. 18 · 2016

    The Cyber Effect

    A Pioneering Cyberpsychologist Explains How Human Behavior Changes Online

    Mary Aiken's popular-science argument that online environments alter human behavior in measurable ways — escalation, disinhibition, time distortion — and that the security community underestimates the social-engineering surface this opens.

    Beginner3/5Mary Aiken

Related topics