The Rise and Fall of the Great Powers: Economic Change and Military Conflict from 1500 to 2000


Paul Kennedy - 1987
    When a scholar as careful and learned as Mr. Kennedy is prompted by contemporary issues to reexamine the great processes of the past, the result can only be an enhancement of our historical understanding.... When the study is written as simply and attractively as this work is, its publication may have a great and beneficient impact. It is to be hoped that Mr. Kennedy's will have one, at a potentially decisive moment in America's history."Michael Howard, The New York Times Book Review"Important, learned, and lucid... Paul Kennedy's great achievement is that he makes us see our current international problems against a background of empires that have gone under because they were unaible to sustain the material cost of greatness; and he does so in a universal historical perspective of which Ranke would surely have approved."James Joll, The New York Review of Books"His strategic-economic approach provides him with the context for a shapely narrative....Professor Kennedy not only exploits his framework eloquently, he also makes use of it to dig deeper and explore the historical contexts in which some 'power centers' prospered....But the most commanding purpose of his project...is the lesson he draws from 15 centuries of statecraft to apply to the present scene....[The book's] final section is for everyone concerned with the contemporary political scene."Christopher Lehmann-Haupt, The New York Times"Kennedy gives epic meaning to the nation's relative economic and industrial decline." Newsweek

802.11 Wireless Networks: The Definitive Guide


Matthew S. Gast - 2002
    Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:deployment considerationsnetwork monitoring and performance tuningwireless security issueshow to use and select access pointsnetwork monitoring essentialswireless card configurationsecurity issues unique to wireless networksWith wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide, 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence.

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code


Michael Hale Ligh - 2010
    Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills. Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.

Thinking in Time: The Uses of History for Decision-Makers


Richard E. Neustadt - 1986
    "An illuminating guide to the use and abuse of history in affairs of state".--Arthur Schlesinger.

CRACK99: The Takedown of a $100 Million Chinese Software Pirate


David Locke Hall - 2015
    Navy intelligence officer, David Locke Hall was a federal prosecutor when a bizarre-sounding website, CRACK99, came to his attention. It looked like Craigslist on acid, but what it sold was anything but amateurish: thousands of high-tech software products used largely by the military, and for mere pennies on the dollar. Want to purchase satellite tracking software? No problem. Aerospace and aviation simulations? No problem. Communications systems designs? No problem. Software for Marine One, the presidential helicopter? No problem. With delivery times and customer service to rival the world’s most successful e-tailers, anybody, anywhere—including rogue regimes, terrorists, and countries forbidden from doing business with the United States—had access to these goods for any purpose whatsoever.But who was behind CRACK99, and where were they? The Justice Department discouraged potentially costly, risky cases like this, preferring the low-hanging fruit that scored points from politicians and the public. But Hall and his colleagues were determined to find the culprit. They bought CRACK99's products for delivery in the United States, buying more and more to appeal to the budding entrepreneur in the man they identified as Xiang Li. After winning his confidence, they lured him to Saipan—a U.S. commonwealth territory where Hall’s own father had stormed the beaches with the marines during World War II. There they set up an audacious sting that culminated in Xiang Li's capture and imprisonment. The value of the goods offered by CRACK99? A cool $100 million.An eye-opening look at cybercrime and its chilling consequences for national security, CRACK99 reads like a caper that resonates with every amazing detail.

Easternization: Asia's Rise and America's Decline From Obama to Trump and Beyond


Gideon Rachman - 2017
    Easternization is the defining trend of our age the growing wealth of Asian nations is transforming the international balance of power. This shift to the East is shaping the lives of people all over the world, the fate of nations, and the great questions of war and peace. A troubled but rising China is now challenging America s supremacy, and the ambitions of other Asian powers including Japan, North Korea, India, and Pakistan have the potential to shake the whole world. Meanwhile the West is struggling with economic malaise and political populism, the Arab world is in turmoil, and Russia longs to reclaim its status as a great power. As it becomes clear that the West s historic power and influence is receding, Gideon Rachman offers a road map to the turbulent process that will define the international politics of the twenty-first century."

Command and Control: Nuclear Weapons, the Damascus Accident, and the Illusion of Safety


Eric Schlosser - 2013
    A groundbreaking account of accidents, near misses, extraordinary heroism, and technological breakthroughs, Command and Control explores the dilemma that has existed since the dawn of the nuclear age: How do you deploy weapons of mass destruction without being destroyed by them? That question has never been resolved—and Schlosser reveals how the combination of human fallibility and technological complexity still poses a grave risk to mankind. While the harms of global warming increasingly dominate the news, the equally dangerous yet more immediate threat of nuclear weapons has been largely forgotten.Written with the vibrancy of a first-rate thriller, Command and Control interweaves the minute-by-minute story of an accident at a nuclear missile silo in rural Arkansas with a historical narrative that spans more than fifty years. It depicts the urgent effort by American scientists, policy makers, and military officers to ensure that nuclear weapons can’t be stolen, sabotaged, used without permission, or detonated inadvertently. Schlosser also looks at the Cold War from a new perspective, offering history from the ground up, telling the stories of bomber pilots, missile commanders, maintenance crews, and other ordinary servicemen who risked their lives to avert a nuclear holocaust. At the heart of the book lies the struggle, amid the rolling hills and small farms of Damascus, Arkansas, to prevent the explosion of a ballistic missile carrying the most powerful nuclear warhead ever built by the United States.Drawing on recently declassified documents and interviews with people who designed and routinely handled nuclear weapons, Command and Control takes readers into a terrifying but fascinating world that, until now, has been largely hidden from view. Through the details of a single accident, Schlosser illustrates how an unlikely event can become unavoidable, how small risks can have terrible consequences, and how the most brilliant minds in the nation can only provide us with an illusion of control. Audacious, gripping, and unforgettable, Command and Control is a tour de force of investigative journalism, an eye-opening look at the dangers of America’s nuclear age.

The Jungle Grows Back: America and Our Imperiled World


Robert Kagan - 2018
    American sentiment seems to be leaning increasingly toward withdrawal in the face of such disarray. In this powerful, urgent essay, Robert Kagan elucidates the reasons why American withdrawal would be the worst possible response, based as it is on a fundamental and dangerous misreading of the world. Like a jungle that keeps growing back after being cut down, the world has always been full of dangerous actors who, left unchecked, possess the desire and ability to make things worse. Kagan makes clear how the "realist" impulse to recognize our limitations and focus on our failures misunderstands the essential role America has played for decades in keeping the world's worst instability in check. A true realism, he argues, is based on the understanding that the historical norm has always been toward chaos--that the jungle will grow back, if we let it.

The Post-American World


Fareed Zakaria - 2008
    Following on the success of his best-selling The Future of Freedom, Zakaria describes with equal prescience a world in which the United States will no longer dominate the global economy, orchestrate geopolitics, or overwhelm cultures. He sees the "rise of the rest"—the growth of countries like China, India, Brazil, Russia, and many others—as the great story of our time, and one that will reshape the world. The tallest buildings, biggest dams, largest-selling movies, and most advanced cell phones are all being built outside the United States. This economic growth is producing political confidence, national pride, and potentially international problems. How should the United States understand and thrive in this rapidly changing international climate? What does it mean to live in a truly global era? Zakaria answers these questions with his customary lucidity, insight, and imagination.

Inside Terrorism


Bruce Hoffman - 1998
    In this revised edition of the classic text, Hoffman analyzes the new adversaries, motivations, and tactics of global terrorism that have emerged in recent years, focusing specifically on how al Qaeda has changed since 9/11; the reasons behind its resiliency, resonance, and longevity; and its successful use of the Internet and videotapes to build public support and gain new recruits. Hoffman broadens the discussion by evaluating the potential repercussions of the Iraqi insurgency, the use of suicide bombers, terrorist exploitation of new communications media, and the likelihood of a chemical, biological, radiological, or nuclear terrorist strike.Closer to home, Hoffman reconsiders the Timothy McVeigh case and the threats posed by American Christian white supremacists and abortion opponents as well as those posed by militant environmentalists and animal rights activists. He argues that the attacks on the World Trade Center fundamentally transformed the West's view of the terrorist threat. More relevant and necessary than ever, Inside Terrorism continues to be the definitive work on the history and future of global terrorism.

The Great War of Our Time: The CIA's Fight Against Terrorism--From al Qa'ida to ISIS


Michael Morell - 2015
    Called the "Bob Gates of his generation," Michael Morell is a top CIA officer who saw it all--the only person with President Bush on 9/11/01 and with President Obama on 5/1/11 when Usama Bin Laden was brought to justice. Like Ghost Wars, See No Evil, and At the Center of the Storm, THE GREAT WAR OF OUR TIME will be a vivid, newsmaking account of the CIA, a life of secrets and a war in the shadows.

Nothing to Hide: The False Tradeoff between Privacy and Security


Daniel J. Solove - 2011
    But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. Why can't we have both? In this concise and accessible book, Solove exposes the fallacies of many pro-security arguments that have skewed law and policy to favor security at the expense of privacy. Protecting privacy isn't fatal to security measures; it merely involves adequate oversight and regulation. Solove traces the history of the privacy-security debate from the Revolution to the present day. He explains how the law protects privacy and examines concerns with new technologies. He then points out the failings of our current system and offers specific remedies. Nothing to Hide makes a powerful and compelling case for reaching a better balance between privacy and security and reveals why doing so is essential to protect our freedom and democracy.

Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses


Edward Skoudis - 2005
    I asked other people and they didn't seem to know how these things work, or at least they couldn't explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!" --Stephen Northcutt, CEO, SANS Institute "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "Ed Skoudis is a rare individual. He knows the innards of all the various systems, knows all the latest exploits and defenses, and yet is able to explain everything at just the right level. The first edition of Counter Hack was a fascinating read. It's technically intriguing and very clear. . . . A book on vulnerabilities, though, will get out of date, and so we definitely needed this updated and significantly rewritten second edition. This book is a wonderful overview of the field." --From the Foreword by Radia Perlman, series editor, The Radia Perlman Series in Computer Networking and Security; author of Interconnections; and coauthor of Network Security: Private Communications in a Public World "What a great partnership! Ed Skoudis and Tom Liston share an uncanny talent for explaining even the most challenging security concepts in a clear and enjoyable manner. Counter Hack Reloaded is an indispensable resource for those who want to improve their defenses and understand the mechanics of computer attacks." --Lenny Zeltser, coauthor of Malware: Fighting Malicious Code "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "In addition to having breadth of knowledge about and probing insights into network security, Ed Skoudis's real strength is in his ability to show complex topics in an understandable form. By the time he's done, what started off as a hopeless conglomeration of acronyms starts to sound comfortable and familiar. This book is your best source for understanding attack strategies, attack tools, and the defenses against both." --William Stearns, network security expert, www.stearns.org "This book is a must-have for anyone in the Internet security game. It covers everything from the basic principles to the fine details of online attack methods and counter-strategies and is very engagingly written." --Warwick Ford, coauthor of Secure Electronic Commerce For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks.For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You'll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.Important features of this new edition includeAll-new "anatomy-of-an-attack" scenarios and tools An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more Fully updated coverage of reconnaissance tools, including Nmap port scanning and "Google hacking" New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit New information on dangerous, hard-to-detect, kernel-mode rootkits

Why Nations Go to War


John G. Stoessinger - 1978
    Stoessinger, is built around ten case studies, culminating in the new wars that ushered in the twenty-first century: Iraq, Afghanistan, and the wars between Arabs and Israelis in Gaza and in Lebanon. The distinguishing feature of the book remains the author's emphasis on the pivotal role of the personalities of leaders who take their nations, or their following, across the threshold into war.

Intelligence Analysis: A Target-Centric Approach


Robert M. Clark - 2003
    In countering asymmetric threats and non-state adversaries, the model is simply outmoded. A flatter, horizontal, networked solution has proven much more effective in today's world. In his second edition, Robert Clark--former CIA analyst and executive in the Intelligence Directorate--explains how a collaborative, target-centric process both attends to the needs of the customer and promotes more effective collection. Based on feedback from users, early chapters introduce the concept of model synthesis more gradually. Recent intelligence events--with the Iraqi WMD Commission Report at center stage--illustrate the importance of target-centric analysis. This revision also includes broader treatment of collection strategies, systems analysis, and analyst-customer interaction as well as more attention to denial and deception, and to both counterterrorism and counterintelligence analysis. This new edition contains updates of the practical information and day-to-day details from the previous book told as only an experienced intelligence hand could. Extensive descriptions of the art of target modeling and organizational analysis, as well as thoroughly detailed overviews of the quantitative and predictive techniques used in intelligence analysis make this book an essential tool for illuminating an often shadowy world.