skip to main content

DEF CON Hacking Conference

Book List

I have tried to pick out books that form part of a common pool of knowledge of the computer underground. Many people ask me what they should read to try to understand what it's about. This is not meant to be an exhaustive list, just enough to raise your curiosity.

Computer Reference

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
Mark Dowd, John McDonald, Justin Schuh ISBN-13: 978-0321444424

Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions by Slava Gomzin

The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy
Patrick Engebretson, ISBN-13: 978-0124116443

Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Ivan Ristic, ISBN-13: 978-1907117046

Compilers: Principles, Techniques, and Tools
Alfred V. Aho, Monica S. Lam, Ravi Sethi, Jeffrey D. Ullman ISBN-13: 978-0201100884

Computer Networks (5th Edition)
Andrew S. Tennebaum, ISBN-13: 978-0132126953

Cracking the Coding Interview: 150 Programming Questions and Solutions
Gayle Laakmann McDowell, ISBN-13: 978-0984782802

The Hacker Playbook: Practical Guide To Penetration Testing
Peter Kim, ASIN: B00N4FG6TW

Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson, ISBN-13: 978-1593271442 , available in paperback

Introduccion Teorico-Practica a la Programacion Web. Volumen I (Spanish Edition)
Juan Enrique Lombardi, ISBN-13: 978-1597546324

Learn You a Haskell for Great Good!: A Beginner's Guide
Miran Lipovaca, ISBN-13: 978-1593272838

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Michael Sikorski and Andrew Honig, ISBN-13: 978-1593272906

Python Essential Reference (4th Edition)
David M. Beazley, ISBN-13: 978-0672329784

Rtfm: Red Team Field Manual
Ben Clark, ISBN-13: 978-0321444424

Secrets of a Buccaneer-Scholar: How Self-Education and the Pursuit of Passion Can Lead to a Lifetime of Success
James Marcus Bach, ISBN-13: 978-1439109090

Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD
Ryan Russel, Ido Dubrawsky, FX, Joe Grand, Tim Mullen, ASIN: B006NV2EGI

The Tangled Web: A Guide to Securing Modern Web Applications
Michael Zalewski, ISBN-13: 978-1593273880

TCP/IP Illustrated, Volume 1: The Protocols (2nd Edition) (Addison-Wesley Professional Computing Series)
Kevin Fall and W. Richard Stevens, ISBN-13: 978-0321336316

top of the page

Cyber Punk

William Gibson
The person who coined the term "Cyberspace" in the phenomenal book Neuromancer. We try and get him at DEF CON each year, if we could only get past his agent!
Neuromancer
Count Zero
Mona Lisa Overdrive
Burning Chrome
The Difference Engine
Virtual Light
Idoru

Bruce Sterling
Islands in the Net
Heavy Weather
Schismatrix Plus (Complete Shapers-Mechanists Universe): Includes Schismatrix and Selected Stories from Crystal Express, ISBN 0441003702

Phillip K. Dick
His story 'Do Androids Dream of Electric Sheep' inspired the majestic dystopia of Ridley Scott's 'Blade Runner'. That sinking feeling that the world you can see is not the true world? That's PKD country.
Do Androids Dream of Electric Sheep?
A Scanner Darkly
Selected Stories of Philip K. Dick
The VALIS Trilogy
Retrofitting Blade Runner: Issues in Ridley Scott's Blade Runner and Phillip K. Dick's Do Androids Dream of Electric Sheep?
Future Noir: The Making of Blade Runner

Neal Stephenson
What can I say? All of these books are excellent all for different reasons.
Snow Crash
The Diamond Age, or, A Young Lady's Illustrated Primer
Interface
In the Beginning...was the Command Line
Cryptonomicon
Zodiac( The Eco-Thriller)

Vernor Vinge
You will notice similarities between the excellent True Names and Neuromancer
True Names...and Other Dangers
True Names: And the Opening of the Cyberspace Frontier

D.F. Jones
Colossus
Colossus And Crab
The Fall of Colossus
Colossus the Forbin Project
Colossus Triology: Colossus, The Fall of Colossus and Colossus and the Crab

Mel Odom
Lethal Interface

George Orwell
1984 (Signet Classics)

William C. Dietz
Legion of the Damned
Bodyguard

Aldous Leonard Huxley
Brave New World and Brave New World Revisited

Frederick Pohl
Man Plus
Mars Plus

top of the page

A peek behind the curtains...

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon by Kim Zetter

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers by Kevin Mitnick

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State by Glenn Greenwald

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen

Corporate Espionage: What It Is, Why It's Happening in Your Company, What You Must Do About It by Ira Winkler

Information Warfare: Chaos on the Electronic Superhighway by Winn Schwartau

Social Engineering: The Art of Human Hacking by Christopher Hadnagy

Spy Catcher: The Candid Autobiography of a Senior Intelligence Officer by Peter Wright

The spy catcher trial: The scandal behind the #1 best seller by Malcolm Turnbull

Skunk Works: A Personal Memoir of My Years at Lockheed by Ben Rich

Inside the CIA: Revealing the Secrets of the World's Most Powerful Spy Agency by Ronald Kessler

The FBI: Inside the World's Most Powerful Law Enforcement Agency by Ronald Kessler

The Puzzle Palace: Inside the National Security Agency, America's Most Secret Intelligence Organization by James Bamford

The Mossad: Israel's Secret Intelligence Service: Inside Stories by Dennis Eisenberg

A Man Called Intrepid: The Secret War by William Stevenson

Inside CIA's Private World: Declassified Articles from the Agency`s Internal Journal, 1955-1992 by H. Bradford Westerfield

A Century of Spies: Intelligence in the Twentieth Century by Jeffrey T. Richelson

Che Guevara and the FBI: U.S. Political Police Dossier on the Latin American Revolutionary by Michael Ratner

Privacy on the Line: The Politics of Wiretapping and Encryption by Whitfield Diffie, Susan Landau

Friendly Spies: How America's Allies Are Using Economic Espionage to Steal Our Secrets by Peter Schweizer

War by Other Means: Economic Espionage in America by John J. Fialka

Competitive Intelligence : How to Gather, Analyze, and Use Information to Move Your Business to the Top by Larry Kahaner

top of the page

Unconventional Information

RFID: MIFARE and Contactless Cards in Application by Gerhard Schalk

Credit Power!: Rebuild Your Credit in 90 Days or Less by John Q. Newman

How to Investigate Your Friends, Enemies, and Lovers by Trent Sands, John Q. Newman

Privacy Power: Protecting Your Personal Privacy in the Digital Age by Trent Sands

The Underground Database (The Electronic Underground, Vol 1)

Level 4: Virus Hunters of the CDC by Joseph B. McCormack, Susan Fischer-Hoch

Smart Casino Gambling: How to Win More and Lose Less by Olaf Vancura

Cheating at Blackjack Squared: The Dark Side of Gambling by Dustin D. Marks

The Ultimate Scanner: Cheek 3 by Bill Cheek

Radio Monitoring: The How-To Guide by T.J. Arey

Scanner Modifications And Antennas by Jerry Pickard

Scanners And Secret Frequencies (Electronic Underground S) by Henry Eisenson

Smart Drugs II (Smart Drug Series, V. 2) by Ward Dean, John Morgenthaler, Steven Fowkes

Smart Card Developer's Kit by Scott Guthery, Timothy Jurgensen

top of the page

Underground Culture

Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard Criminals by Paul Mungo and Bryan Clough

At Large: The Strange Case of the World's Biggest Internet Invasion by David Freedman and Charles Mann

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage by Cliff Stoll

Cyberpunk: Outlaws and Hackers on the Computer Frontier by Katie Hafner and John Markhoff

The Cyberthief and the Samurai by Jeff Goodell

The Fugitive Game: Online with Kevin Mitnick by Jonathan Littman

The Hacker Crackdown: Law And Disorder On The Electronic Frontier by Bruce Sterling

Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition by Steven Levy

Masters of Deception: The Gang That Ruled Cyberspace by Michele Slatalla and Joshua Quittner

Out of the Inner Circle: The True Story of a Computer Intruder Capable of Cracking the Nation's Most Secure Computer Systems (Tempus) by Bill Landreth

Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw - By the Man Who Did It by John Markhoff and Tsutomu Shimomura

The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen by Jonathan Littman

Where Wizards Stay Up Late: The Origins Of The Internet by Katie Hafner

top of the page