Book picks similar to
Surveillance Zone: The Hidden World of Corporate Surveillance Detection & Covert Special Operations by Ami Toben
espionage
nonfiction
security
reference
Accardo: The Genuine Godfather
William F. Roemer Jr. - 1995
. . Roemer [is] America's most decorated FBI agent."--Chicago TribuneFor forty years Tony Accardo was America's most dangerous criminal. He cut his teeth on the Chicago mob wars of Capone and Elliot Ness. He got his nickname "Joe Batters" for killing two men with a baseball bat. As the bodies piled up, Capone's youngest capo murdered and schemed his way to the top.William Roemer was the first FBI agent to face Tony "The Big Tuna" Accardo. Now, Roemer tells the story that only he could tell: the deals, the hits, the double-crosses, and the power plays that reached from the Windy City to Hollywood and to New York. Drawing on secret wiretaps and inside information, ACCARDO chronicles bloodshed and mayhem for more than six decades--as Roemer duels against the most powerful don of them all. . . ."Roemer brings the reality of organized crime home to us."--Boston Herald"A big, sprawled out account that serves as anecdotal history of organized crime."--Kirkus Reviews
Happiness: Your Route-Map to Inner Joy
Andy Cope - 2017
This funny, practical book by Andy Cope, the Dr of Happiness, will show you how to transform your thinking, change gear and find a fresh new perspective that will leave you better focused on the things that matter, healthier and a great deal happier.ABOUT THIS SERIESLittle Books are accessible and engaging books with a focus on personal development and business topics, delivering quick, outcome-focused results, ideal for self-improvement junkies, commuters, or business readers.
Sons of Cain: A History of Serial Killers from the Stone Age to the Present
Peter Vronsky - 2018
15,000 BC) to today. Delving further back into human history and deeper into the human psyche than Serial Killers--Vronsky's 2004 book, which has been called "the definitive history of the phenomenon of serial murder"--he focuses strictly on sexual serial killers: thrill killers who engage in murder, rape, torture, cannibalism and necrophilia, as opposed to for-profit serial killers, including hit men, or "political" serial killers, like terrorists or genocidal murderers.These sexual serial killers differ from all other serial killers in their motives and their foundations. They are uniquely human and--as popular culture has demonstrated--uniquely fascinating.
The News About the News: American Journalism in Peril
Leonard Downie Jr. - 2002
Good journalism builds communities, arms citizens with important information, and serves as a public watchdog for civic, national, and global issues. But what happens when the news turns its back on its public role? Leonard Downie Jr., executive editor of The Washington Post, and Robert G. Kaiser, associate editor and senior correspondent, report on a growing crisis in American journalism. From the corporatization that leads media moguls to slash content for profit, to newsrooms that ignore global crises to report on personal entertainment, these veteran journalists chronicle an erosion of independent, relevant journalism. In the process, they make clear why incorruptible reporting is crucial to American society. Rooted in interviews and first-hand accounts, the authors take us inside the politically charged world of one of America’s powerful institutions, the media.
Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat
John P. Carlin - 2018
We've seen North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage against American companies, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us.As the former Assistant Attorney General and Chief of Staff to FBI Director Robert Mueller, John Carlin has spent 15 years on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his years-long secret battle to keep America safe, and warns us of the perils that await us as we embrace the latest digital novelties -- smart appliances, artificial intelligence, self-driving cars -- with little regard for how our enemies might compromise them. The potential targets for our enemies are multiplying: our electrical grid, our companies, our information sources, our satellites. As each sector of the economy goes digital, a new vulnerability is exposed.The Internet of Broken Things makes the urgent case that we need to start innovating more responsibly. As a fleet of web-connected cars and pacemakers rolls off the assembly lines, the potential for danger is overwhelming. We must see and correct these flaws before our enemies exploit them.
Hacking: The Art of Exploitation
Jon Erickson - 2003
This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
John Sammons - 2011
This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations.This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available.This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security.
File System Forensic Analysis
Brian Carrier - 2005
Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.
The Bletchley Girls
Tessa Dunlop - 2015
Many were just school girls at the outbreak of war; the next six years would change their lives forever. This vivid portrayal of their experiences, sacrifices, and memories is a poignant reminder that without the work of thousands of young women Bletchley Park's extraordinary achievements would not have been possible. By meeting and talking to these fascinating female secret-keepers who are still alive today, Tessa Dunlop captures their extraordinary journeys into an adult world of war, secrecy, love, and loss. Through the voices of the women themselves, this is the story of life at Bletchley Park beyond the celebrated code-breakers; it's the story of the girls behind Britain's ability to consistently outsmart the enemy.
Modern Technical Writing: An Introduction to Software Documentation
Andrew Etter - 2016
Written by the lead technical writer at one of Silicon Valley's most exciting companies, Modern Technical Writing is a set of guiding principles and thoughtful recommendations for new and experienced technical writers alike. Not a reference manual, and not comprehensive, it instead serves as an introduction to a sensible writing and publishing process, one that has eluded the profession for too long.
The Linux Command Line
William E. Shotts Jr. - 2012
Available here:readmeaway.com/download?i=1593279523The Linux Command Line, 2nd Edition: A Complete Introduction PDF by William ShottsRead The Linux Command Line, 2nd Edition: A Complete Introduction PDF from No Starch Press,William ShottsDownload William Shotts’s PDF E-book The Linux Command Line, 2nd Edition: A Complete Introduction
GMAT Critical Reasoning, Guide 6
Manhattan GMAT - 2007
Fully updated and revised to deal with recent changes to the GMAT, they were designed with a content-based approach.The Critical Reasoning Guide demystifies critical reasoning by teaching a clear, consistent, and effective approach to understanding an argument’s logic and choosing the best answer to the given question. Unlike other guides that attempt to convey everything in a single tome, the Critical Reasoning Strategy Guide is designed to provide deep, focused coverage of one specialized area tested on the GMAT. As a result, students benefit from thorough and comprehensive subject material, clear explanations of fundamental principles, and step-by-step instructions of important techniques. In-action practice problems and detailed answer explanations challenge the student, while topical sets of Official Guide problems provide the opportunity for further growth. Used by itself or with other Manhattan GMAT Strategy Guides, the Critical Reasoning Guide will help students develop all the knowledge, skills, and strategic thinking necessary for success on the GMAT. Purchase of this book includes one year of access to Manhattan GMAT’s online computer-adaptive practice exams and Critical Reasoning Question Bank. All of Manhattan Prep’s GMAT Strategy Guides are aligned with both the 2015 Edition and 13th Edition GMAC Official Guide.
Fatal Prescription: A Doctor without Remorse
John Griffiths - 1995
a remarkable story—Leeza Gibbons, NBC-TV • Grippingly told ... a wonderful, powerful book—David Berner, Radio CKNW Vancouver • Reads with the pace of a taut thriller—George Henderson, Gloucestershire Citizen • Mesmerizing—Bob Stall, Vancouver Province. Now revised and updated. The amazing, true story of how medical authorities allow a family doctor to continue practising even after he begins living with a 15-year-old patient—and allegedly has sex with another girl in exchange for giving drugs to her father. The notorious doctor still carries on as before and a third patient complains about infamous conduct—until he silences her by putting out a contract for murder.
The Spy and the Traitor: The Greatest Espionage Story of the Cold War
Ben Macintyre - 2018
In his grey suit and tie, he looked like any other Soviet citizen. The bag alone was mildly conspicuous, printed with the red logo of Safeway, the British supermarket.The man was a spy for MI6. A senior KGB officer, for more than a decade he had supplied his British spymasters with a stream of priceless secrets from deep within the Soviet intelligence machine. No spy had done more to damage the KGB. The Safeway bag was a signal: to activate his escape plan to be smuggled out of Soviet Russia. So began one of the boldest and most extraordinary episodes in the history of spying. Ben Macintyre reveals a tale of espionage, betrayal and raw courage that changed the course of the Cold War forever...
The Everything Guide to Writing a Romance Novel
Christie Craig - 2008
This simple guide—written by two awardwinning romance novelists—will show readers what it takes to break into this highly competitive market and will provide them the information they need to get their manuscript out of the slush pile and onto the bookshelf. Readers will learn how to do the following techniques: build a story from premise to plot; add a fresh twist to a classic storyline; create compelling characters; write sizzling sex scenes that carry an emotional punch; research agents and markets; write a story that an editor can’t reject; and promote themselves and their work. New writers, and even experienced writers, will find the solid howto information here invaluable. This is a musthave for aspiring writers who want to write the perfect love story.