In "Hatching Twitter," Nick Bilton narrates the dramatic rise of Twitter, chronicling the journey of its founders—Ev Williams, Jack Dorsey, Biz Stone, and Noah Glass—as they navigate the tumultuous path from a fledgling startup to a global phenomenon.
P. W. Singer & August Cole
Ghost Fleet: A Novel of the Next World War
Ghost Fleet envisions a near-future war where captains fight a modern Pearl Harbor, pilots battle stealth drones, hackers wage digital war, and billionaires shape cyber conflict. Victory depends on merging past strategy with future weapons. Every technology in this gripping thriller is real.
Elliot Ackerman & Admiral James Stavridis
2034: A Novel of the Next World War
On March 12, 2034, China sinks a U.S. destroyer, Iran captures an American pilot, and cyber warfare cripples defenses. A series of miscalculations pushes the world toward catastrophe. This cautionary tale warns of a future shaped by conflict, power struggles, and the devastating cost of war.
Christopher Andrew
The Secret World: A History of Intelligence
Espionage is older than modern intelligence agencies, yet much of its history is forgotten. From World War II codebreakers to Napoleonic spies, past lessons shape the future. Christopher Andrew uncovers lost intelligence history and its impact on global security over millennia.
Chun Han Wong
Party of One: The Rise of Xi Jinping and China's Superpower Future
Xi Jinping tightened control, crushed dissent, and pushed China toward authoritarian rule. Chun Han Wong reveals his grip on power, his global ambitions, and the fear he inspires. Under Xi, China challenges the West, reshapes governance, and redefines the world order with its expanding influence.
Joseph Cox
Dark Wire: The Incredible True Story of the Largest Sting Operation Ever
Criminals trusted Anom, unaware the FBI controlled it. Authorities watched smugglers, launderers, and hitmen operate in plain sight. Arrests followed, but as control slipped, questions emerged. Dark Wire reveals the scale, risks, and fallout of one of the most daring global stings in history.
Chun Han Wong
Prisoners of Geography: Ten Maps That Explain Everything About the World
Maps shape history, power, and conflict, yet geopolitics often ignores their influence. Tim Marshall explores how geography defines nations, limits leaders, and fuels global struggles. From Russia to China to the United States, land and borders determine strategy, security, and the fate of empires.
Kai Bird & Martin J. Sherwin
American Prometheus
In this magisterial, acclaimed biography twenty-five years in the making, Kai Bird and Martin Sherwin capture Oppenheimer’s life and times, from his early career to his central role in the Cold War. This is biography and history at its finest, riveting and deeply informative.
Library (16 books)
Sarah Frier
No Filter: The Inside Story of Instagram
In 2010, Kevin Systrom and Mike Krieger released a photo-sharing app called Instagram, with one simple but irresistible feature: it would make anything you captured look more beautiful.
Dmitri Alperovitch
World on the Brink: How America Can Beat China in the Race for the Twenty-First Century
Provides an urgent, thought-provoking warning about one of the biggest challenges facing America today—the competition with China—and offers practical approaches to maintain U.S. global leadership.
Scott J. Shapiro
Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks
In "Fancy Bear Goes Phishing," Scott J. Shapiro explores the dark history of the information age through five extraordinary hacks, revealing how cybercrime stems not from defective programming but from the faulty wiring of our psyches and society.
Bradley Hope
The Rebel and the Kingdom: The True Story of the Secret Mission to Overthrow the North Korean Regime
Adrian Hong, once a quiet Yale student, found his purpose in freeing North Koreans from oppression. What began as activism escalated into daring missions while evading Chinese authorities. His actions peaked with an armed raid on the North Korean embassy in Madrid.
Andy Greenberg
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency
Cryptocurrency fueled the rise of digital black markets, allowing crime lords to operate beyond the reach of law enforcement. But what if their greatest asset held a fatal flaw? Learn how investigators cracked the crypto-underworld, exposing a saga of crime, pursuit, and justice.
Bradley Hope
Billion Dollar Whale: The Man Who Fooled Wall Street, Hollywood, and the World
In 2009, a chubby graduate of Wharton named Jho Low set in motion a fraud of unprecedented gall and magnitude. Over a decade, Low, with the aid of Goldman Sachs and others, siphoned billions from an investment fund, purchasing everything from elections to funding The Wolf of Wall Street.
Bradley Hope
Blood and Oil: Mohammed bin Salman's Ruthless Quest for Global Power
Mohammed bin Salman's rapid rise stunned the world. He spoke of reform, lifted bans, and courted global elites. But beneath the polished image lay brutality and excess, an autocratic grip, U.S. ties, and ruthless ambition in the high-stakes gamble shaping Saudi Arabia’s future.
Andy Whyte
MEDDICC
MEDDICC is transforming enterprise and B2B sales, driving billion-dollar success for major companies. Its power lies in making sales predictable and efficient. This guide reveals expert tactics to help any salesperson control deals, articulate value, and close high-value sales with precision.
George R. R. Martin
Fire & Blood: 300 Years Before A Game of Thrones
Centuries before A Game of Thrones, House Targaryen rose from the ashes of Valyria to claim the Iron Throne. This epic chronicle unveils their legendary conquests, the deadly Dance of the Dragons, and the ruthless rulers who shaped Westeros. A sweeping history of power, fire, and blood.
Nicole Perlroth
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
A zero-day exploit can spy on your phone, cripple power grids, and alter elections. Once hoarded by the US government, cyber weapons have fallen into the hands of hostile nations and mercenaries. This investigation exposes the hidden cyber arms race and the urgent threat it poses to the world.
Richard A. Clarke
Artificial Intelligencia
Computers & algorithms silently shape our lives, but who controls them? A Chinese detective uncovers a global plot manipulating surveillance & cyberspace. As powerful forces close in, he races to stop an unknown disaster with unseen perpetrators. The battle for control of a digital world has begun.
Amy B. Zegart
Spies, Lies, and Algorithms: The History and Future of American Intelligence
Espionage is everywhere, yet poorly understood. Fiction distorts reality, fueling conspiracy theories and weakening intelligence policy. As digital technology reshapes spying, new threats and players emerge. From Revolutionary War spies to cyber warfare, this is the truth behind modern espionage.
Thomas Rid
Active Measures: The Secret History of Disinformation and Political Warfare
Disinformation has long been a weapon of war, shaping history and eroding trust. Active Measures uncovers the hidden world of espionage, from Cold War deception to Russian meddling in 2016. Thomas Rid reveals how spy agencies manipulate facts and how disinformation will shape the future.
Nick Bilton
American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road
Ross Ulbricht created Silk Road, a dark web marketplace for anything illegal, beyond government reach. It grew into a billion-dollar empire before he became a fugitive, ordering hits to stay in power. American Kingpin traces his rise and fall in a true story that feels too outrageous to be real.
Cyberspace is a battleground where nations manipulate information to gain power. This book reveals Russia's cyber warfare strategy, exposing its long-term goals and influence tactics. Daniel Bagge contrasts global cyber approaches, showing how digital operations shape modern warfare and politics.
Kyle Wilhoit & Joseph Opacki
Operationalizing Threat Intelligence
Cyber threat intelligence is crucial for decision-making, but operationalizing it can be difficult. This book covers five key areas, from defining and collecting intelligence to analysis and production, giving you the tools to build a threat intelligence program from collection to execution.