9 best-selling hackers books like No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing by Johnny Long

Cover of No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing by Johnny Long

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

By: Johnny Long

3.94

Format: 384 pages, Paperback

Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in…

If you liked the hackers plot in No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing by Johnny Long , here is a list of 9 books like this:

Cover of Haunted by Chuck Palahniuk

1. Haunted

By: Chuck Palahniuk

3.59

Format: 419 pages, Paperback

Haunted is a novel made up of stories: twenty-three of the most horrifying, hilarious, mind-blowing… read more

Similar categories in Chuck Palahniuk's Haunted book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

"A book is as private and consensual as sex."

-Chuck Palahniuk, Haunted

"Some stories, you use up. Others use you up."

-Chuck Palahniuk, Haunted

"As the French say, who doesn't like getting their butt sucked?"

-Chuck Palahniuk, Haunted

"As human beings, our first commandment is: Something needs to happen"

-Chuck Palahniuk, Haunted

Cover of Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz

2. Black Hat Python: Python Programming for Hackers and Pentesters

By: Justin Seitz

4.08

Format: 171 pages, Paperback

When it comes to creating powerful and effective hacking tools, Python is the language of choice fo… read more

Similar categories in Justin Seitz's Black Hat Python: Python Programming for Hackers and Pentesters book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

  • hackers
  • nonfiction
  • technical
  • computer science
  • technology
Cover of The Ones Who Walk Away from Omelas by Ursula K. Le Guin

3. The Ones Who Walk Away from Omelas

By: Ursula K. Le Guin

4.37

Format: 32 pages, Library Binding

Some inhabitants of a peaceful kingdom cannot tolerate the act of cruelty that underlies its happin… read more

Similar categories in Ursula K. Le Guin's The Ones Who Walk Away from Omelas book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

"Would you walk away from Omelas?"

-Ursula K. Le Guin, The Ones Who Walk Away from Omelas

"Only pain is intellectual, only evil interesting."

-Ursula K. Le Guin, The Ones Who Walk Away from Omelas

"But they seem to know where they are going, the ones who walk away from Omelas."

-Ursula K. Le Guin, The Ones Who Walk Away from Omelas

"Of course I didn’t read James and sit down and say, Now I’ll write a story about that “lost soul."

-Ursula K. Le Guin, The Ones Who Walk Away from Omelas

Cover of Rtfm: Red Team Field Manual by Ben Clark

4. Rtfm: Red Team Field Manual

By: Ben Clark

4.35

Format: None pages,

read more

Similar categories in Ben Clark's Rtfm: Red Team Field Manual book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

  • hackers
  • nonfiction
  • technical
  • computer science
  • technology
Cover of Hacking: The Art of Exploitation by Jon Erickson

5. Hacking: The Art of Exploitation

By: Jon Erickson

4.04

Format: 192 pages, Paperback

A comprehensive introduction to the techniques of exploitation and creative problem-solving methods… read more

Similar categories in Jon Erickson's Hacking: The Art of Exploitation book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

  • hackers
  • nonfiction
  • technical
  • computer science
  • technology
Cover of Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software by Michael Sikorski, Andrew Honig

6. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

By: Michael Sikorski , Andrew Honig

3.95

Format: 161 pages, Paperback

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your… read more

Similar categories in Michael Sikorski's Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

  • computer science
  • hackers
  • nonfiction
  • technology
Cover of The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws by Dafydd Stuttard, Marcus Pinto

7. The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

By: Dafydd Stuttard , Marcus Pinto

4.00

Format: 142 pages, Paperback

This book is a practical guide to discovering and exploiting security flaws in web applications. Th… read more

Similar categories in Dafydd Stuttard's The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

  • hackers
  • nonfiction
  • technical
  • computer science
  • technology
Cover of The Idiot by Fyodor Dostoevsky, Constance Garnett, Joseph Frank, Alan Myers, Anna Brailovsky

8. The Idiot

By: Fyodor Dostoevsky , Constance Garnett , Joseph Frank , Alan Myers , Anna Brailovsky

4.21

Format: 667 pages, Paperback

Returning to Russia from a sanitarium in Switzerland, the Christ-like epileptic Prince Myshkin find… read more

Similar categories in Fyodor Dostoevsky's The Idiot book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

"I'm drunk but truthful."

-Fyodor Dostoevsky, The Idiot

"Beauty will save the world."

-Fyodor Dostoevsky, The Idiot

"The Russian soul is a dark place."

-Fyodor Dostoevsky, The Idiot

"She is passion embodied, a flower of melodrama in eternal bloom."

-Fyodor Dostoevsky, The Idiot

9. The 48 Laws of Power

By: Robert Greene , Joost Elffers

4.32

Format: 318 pages, Paperback

This amoral, cunning, ruthless, and instructive book synthesizes the philosophies of Machiavelli, S… read more

Similar categories in Robert Greene's The 48 Laws of Power book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

10. The Pragmatic Programmer: From Journeyman to Master

By: Dave Thomas , Andy Hunt

3.28

Format: 404 pages, Paperback

-- Ward Cunningham Straight from the programming trenches, The Pragmatic Programmer cuts through th… read more

Similar categories in Dave Thomas's The Pragmatic Programmer: From Journeyman to Master book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

11. The 10X Rule: The Only Difference Between Success and Failure

By: Grant Cardone

3.60

Format: None pages,

Achieve "Massive Action" results and accomplish your business dreams!While most people operate with… read more

Similar categories in Grant Cardone's The 10X Rule: The Only Difference Between Success and Failure book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

12. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

By: Clifford Stoll

4.15

Format: 200 pages,

read more

Similar categories in Clifford Stoll's The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

Cover of Catch-22 by Joseph Heller

13. Catch-22

By: Joseph Heller

3.99

Format: 453 pages, Paperback

Fifty years after its original publication, Catch-22 remains a cornerstone of American literature a… read more

Similar categories in Joseph Heller's Catch-22 book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

"Nately had a bad start. He came from a good family."

-Joseph Heller, Catch-22

"When people disagreed with him he urged them to be objective."

-Joseph Heller, Catch-22

"Just because you're paranoid doesn't mean they aren't after you."

-Joseph Heller, Catch-22

"They’re not going to send a crazy man out to be killed, are they?"

-Joseph Heller, Catch-22

14. Gray Hat Python: Python Programming for Hackers and Reverse Engineers

By: Justin Seitz

4.50

Format: None pages, Paperback

Python is fast becoming the programming language of choice for hackers, reverse engineers, and soft… read more

Similar categories in Justin Seitz's Gray Hat Python: Python Programming for Hackers and Reverse Engineers book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

Cover of This Is Not Propaganda: Adventures in the War Against Reality by Peter Pomerantsev

15. This Is Not Propaganda: Adventures in the War Against Reality

By: Peter Pomerantsev

4.04

Format: 236 pages, Hardcover

Learn how the perception of truth has been weaponized in modern politics with this “insightful” acc… read more

Similar categories in Peter Pomerantsev's This Is Not Propaganda: Adventures in the War Against Reality book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

  • nonfiction
  • psychology
  • technology
"З багатьох поглядів Ігорю пощастило. Він мав видимість вибору. Майор чітко дав зрозуміти, що він проведе сім років у в’язниці і п’ять на засланні у радянських загумінках, якщо залишиться. Якби він бу…"

-Peter Pomerantsev, This Is Not Propaganda: Adventures in the War Against Reality

"The display, which was called 'Can Democracy Survive the Internet?' was dedicated to a 'global election management' company called Cambridge Analytica. Cambridge Analytica claimed to have gathered 5,…"

-Peter Pomerantsev, This Is Not Propaganda: Adventures in the War Against Reality

"Some of the farm's work reached a level of granularity that stunned Lyudmilla. Two trolls would go on the comments sections of small' provincial newspapers and start chatting about the street they li…"

-Peter Pomerantsev, This Is Not Propaganda: Adventures in the War Against Reality

"Conspiracy theories have long been used to maintain power: the Soviet leadership saw capitalist and counter-revolutionary conspiracies everywhere; the Nazis, Jewish ones. But those conspiracies were …"

-Peter Pomerantsev, This Is Not Propaganda: Adventures in the War Against Reality

Cover of Winners Take All: The Elite Charade of Changing the World by Anand Giridharadas

16. Winners Take All: The Elite Charade of Changing the World

By: Anand Giridharadas

4.14

Format: 288 pages, Hardcover

An insider's groundbreaking investigation of how the global elite's efforts to "change the world" p… read more

Similar categories in Anand Giridharadas's Winners Take All: The Elite Charade of Changing the World book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

  • nonfiction
"For every thought leader who offered advice on how to build a career in a merciless new economy, there were many less-heard critics aspiring to make the economy less merciless."

-Anand Giridharadas, Winners Take All: The Elite Charade of Changing the World

"To question the doing-well-by-doing-good globalists is not to doubt their intentions or results, rather it is to say that even when all those things are factored in, something is not quite right."

-Anand Giridharadas, Winners Take All: The Elite Charade of Changing the World

"Walker had broken what in his circles were important taboos: Inspire the rich to do more good, but never, ever tell them to do less harm; inspire them to give back, but never, ever tell them to take …"

-Anand Giridharadas, Winners Take All: The Elite Charade of Changing the World

"And what these winners wanted was for the world to be changed in ways that had their buy-in—think charter schools over more equal public school funding, or poverty-reducing tech companies over antitr…"

-Anand Giridharadas, Winners Take All: The Elite Charade of Changing the World

Cover of Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency by Andy Greenberg

17. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency

By: Andy Greenberg

4.50

Format: 367 pages, Hardcover

Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrenc… read more

Similar categories in Andy Greenberg's Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

  • nonfiction
  • technology
Cover of The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War by Geoff    White

18. The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War

By: Geoff White

4.14

Format: 304 pages, Paperback

In 2014, Sony Pictures Entertainment was brutally hacked, with thousands of computers wiped and the… read more

Similar categories in Geoff White's The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

  • hackers
  • nonfiction
  • technology
Cover of Metasploit: The Penetration Tester's Guide by David  Kennedy

19. Metasploit: The Penetration Tester's Guide

By: David Kennedy

4.06

Format: 328 pages, Paperback

"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit ProjectThe Metas… read more

Similar categories in David Kennedy's Metasploit: The Penetration Tester's Guide book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

  • hackers
  • nonfiction
  • technical
  • computer science
  • technology
Cover of No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing by Johnny Long

20. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

By: Johnny Long

3.94

Format: 384 pages, Paperback

Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in… read more

Similar categories in Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

  • psychology
  • hackers
  • nonfiction
  • technical
  • computer science
  • technology
Cover of Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning by Gordon Fyodor Lyon

21. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning

By: Gordon Fyodor Lyon

4.35

Format: 464 pages, Paperback

Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source ut… read more

Similar categories in Gordon Fyodor Lyon's Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning book and Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

  • hackers
  • nonfiction
  • technical
  • computer science
  • technology

12 Best nonfiction books like No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing by Johnny Long

Transform Your Habits

Black Hat Python: Python Programming for Hackers and Pentesters

Justin Seitz

4.08

Transform Your Habits

Rtfm: Red Team Field Manual

Ben Clark

4.35

Transform Your Habits

Hacking: The Art of Exploitation

Jon Erickson

4.04

Transform Your Habits

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

Michael Sikorski , Andrew Honig

3.95

View all the books

14 Best nonfiction books like Metasploit: The Penetration Tester's Guide by David Kennedy

Transform Your Habits

Black Hat Python: Python Programming for Hackers and Pentesters

Justin Seitz

4.08

Transform Your Habits

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Kevin D. Mitnick , William L. Simon , Steve Wozniak

4.12

Transform Your Habits

Hacking: The Art of Exploitation

Jon Erickson

4.04

Transform Your Habits

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

Michael Sikorski , Andrew Honig

3.95

View all the books

Never miss a story from us, get weekly updates in your inbox.