|
2 | 2 |
|
3 | 3 | ## Books that I'm going to read next
|
4 | 4 |
|
5 |
| -* `Kim Zetter` Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon |
| 5 | +* `Christof Paar` Understanding Cryptography: A Textbook For Students And Practitioners |
6 | 6 | * `Ray Bradbury` Fahrenheit 451
|
7 | 7 | * `Ted Chiang` Stories of Your Life and Others
|
8 | 8 | * `Lee Harper` To Kill a Mockingbird
|
9 | 9 | * `Chris Hadfield` An Astronaut's Guide to Life on Earth
|
10 |
| -* `Noam Chomsky` Understanding Power [media] |
11 |
| -* `Bruce Schneier` Data and Goliath [technology, surveillance] |
12 |
| -* `Lawrence Lessig` Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity [open source, media] |
13 |
| -* `Andreas C. Mueller, Sarah Guido` Introduction to Machine Learning with Python [machine learning, programming] |
14 |
| -* `Michael Weiss, Hassan Hassan` ISIS: Inside the Army of Terror [terrorism, security] |
15 | 10 | * `Aldous Huxley` Brave New World
|
16 | 11 | * `Sara Nović` Girl at War
|
| 12 | +* `Andrew Hodges` Alan Turing: The Enigma [biography, technology, history] |
| 13 | +* `Andreas C. Mueller, Sarah Guido` Introduction to Machine Learning with Python [machine learning, programming] |
| 14 | +* `Michael Weiss, Hassan Hassan` ISIS: Inside the Army of Terror [terrorism, security] |
17 | 15 | * `David Mitchell` Cloud Atlas [novel]
|
18 | 16 | * `Gabriella Coleman` Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous [technology, hacking]
|
19 |
| -* `Andrew Hodges` Alan Turing: The Enigma [biography, technology, history] |
20 |
| -* `Marc Goodman` Future Crimes: Everything Is Connected, Everyone Is Vulnerable, and What We Can Do About It |
21 |
| -* `Dave Maass` Pwning Tomorrow |
22 |
| -* `Neal Stephenson` Seveneves |
23 | 17 | * `George Orwell` All Art is Propaganda: Critical Essays [media]
|
24 | 18 | * `Jonathan L. Zittrain` The Future of the Internet and How to Stop It
|
25 |
| -* `Finn Brunton, Helen Nissenbaum` Obfuscation: A User's Guide for Privacy and Protest |
| 19 | +* `Dennis Wheatley` The Deception Planners: My Secret War |
| 20 | +* `Ryan Holiday` Trust Me, I'm Lying: Confessions of a Media Manipulator |
| 21 | +* `Brian Krebs` Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door |
| 22 | +* `Dafydd Stuttard, Marcus Pinto` The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws |
| 23 | +* `Tim Urban` Wait But Why Year One: We finally figured out how to put a blog onto an e-reader |
| 24 | +* `Neil Geiman` American Gods #1 |
26 | 25 |
|
27 | 26 | ## Books to Consider Adding to To-Read List
|
28 | 27 |
|
| 28 | +* `Bruce Schneier` Data and Goliath [technology, surveillance] |
29 | 29 | * `Carl Sagan, Ann Druyan` The Varieties of Scientific Experience: A Personal View of the Search for God
|
30 | 30 | * `Dan Riley` Generation Atheist
|
| 31 | +* `Dave Maass` Pwning Tomorrow |
31 | 32 | * `Dean Baker` False Profits: Recovering from the Bubble Economy
|
| 33 | +* `Finn Brunton, Helen Nissenbaum` Obfuscation: A User's Guide for Privacy and Protest |
32 | 34 | * `Jim Whitehurst` The Open Organization: Igniting Passion and Performance
|
| 35 | +* `Lawrence Lessig` Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity [open source, media] |
| 36 | +* `Marc Goodman` Future Crimes: Everything Is Connected, Everyone Is Vulnerable, and What We Can Do About It |
33 | 37 | * `Matt Taibbi, Mark Ames` The eXile: Sex, Drugs and Libel in the New Russia
|
34 | 38 | * `Maurer` The Big Con: The Story of the Confidence Man
|
| 39 | +* `Neal Stephenson` Seveneves |
| 40 | +* `Noam Chomsky` Understanding Power [media] |
35 | 41 | * `Scott McCloud` Making Comics: Storytelling Secrets of Comics, Manga and Graphic Novels
|
36 | 42 | * `Ted Chiang` The Lifecycle of Software Objects
|
0 commit comments