HackerNews Readings
40,000 HackerNews book recommendations identified using NLP and deep learning

Scroll down for comments...

Life 3.0: Being Human in the Age of Artificial Intelligence

Max Tegmark, Rob Shapiro, et al.

4.5 on Amazon

12 HN comments

Quantum Computing: An Applied Approach

Jack D. Hidary

4.5 on Amazon

11 HN comments

UNIX and Linux System Administration Handbook

Evi Nemeth, Garth Snyder, et al.

4.7 on Amazon

11 HN comments

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

Michael Sikorski and Andrew Honig

4.7 on Amazon

11 HN comments

Trust Me, I'm Lying: Confessions of a Media Manipulator

Ryan Holiday and Penguin Audio

4.4 on Amazon

11 HN comments

Building Microservices: Designing Fine-Grained Systems

Sam Newman

4.5 on Amazon

10 HN comments

C++ Concurrency in Action

Anthony Williams

4.7 on Amazon

10 HN comments

Serious Cryptography: A Practical Introduction to Modern Encryption

Jean-Philippe Aumasson

4.7 on Amazon

10 HN comments

Theory of Fun for Game Design

Raph Koster

4.3 on Amazon

10 HN comments

The Model Thinker: What You Need to Know to Make Data Work for You

Scott E. Page, Jamie Renell, et al.

4.5 on Amazon

10 HN comments

Making Things Happen: Mastering Project Management (Theory in Practice)

Scott Berkun

4.4 on Amazon

10 HN comments

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

Andy Greenberg, Mark Bramhall, et al.

4.7 on Amazon

10 HN comments

Designing Distributed Systems: Patterns and Paradigms for Scalable, Reliable Services

Brendan Burns

4.3 on Amazon

9 HN comments

High Performance Python: Practical Performant Programming for Humans

Micha Gorelick and Ian Ozsvald

4.8 on Amazon

9 HN comments

JavaScript: The Definitive Guide: Master the World's Most-Used Programming Language

David Flanagan

4.7 on Amazon

9 HN comments

Prev Page 6/16 Next
Sorted by relevance

quack01onJan 7, 2020

Really enjoyed "The Idea Factory". I'm currently reading "Sandworm" - more cybersecurity related, but it's really good so far.

AaronstotleonDec 14, 2020

I'd highly recommend Sandworm by Andy Greenberg for more information about Russia's hacking capabilities.

rezgionFeb 19, 2020

Thanks, that looks like an interesting read after I'm done with Sandworm by Andy Greenberg (also a good read)

thinkmassiveonMar 30, 2021

Some books I recently enjoyed, mostly focused on the infosec aspect but still somewhat on topic:

The Kill Chain, by Christian Brose

Active Measures, by Thomas Rid

Sandworm, by Andy Greenberg

Fatal System Error, by Joseph Mann

igouonJune 21, 2021

I feel like as somebody that works in tech, infosec media tends to feel too dense, or overdramatised (nothing against the BBC writers, I don't expect them to be super technical)

The best middleground I found was Sandworm by Andy Greenberg. Does anybody know of similar works?

merlinscholzonJan 16, 2021

The book Sandworm by Andy Greenberg also goes a little into depth about attacking powerplants and other industrial control systems. Can highly recommend!

ancantusonMay 16, 2021

I've enjoyed "Sandworm" by Andy Greenberg (around the Russian GRU organization) and "Countdown to Zero Day" by Kim Zetter (around Stuxnet)

cooervoonDec 18, 2020

Since their HQ is in Russia is no one else concerned that their IDE may be subject to Russian spying?

I mean, I'm currently reading the book Sandworm. And it is known in the cybersecurity world that Russia coerces or intimidates companies and devs to work for them as spies.

tlowrimoreonOct 13, 2020

To an extent, you are correct: many countries participate in the cyber-spy/cyber-espionage game. Where, perhaps, you are incorrect is that this is normal. The GRU has lead exceptionally aggressive cyber-attacks on just about everyone, particularly Estonia and Ukraine.

If you're interested in this topic, I'd like to suggest the wondeful (and terrifying) book, Sandworm (https://www.amazon.com/Sandworm-Cyberwar-Kremlins-Dangerous-...) by Andy Greenberg.

smithzaonDec 8, 2020

Honestly, system user education/awareness goes even further. Iran nuclear facilities used an airgap but it was social engineering that was the weakest attack vector for Stuxnet to exploit. Same with the South Korean Winter Olympics; a phishing email with a macro embedded Word doc got them in there.

A great book on Russian, state-backed hacking group was by a senior Wired writer, Andy Greenberg, called "Sandworm" [0]

[0] https://www.amazon.com/Sandworm-Cyberwar-Kremlins-Dangerous-...

Built withby tracyhenry

.

Follow me on