Book picks similar to
21st Century Chinese Cyberwarfare by William T. Hagestad
cyber
hack
infosec
infosec-china
WikiLeaks: Inside Julian Assange's War on Secrecy
David Leigh - 2011
A team of journalists with unparalleled inside access provides the first full, in-depth account of WikiLeaks, its founder Julian Assange, and the ethical, legal, and political controversies it has both uncovered and provoked.
Domain-Driven Design in PHP
Carlos Buenosvinos
Explore applying the Hexagonal Architecture within your application, whether within an open source framework or your own bespoke system. Finally, look into integrating Bounded Contexts, using REST and Messaging approaches.
Playing to the Edge: American Intelligence in the Age of Terror
Michael V. Hayden - 2016
Otherwise, by playing back, you may protect yourself, but you will be less successful in protecting America. "Play to the edge" was Hayden's guiding principle when he ran the National Security Agency, and it remained so when he ran CIA. In his view, many shortsighted and uninformed people are quick to criticize, and this book will give them much to chew on but little easy comfort; it is an unapologetic insider's look told from the perspective of the people who faced awesome responsibilities head on, in the moment. How did American intelligence respond to terrorism, a major war and the most sweeping technological revolution in the last 500 years? What was NSA before 9/11 and how did it change in its aftermath? Why did NSA begin the controversial terrorist surveillance program that included the acquisition of domestic phone records? What else was set in motion during this period that formed the backdrop for the infamous Snowden revelations in 2013? As Director of CIA in the last three years of the Bush administration, Hayden had to deal with the rendition, detention and interrogation program as bequeathed to him by his predecessors. He also had to ramp up the agency to support its role in the targeted killing program that began to dramatically increase in July 2008. This was a time of great crisis at CIA, and some agency veterans have credited Hayden with actually saving the agency. He himself won't go that far, but he freely acknowledges that CIA helped turn the American security establishment into the most effective killing machine in the history of armed conflict. For 10 years, then, General Michael Hayden was a participant in some of the most telling events in the annals of American national security. General Hayden's goals are in writing this book are simple and unwavering: No apologies. No excuses. Just what happened. And why. As he writes, "There is a story here that deserves to be told, without varnish and without spin. My view is my view, and others will certainly have different perspectives, but this view deserves to be told to create as complete a history as possible of these turbulent times. I bear no grudges, or at least not many, but I do want this to be a straightforward and readable history for that slice of the American population who depend on and appreciate intelligence, but who do not have the time to master its many obscure characteristics."
A Dog Named Leaf: The Hero from Heaven Who Saved My Life
Allen Anderson - 2012
After authoring thirteen successful books that tell other people’s stories about the human-animal bond, Allen is ready to tell his own story—a remarkable journey with a highly intuitive but troubled dog who literally saved Allen’s life.The American Society of Journalist and Authors (ASJA) has selected A DOG NAMED LEAF by Minnesota authors Allen Anderson with Linda Anderson (Globe Pequot/Lyons Press) as one of the winners of the prestigious 2013 ASJA Awards in the Lifestyle/Memoir category. It’s the story of how one man and one dog came together at exactly the right time for miracles to occur. This award is like the Academy Awards for authors in that it is given by your peers. Some of the best writers in the country submitted books for consideration. http://asja.org/for-writers/annual-wr... Endorsements:"Impossible to put down. Read and share widely."--Marc Bekoff, The Emotional Lives of Animals"Pulse-pounding brushes with danger, startling synchronicities, and insights on fulfilling one’s purpose in life offer hope and new perspectives. This is truly the most unusual dog book ever.”--Dr. Marty Becker, Resident Veterinarian Good Morning America and The Dr. Oz Show; featured columnist vetstreet.com"A Dog Named Leaf is a very touching and well-written book that clearly comes from Allen Anderson’s heart. Although I am not a religious or spiritual person and couldn’t wrap my mind around some of the things that happened in Allen and Leaf’s story, the more I read, the more my skepticism melted. I am convinced of Leaf’s ability to sense what Allen needed. This book will make readers feel as if they know Leaf, and they’ll grow to love him too.”--Jeffrey Moussaieff Masson, Ph.D., New York Times bestselling author of 24 books, including When Elephants Weep, Dogs Never Lie about Love, and The Dog Who Couldn't Stop Loving"A remarkable story that will reaffirm your faith in the unique and mutually healing bond that can sometimes form between humans and animals." --Gwen Cooper, New York Times bestselling author of Homer's OdysseyReviews:"Part Marley and Me and part Jon Katz... the story is endearing, and the many photographs of Leaf running, swimming, and chasing a tennis ball in south Minneapolis are adorable."--Laurie Hertzel, "The Browser" MINNEAPOLIS STAR TRIBUNE"A Dog Named Leaf is a beautiful story told with honesty and depth. You'll be changed by Allen and Leaf's journey. This book will fill you with hope."--Peggy Frezon, Brooks Books, Peggy's Pet PlaceAllen says, “Thanks to a loving, intuitive, paper-chewing pup, I am alive and well today.”--National Examiner, as told to L.A. Justice, December 17, 2012"This touching, almost lyrical book [A Dog Named Leaf] is a very personal story bravely told by the author and his wife... This is a lovely story that will uplift anyone who has ever loved a dog."--Amy Shojai, About.com Guide, December 27, 2012"If you've ever doubted animals have souls, this book will open your heart and mind to truly believing we are all connected. You will never doubt again. Your life will be enriched far beyond what you could have ever imagined and you will have author Allen Anderson to thank for it. A Dog Named Leaf is a great gift idea for the dog loving friends and family in your life!"--Barbara Techel, Joyful Paws"...The authorial voice is distinctly Allen's. In 2006, Allen learns that he has an unruptured brain aneurysm, seven months after the family adopts a black cocker spaniel, Leaf, from a shelter. Throughout, he clearly conveys the affection that he and his dog have for each other and how that affection proved crucial to his recovery from brain surgery..." --PUBLISHER'S WEEKLY, September 24, 2012
Blockchain Chicken Farm: And Other Stories of Tech in China's Countryside
Xiaowei Wang - 2020
Their discoveries force them to challenge the standard idea that rural culture and people are backward, conservative, and intolerant. Instead, they find that rural China has not only adapted to rapid globalization but has actually innovated the technology we all use today.From pork farmers using AI to produce the perfect pig, to disruptive luxury counterfeits and the political intersections of e-commerce villages, Wang unravels the ties between globalization, technology, agriculture, and commerce in unprecedented fashion. Accompanied by humorous “Sinofuturist” recipes that frame meals as they transform under new technology, Blockchain Chicken Farm is an original and probing look into innovation, connectivity, and collaboration in the digitized rural world.FSG Originals × Logic dissects the way technology functions in everyday lives. The titans of Silicon Valley, for all their utopian imaginings, never really had our best interests at heart: recent threats to democracy, truth, privacy, and safety, as a result of tech’s reckless pursuit of progress, have shown as much. We present an alternate story, one that delights in capturing technology in all its contradictions and innovation, across borders and socioeconomic divisions, from history through the future, beyond platitudes and PR hype, and past doom and gloom. Our collaboration features four brief but provocative forays into the tech industry’s many worlds, and aspires to incite fresh conversations about technology focused on nuanced and accessible explorations of the emerging tools that reorganize and redefine life today.
The Myth of Artificial Intelligence: Why Computers Can't Think the Way We Do
Erik J. Larson - 2021
What hope do we have against superintelligent machines? But we aren't really on the path to developing intelligent machines. In fact, we don't even know where that path might be.A tech entrepreneur and pioneering research scientist working at the forefront of natural language processing, Erik Larson takes us on a tour of the landscape of AI to show how far we are from superintelligence, and what it would take to get there. Ever since Alan Turing, AI enthusiasts have equated artificial intelligence with human intelligence. This is a profound mistake. AI works on inductive reasoning, crunching data sets to predict outcomes. But humans don't correlate data sets: we make conjectures informed by context and experience. Human intelligence is a web of best guesses, given what we know about the world. We haven't a clue how to program this kind of intuitive reasoning, known as abduction. Yet it is the heart of common sense. That's why Alexa can't understand what you are asking, and why AI can only take us so far.Larson argues that AI hype is both bad science and bad for science. A culture of invention thrives on exploring unknowns, not overselling existing methods. Inductive AI will continue to improve at narrow tasks, but if we want to make real progress, we will need to start by more fully appreciating the only true intelligence we know--our own.
Inviting Disaster: Lessons From the Edge of Technology
James R. Chiles - 2001
Combining firsthand accounts of employees' escapes with an in-depth look at the structural reasons behind the towers' collapse, Chiles addresses the question, Were the towers "two tall heroes" or structures with a fatal flaw?
Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves
Adam Levin - 2015
So what do you do when it's your turn? Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam filters, and those are good ideas as far as they go. But with the breaches of huge organizations like Target, AshleyMadison.com, JPMorgan Chase, Sony, Anthem, and even the US Office of Personnel Management, more than a billion personal records have already been stolen, and chances are good that you're already in harm's way. This doesn't mean there's no hope. Your identity may get stolen, but it doesn't have to be a life-changing event. Adam Levin, a longtime consumer advocate and identity fraud expert, provides a method to help you keep hackers, phishers, and spammers from becoming your problem. Levin has seen every scam under the sun: fake companies selling "credit card insurance"; criminal, medical, and child identity theft; emails that promise untold riches for some personal information; catphishers, tax fraud, fake debt collectors who threaten you with legal action to confirm your account numbers; and much more. As Levin shows, these folks get a lot less scary if you see them coming. With a clearheaded, practical approach, Swiped is your guide to surviving the identity theft epidemic. Even if you've already become a victim, this strategic book will help you protect yourself, your identity, and your sanity.
Weird But True, 200 Astounding, Outrageous, and Totally Off the Wall Facts
Leslie Gilbert Elman - 2010
but true!
OAuth 2 in Action
Justin Richer - 2017
You'll learn how to confidently and securely build and deploy OAuth on both the client and server sides. Foreword by Ian Glazer.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyThink of OAuth 2 as the web version of a valet key. It is an HTTP-based security protocol that allows users of a service to enable applications to use that service on their behalf without handing over full control. And OAuth is used everywhere, from Facebook and Google, to startups and cloud services.About the BookOAuth 2 in Action teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics. By the end, you'll be able to confidently and securely build and deploy OAuth on both the client and server sides.What's InsideCovers OAuth 2 protocol and designAuthorization with OAuth 2OpenID Connect and User-Managed AccessImplementation risksJOSE, introspection, revocation, and registrationProtecting and accessing REST APIsAbout the ReaderReaders need basic programming skills and knowledge of HTTP and JSON.About the AuthorJustin Richer is a systems architect and software engineer. Antonio Sanso is a security software engineer and a security researcher. Both authors contribute to open standards and open source.Table of ContentsPart 1 - First stepsWhat is OAuth 2.0 and why should you care?The OAuth dance Part 2 - Building an OAuth 2 environmentBuilding a simple OAuth clientBuilding a simple OAuth protected resourceBuilding a simple OAuth authorization serverOAuth 2.0 in the real world Part 3 - OAuth 2 implementation and vulnerabilitiesCommon client vulnerabilitiesCommon protected resources vulnerabilitiesCommon authorization server vulnerabilitiesCommon OAuth token vulnerabilities Part 4 - Taking OAuth furtherOAuth tokensDynamic client registrationUser authentication with OAuth 2.0Protocols and profiles using OAuth 2.0Beyond bearer tokensSummary and conclusions
Foam Roller Workbook: Illustrated Step-by-Step Guide to Stretching, Strengthening and Rehabilitative Techniques
Karl Knopf - 2011
Karl Knopf.Once used exclusively in physical therapy settings, the foam roller has made its way into yoga and pilates studios, gyms and homes. With this simple device, you can: •Improve core strength •Increase flexibility •Release tension •Alleviate pain •Rehabilitate injuries Foam Roller Workout offers 50 effective exercises paired with clear captions and step-by-step photos that will help you roll your way to better posture, balance and relaxation. In addition, special programs will enhance your sporting life, whether you hit the track, the court, or the slopes.
Networking for Dummies
Doug Lowe - 2000
You'll discover the hottest topics for setting up a network at home or in the office.Popular For Dummies author Doug Lowe knows what the networking beginner is looking for, so to that end, he offers you networking fundamentals written in his easy-to-understand style and discusses topics such as Windows 7 and Windows Server 2008.Walks you through networking basics with valuable updates of the latest networking tools and trends Explains exactly what a network is and how to use it Demonstrates how to build a wired or wireless network Addresses securing, optimizing, and troubleshooting a network Discusses networking with all major operating systems Networking For Dummies, 9th Edition is the guide you need to start sharing resources and exchanging data today.
Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance
Julia Angwin - 2014
We are being watched.We see online ads from websites we've visited, long after we've moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what's in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines.In Dragnet Nation, award-winning investigative journalist Julia Angwin reports from the front lines of America's surveillance economy, offering a revelatory and unsettling look at how the government, private companies, and even criminals use technology to indiscriminately sweep up vast amounts of our personal data. In a world where we can be watched in our own homes, where we can no longer keep secrets, and where we can be impersonated, financially manipulated, or even placed in a police lineup, Angwin argues that the greatest long-term danger is that we start to internalize the surveillance and censor our words and thoughts, until we lose the very freedom that makes us unique individuals. Appalled at such a prospect, Angwin conducts a series of experiments to try to protect herself, ranging from quitting Google to carrying a "burner" phone, showing how difficult it is for an average citizen to resist the dragnets' reach.Her book is a cautionary tale for all of us, with profound implications for our values, our society, and our very selves.
Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying
Lance Henderson - 2015
So does the FBI. Even Google wants it gone, as do Facebook and Yahoo and every other soul-draining, identity-tracking vampiric media cartel that scans your emails and spies on your private browsing sessions to better target you. But there's hope. This manual will give you the incognito tools that will make you a master of anonymity! Other books tell you to install Tor and then encrypt your hard drive... and leave it at that. I go much deeper, delving into the very engine of ultimate network security, taking it to an art form where you'll receive a new darknet persona - how to be anonymous online without looking like you're trying to be anonymous online. Covered in Tor: - Browse the Internet Anonymously - Darkcoins, Darknet Marketplaces & Opsec Requirements - Tor Hidden Servers - How to Not Get Caught - Counter-Forensics the FBI Doesn't Want You to Know About - Windows vs. Linux - Which Offers Stronger Network Security? - Cryptocurrency (Real Bitcoin Anonymity) - Supercookies & Encryption - Preventing Marketers and Debt Collectors From Finding You - How to Protect Your Assets - i.e., How to Be Invisible and even Hide from the Internet itself! - Darknet Personas Scroll back up and click "Look Inside" and Secure Your Future Today!
Normal Accidents: Living with High-Risk Technologies
Charles Perrow - 1984
Charles Perrow argues that the conventional engineering approach to ensuring safety--building in more warnings and safeguards--fails because systems complexity makes failures inevitable. He asserts that typical precautions, by adding to complexity, may help create new categories of accidents. (At Chernobyl, tests of a new safety system helped produce the meltdown and subsequent fire.) By recognizing two dimensions of risk--complex versus linear interactions, and tight versus loose coupling--this book provides a powerful framework for analyzing risks and the organizations that insist we run them.The first edition fulfilled one reviewer's prediction that it may mark the beginning of accident research. In the new afterword to this edition Perrow reviews the extensive work on the major accidents of the last fifteen years, including Bhopal, Chernobyl, and the Challenger disaster. The new postscript probes what the author considers to be the quintessential 'Normal Accident' of our time: the Y2K computer problem.