Most Read This Week In Hackers


Most Read This Week Tagged "Hackers"

Sidetracked (Mindf*ck, #2)
Coders: The Making of a New Tribe and the Remaking of the World
Breaking And Entering: The Extraordinary Story of a Hacker Called "Alien"
White-Hot Hack (Kate and Ian, #2)
Playing With Fire (#Hacker, #1)
@War: The Rise of the Military-Internet Complex
Kill Process (Kill Chain, #1)
Black Dawn (Titan, #6)
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Immoral Code
HACKING WITH SMART PHONES
Threat Modeling: Designing for Security
Ethical Hacking and Penetration Testing Guide
Zero Hour (Wired & Dangerous, #1)
Tor and the Dark Art of Anonymity (deep web, kali linux, hacking, bitcoins) : Network Security for the Rest of Us
The Hardware Hacker: Adventures in Making and Breaking Hardware
The Browser Hacker's Handbook
Penetration Testing: A Hands-On Introduction to Hacking
Exploited (Zero Day, #1)
In Too Deep (#Hacker, #2)
The Book of PoC||GTFO
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Kali Linux Wireless Penetration Testing: Beginner's Guide: Learn to penetrate Wi-Fi and wireless networks to secure your system from vulnerabilities
Ones and Zeroes (Mirador, #2)
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
How to Hack: Hacking Secrets Exposed: A Beginner's Guide
Digital Horizon (#Hacker, #3)
Darkest Night (Wired & Dangerous, #2)
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
A Geek Girl's Guide to Murder (Geek Girl Mysteries, #1)
dotwav
Sweetest Surrender (The Serafina: Sin City, #3)
Dangerous Surrender (The Serafina: Sin City, #4)
The Hacker Playbook 2: Practical Guide To Penetration Testing
Echoes
The Maker's Guide to the Zombie Apocalypse: Defend Your Base with Simple Circuits, Arduino, and Raspberry Pi
Trust Me (Find Me, #3)
Don't Let Go (PERSEFoNE, #3)
Red Team Field Manual
The Coming Swarm: DDOS Actions, Hacktivism, and Civil Disobedience on the Internet
Unmasking the Social Engineer: The Human Element of Security
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
The Hacker Playbook: Practical Guide to Penetration Testing
The Perfect Weapon: How the Cyber Arms Race Set the World Afire
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Remember Me (Find Me, #2)
Black Hat Python: Python Programming for Hackers and Pentesters
Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance

Jean Baudrillard
People tell you the computer is just a handier, more complex kind of typewriter. But that isn't true. The typewriter is an entirely external object. The page floats free, and so do I. I have a physical relation to writing. I touch the blank or written page with my eyes - something I cannot do with the screen. The computer is a prosthesis. I have a tactile, intersensory relation to it. I become, myself, an ectoplasm of the screen. And this, no doubt, explains, in this incubation of the virtual im ...more
Jean Baudrillard, The Intelligence of Evil or the Lucidity Pact

Juan  Zamora
10 97 (arrived at scene) military officer Sim here, I have a man with a cyber 10 29f (Cyber felony)." "10 26 (Clear)" "10 12 (Be discrete, visitors are present)" "10 4 (Understood) ...more
Juan Zamora, The Trillion Dollar Cow

More quotes...
Talking about books HN is reading. Personal additions are of course welcome.
3 members, last active 9 years ago
The Hacker Book Club We meet virtually to read books written by someone in the hacker community. Authors may join onc…more
441 members, last active 3 years ago
Aphelion A group to read, absorb, and discuss knowledge from professionals in the Financial Technology in…more
1 member, last active 3 years ago
Gruppo di discussione su testi concernenti hackers, sicurezza, malware, exploit, rootkit, apt, w…more
1 member, last active 7 years ago

Tags

Tags contributing to this page include: hackers, hacker, and hacking