Xakademy
What were the 6 hacker books mentioned in the Hackers movie? EDIT: Since this is the second most popular of my posts and i have just posted something related and maybe even more interesting, people visiting this post, you can consider taking a look at this one, more practical/modern list: The most popular programming aka hacking books on amazon (and their use cases) What were the 6 hacker books mentioned in the film? During a scene in the Cyberdella Cereal (Matthew Lillard) brought some books to give to Phreak (Renoly Santiago). Dade (Jonny Lee Miller) identifies each book as Cereal produces them from his bag. 1 (Green) International UNIX Environments There is not enough information to adequately identify the book but its probably part of the IEEE 1003.1 POSIX (Portable Operating Systems Interface uniX) initially created in 1988. Another possibility could be The X/Open Guide created by a company of the same name (initially published in 1989) which expands on the POSIX. A picture of an early edition of the X/Open Guide can be seen here: http://books.google.com/books?id=u9QmAAAAMAAJ 2 (Orange) Computer Security criteria DOD Standards Trusted Computer System Evaluation Criteria Part of the Rainbow Series books published by the US DoD in the late 80s early 90s. Can be seen here: http://en.wikipedia.org/wiki/File:Orange-book-small.PNG 3 (Pink) Guide to IBM PC`s The Peter Norton Programmer's Guide to the IBM PC by Peter Norton. Dade explains that the book is named after the author wearing a pink shirt on the pink cover of the book. A picture of the book can be seen here: http://en.wikipedia.org/wiki/File:Norton_Guide_to_PC_VGA.jpg 4 Devil book Unix Bible The Design and Implementation of the 4.3BSD Unix Operating System by Samuel J. Leffler, Marshall Kirk McKusick, Michael J. Karels and John S. Quarterman. Known as the Devil book because of the small devil seen on the cover of the original edition published in 1989. 5 Dragon Book Compiler Design Compilers: Principles, Techniques, and Tools by Alfred V. Aho, Monica S. Lam, Ravi Sethi, and Jeffrey D. Ullman Simply named Dragon Book by early computer programmers because of the Dragon depicted on the cover of the earliest edition of the book. 6 (Red) NSA Trusted Networks a.k.a ugly red book Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria Part of the Rainbow Series books published by the US DoD in the late 80s early 90s. Earliest Edition was made in 1987 and featured a red cover.