Hacker Fiction Net

Book Review Excerpts
  • If you enjoy hacker thrillers, check out John's debut novel, Identified.

    – Daniel Suarez, author of Daemon

  • Fantastic book! I enjoyed it from cover to cover. I will be recommending this book to everyone on my social media accounts.

    – Joseph Bruce

  • This was a good book! It makes you think and it seems like these hacking scenarios could actually happen, since there is so much unknown with computers.

    – Megan Davan

  • What impressed me the most is all facts can happen in real life! All the hacks, the government decisions, the behaviours of the heroes of the book …

    – Carette Antonin

  • Fabulous book!! I want more!! Excellent story, plots within plots, technically sound regarding the hacking, great character development, exciting pacing …

    – L. J. Erste

  • Fast-paced, great characters, and grapples with technology and society issues that are near-and-dear to hackers and will make any reader think.

    – Dan Cornell

  • This was a really fun read in the vein of Hackers, Sneakers, the Net, and other great hacking movies. I loved the characters. The stakes felt real.

    – John Wilker

  • It's a page turner. The suspense, the romance, the stage for the security-privacy near future plot make this a quick and delightful read.

    – Adam Baso

  • If you enjoyed Cory Doctorow’s Little Brother, Homeland and Attack Surface, this book will feel just right, and fits in with their dystopian surveillance nightmare.

    – KJ

  • Identified reveals the near future, in which the government surveillance apparatus, as revealed to us by Snowden, has grown immeasurably powerful.

    – Ryan G

  • The story is great, the main characters are memorable, and the ending was satisfying.

    – Mark Papadakis

  • More technically accurate than a typical hacker book.

    – Adriana Porter Felt

  • A caper for computer geeks.

    – Eric Lawrence

A mock book lying down at an angle with a cover looking as follows - dark gray background, a stylized title Identified at the top, a facial recognition model in four stages going from refined to vectorized to a single user ID, and the text Exclusive Binary Release, a hacker thriller by John Wilander.