Xakademy



What were the 6 hacker books mentioned in the Hackers movie?

EDIT: Since this is the second most popular of my posts and i have just posted something related and maybe even more interesting, people visiting this post, you can consider taking a look at this one, more practical/modern list:

The most popular programming aka hacking books on amazon (and their use cases)


What were the 6 hacker books mentioned in the film?

During a scene in the Cyberdella Cereal (Matthew Lillard) brought some books to give to Phreak (Renoly Santiago). Dade (Jonny Lee Miller) identifies each book as Cereal produces them from his bag.

1 (Green) International UNIX Environments

There is not enough information to adequately identify the book but its probably part of the IEEE 1003.1 POSIX (Portable Operating Systems Interface uniX) initially created in 1988. Another possibility could be The X/Open Guide created by a company of the same name (initially published in 1989) which expands on the POSIX. A picture of an early edition of the X/Open Guide can be seen here: http://books.google.com/books?id=u9QmAAAAMAAJ

2 (Orange) Computer Security criteria DOD Standards

Trusted Computer System Evaluation Criteria

Part of the Rainbow Series books published by the US DoD in the late 80s early 90s. Can be seen here: http://en.wikipedia.org/wiki/File:Orange-book-small.PNG

3 (Pink) Guide to IBM PC`s

The Peter Norton Programmer's Guide to the IBM PC by Peter Norton.

Dade explains that the book is named after the author wearing a pink shirt on the pink cover of the book. A picture of the book can be seen here: http://en.wikipedia.org/wiki/File:Norton_Guide_to_PC_VGA.jpg

4 Devil book Unix Bible

The Design and Implementation of the 4.3BSD Unix Operating System by Samuel J. Leffler, Marshall Kirk McKusick, Michael J. Karels and John S. Quarterman.

Known as the Devil book because of the small devil seen on the cover of the original edition published in 1989.

5 Dragon Book Compiler Design

Compilers: Principles, Techniques, and Tools by Alfred V. Aho, Monica S. Lam, Ravi Sethi, and Jeffrey D. Ullman

Simply named Dragon Book by early computer programmers because of the Dragon depicted on the cover of the earliest edition of the book.

6 (Red) NSA Trusted Networks a.k.a ugly red book

Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria

Part of the Rainbow Series books published by the US DoD in the late 80s early 90s. Earliest Edition was made in 1987 and featured a red cover.

Some other IT books

1977 - Lions' Commentary on UNIX 6th Edition, with Source Code
(Preface/Intro) 1994 - Unix Haters Handbook (C++)
1995 - The Mythical Man-Month (Myth Man-Month/No Silver Bullet)
1999 - Pragmatic Programmer (Quick Reference)
1999 - Peopleware 2nd (Let's Talk about Leadership)
2003 - The Art of Unix Programming (Languages [To C or not to C])
2005 - PHP and MySQL Web Development, 4 th
(Accessing Your MySQL Database from the Web with PHP)
2010 - Hackers and Painters
(Beating the averages, Revenge of the nerds, The hundred year
language)
2012 - Sams Teach Yourself SQL in 10 Minutes 3rd (Retrieving Data)
2014 - Modern Operating Systems (Case study: Vista)
Further reading
1984 - The C programming language (K&R)
1993 - Mindstorms
1997 - Little Java, A few patterns
2002 - Just for Fun (Linus Torvalds)
2008 - JavaScript - The good parts
2008 - The art of exploitation (strace)
2011 - Learn you a Haskell, for a greater good
2014 - Black Hat Python
2015 - Modern Perl 5th
2015 - Why's (poignant) guide to ruby