Book picks similar to
Robust Control System Networks: How to Achieve Reliable Control After Stuxnet by Ralph Langner
iot-security
cybersec
cyberwar
hackers
The 20% Doctrine: How Tinkering, Goofing Off, and Breaking the Rules at Work Drive Success in Business
Ryan Tate - 2012
Many iconic American companies have been bailed out or gone bankrupt, while others are fighting to survive ever-increasing digitization and globalization.In The 20% Doctrine, Tate examines how companies large and small can incubate valuable innovative advances by making small, specific changes to how work time is approached within their corporate cultures. The concept of “20% Time” originated at Google, but Tate takes examples from powerful businesses like Yahoo!, National Public Radio, Flickr, and the Huffington Post to demonstrate how flexibility and experimentation can revolutionize any business model.By pursuing their passion projects, employees can fuel innovation and foster new ideas. Only through a new devotion to the unhinged and the ad hoc can American businesses resume a steady pace of development and profitability.
What is DevOps?
Mike Loukides - 2012
Old-style system administrators may be disappearing in the face of automation and cloud computing, but operations have become more significant than ever. As this O'Reilly Radar Report explains, we're moving into a more complex arrangement known as "DevOps."Mike Loukides, O'Reilly's VP of Content Strategy, provides an incisive look into this new world of operations, where IT specialists are becoming part of the development team. In an environment with thousands of servers, these specialists now write the code that maintains the infrastructure. Even applications that run in the cloud have to be resilient and fault tolerant, need to be monitored, and must adjust to huge swings in load. That was underscored by Amazon's EBS outage last year.From the discussions at O'Reilly's Velocity Conference, it's evident that many operations specialists are quickly adapting to the DevOps reality. But as a whole, the industry has just scratched the surface. This report tells you why.
The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
Richard A. Clarke - 2019
America's next major war is likely to be provoked by a cyber attack. From well-covered stories like the Stuxnet virus, which helped slow Iran's nuclear program, to lesser-known tales like EternalBlue, the 2017 cyber battle that closed hospitals in Britain and froze shipping crates in Germany in midair, we have entered an age in which online threats carry real-world consequences. But we do not have to let autocrats and criminals run amok in the digital realm. We now know a great deal about how to make cyberspace far less dangerous--and about how to defend our security, economy, democracy, and privacy from cyber attack.This is a book about the realm in which nobody should ever want to fight a war: The Fifth Domain, the Pentagon's term for cyberspace. Our guides are two of America's top cybersecurity experts, seasoned practitioners who are as familiar with the White House Situation Room as they are with Fortune 500 boardrooms. Richard A. Clarke and Robert K. Knake offer a vivid, engrossing tour of the often unfamiliar terrain of cyberspace, introducing us to the scientists, executives, and public servants who have learned through hard experience how government agencies and private firms can fend off cyber threats.Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the U.S. intelligence community with officials working to defend America's elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for "cyber resilience"--building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding the trap of overreaction to digital attacks.Above all, Clarke and Knake show us how to keep The Fifth Domain a humming engine of economic growth and human progress, not give in to those who would turn it into a wasteland of conflict. Backed by decades of high-level experience in the White House and the private sector, this book delivers a riveting, agenda-setting insider look at what works in the struggle to avoid cyberwar.
Writing Secure Code
Michael Howard - 2001
You need to assume it will run in the most hostile environments imaginable -- and design, code, and test accordingly. Writing Secure Code, Second Edition shows you how. This edition draws on the lessons learned and taught throughout Microsoft during the firm s massive 2002 Windows Security Push. It s a huge upgrade to the respected First Edition, with new coverage across the board. Michael Howard and David LeBlanc first help you define what security means to your customers -- and implement a three-pronged strategy for securing design, defaults, and deployment. There s especially useful coverage of threat modeling -- decomposing your application, identifying threats, ranking them, and mitigating them. Then, it s on to in-depth coverage of today s key security issues from the developer s standpoint. Everyone knows buffer overruns are bad: Here s a full chapter on avoiding them. You ll learn how to establish appropriate access controls and default to running with least privilege. There s detailed coverage of overcoming attacks on cryptography (for example, avoiding poor random numbers and bit-flipping attacks). You ll learn countermeasures for virtually every form of user input attack, from malicious database updates to cross-site scripting. We ve just scratched the surface: There are authoritative techniques for securing sockets and RPC, protecting against DOS attacks, building safer .NET applications, reviewing and testing code, adding privacy features, and even writing high-quality security documentation. Following these techniques won t just improve security -- it ll dramatically improve robustness and reliability, too. Bill CamardaBill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks For Dummies®, Second Edition.
How Linux Works: What Every Superuser Should Know
Brian Ward - 2004
Some books try to give you copy-and-paste instructions for how to deal with every single system issue that may arise, but How Linux Works actually shows you how the Linux system functions so that you can come up with your own solutions. After a guided tour of filesystems, the boot sequence, system management basics, and networking, author Brian Ward delves into open-ended topics such as development tools, custom kernels, and buying hardware, all from an administrator's point of view. With a mixture of background theory and real-world examples, this book shows both "how" to administer Linux, and "why" each particular technique works, so that you will know how to make Linux work for you.
Air Disaster 2: The Jet Age
Macarthur Job - 2014
Planes could fly faster, further and at higher altitude; opening the door to foreign holidays to the masses. But, it came at a price. In the early days this new advanced era of aviation faced multiple unforeseen problems, resulting in catastrophic accidents and inevitably the loss of human lives. From the first jetliner, the ill-fated Comet, to an horrific Boeing 747 mid-air collision at Tenerife, award-winning Macarthur Job – one of the world’s foremost aviation writers, and himself a pilot - tells the stories and unpicks the causes of eighteen fateful air disasters. Based on accident reports and extensive research he reveals how these calamities led to the development of the safest and most reliable form of transport in the world. Illustrated with photographs and technical drawings by aviation artist Matthew Tesch, 'Air Disaster 2: The Jet Age' covers the period between 1952 and 1977. Other books in the series: Air Disaster 1: The Propeller Era Air Disaster 3: Terror In The Sky
Saving Daisy (Dragons MC Book 1)
Rosa Mink - 2020
Each book can be read alone, but their stories like their lives are all connected. You’ll find updates on characters you’ve already met in this series, including the girls from the Curvy Girls Series and their men.DaisyI didn’t expect to fall for him, but the moment I saw him I felt it. I can’t fight it and seeing him with my baby girl makes my heart melt. It’s all happening so fast that I can’t quite catch my breath…and then my world falls apart. He says I’m safe, but can he really save me? AaronI swore my happy ending was finding my daughter after eighteen years. I never expected my grandkids to show that it was only my happy beginning. She’s going to be my happy ending, a life with her and her daughter. I just have to show her it’s possible. When her ex threatens her, puts her and her daughter in danger, nothing will stop me from keeping her safe. My brother will have my back and I’ll have hers, always. Saving Daisy is Book 1 in the Dragons MC Series. *17,500 words* If you’re looking for a quick read with alpha men, curvy girls, strong language, no cheating, and HEAs, you’ve found the right book. It's intended for an adult audience and may include subjects that are sensitive to some readers.
A History Of Indian Philosophy, Volume I
Surendranath Dasgupta - 1922
The volumes elaborate Buddhist and Jaina Philosophy and the six systems of Hindu thought; Samkara School of Vedanta besides the philosophy of the Yoga-vasistha and the Bhagavadgita; detailed account of the principal dualistic and pluralistic system; the Bhagavata Purana, Madhva and his school; and Southern Schools of Saivism. Each volume is devoted to the study of the particular school of thought of Indian Philosophy. 5 Volume set.
Amusements in Mathematics
Henry Ernest Dudeney - 1917
Intriguing, witty, paradoxical productions of one of the world's foremost creators of puzzles.This book was converted from its physical edition to the digital format by a community of volunteers. You may find it for free on the web. Purchase of the Kindle edition includes wireless delivery.
In Daddy's Shoes
Sandra Elzie - 2010
Brandon must learn to cope with the loss of his father in Iraq and his feelings of inadequately fulfilling his father s last instruction to take care of your mother until I get home. Andy Jenkins, Brandon's teacher, is recently divorced and happy with life the way it is. That is, until Lydia enters the picture and asks for his help. Unable to say no to a student in trouble, he agrees. When they team up to help Brandon, they soon realize that they make great partners outside of the classroom, as well.
Design It! : Pragmatic Programmers: From Programmer to Software Architect
Michael Keeling - 2017
Lead your team as a software architect, ask the right stakeholders the right questions, explore design options, and help your team implement a system that promotes the right -ilities. Share your design decisions, facilitate collaborative design workshops that are fast, effective, and fun-and develop more awesome software!With dozens of design methods, examples, and practical know-how, Design It! shows you how to become a software architect. Walk through the core concepts every architect must know, discover how to apply them, and learn a variety of skills that will make you a better programmer, leader, and designer. Uncover the big ideas behind software architecture and gain confidence working on projects big and small. Plan, design, implement, and evaluate software architectures and collaborate with your team, stakeholders, and other architects. Identify the right stakeholders and understand their needs, dig for architecturally significant requirements, write amazing quality attribute scenarios, and make confident decisions. Choose technologies based on their architectural impact, facilitate architecture-centric design workshops, and evaluate architectures using lightweight, effective methods. Write lean architecture descriptions people love to read. Run an architecture design studio, implement the architecture you've designed, and grow your team's architectural knowledge. Good design requires good communication. Talk about your software architecture with stakeholders using whiteboards, documents, and code, and apply architecture-focused design methods in your day-to-day practice. Hands-on exercises, real-world scenarios, and practical team-based decision-making tools will get everyone on board and give you the experience you need to become a confident software architect.
Seduced by Evil: The True Story of a Gorgeous Stripper-Turned-Suburban-Mom, Her Secret Past, and a Ruthless Murder
Michael Fleeman - 2011
Three of them were convinced she was engaged to them. Then one spring morning in 1996, one man, Kent Leppink, was found in the snow, shot in the head…Days before his death, Kent had removed Mechele's name from his million-dollar life insurance policy. He wrote a letter to his family stating that, should he meet foul play, Mechele would likely be among those involved. But she wasn't charged with Kent's death. She married a doctor, moved to Olympia, Washington, and began a new life.For years, Mechele's suburban friends never suspected a thing. She went to school meetings, hosted backyard barbeques, and was beloved by her neighbors. But authorities eventually found enough evidence to mount a case against her and an alleged accomplice. Did Mechele conspire to kill her ex-fiancé? Or is she the innocent victim as she claims? Seduced by Evil is the shocking true story about a love triangle that ended in mystery—and murder…
From Mathematics to Generic Programming
Alexander A. Stepanov - 2014
If you're a reasonably proficient programmer who can think logically, you have all the background you'll need. Stepanov and Rose introduce the relevant abstract algebra and number theory with exceptional clarity. They carefully explain the problems mathematicians first needed to solve, and then show how these mathematical solutions translate to generic programming and the creation of more effective and elegant code. To demonstrate the crucial role these mathematical principles play in many modern applications, the authors show how to use these results and generalized algorithms to implement a real-world public-key cryptosystem. As you read this book, you'll master the thought processes necessary for effective programming and learn how to generalize narrowly conceived algorithms to widen their usefulness without losing efficiency. You'll also gain deep insight into the value of mathematics to programming--insight that will prove invaluable no matter what programming languages and paradigms you use. You will learn aboutHow to generalize a four thousand-year-old algorithm, demonstrating indispensable lessons about clarity and efficiencyAncient paradoxes, beautiful theorems, and the productive tension between continuous and discreteA simple algorithm for finding greatest common divisor (GCD) and modern abstractions that build on itPowerful mathematical approaches to abstractionHow abstract algebra provides the idea at the heart of generic programmingAxioms, proofs, theories, and models: using mathematical techniques to organize knowledge about your algorithms and data structuresSurprising subtleties of simple programming tasks and what you can learn from themHow practical implementations can exploit theoretical knowledge
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier - 2000
Identity Theft. Corporate Espionage. National secrets compromised. Can anyone promise security in our digital world?The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.This edition updated with new information about post-9/11 security.