Book picks similar to
Surveillance Zone: The Hidden World of Corporate Surveillance Detection & Covert Special Operations by Ami Toben
security
espionage
nonfiction
adversarial-mindset
The 99% Invisible City: A Field Guide to the Hidden World of Everyday Design
Roman Mars - 2020
The show celebrates design and architecture in all of its functional glory and accidental absurdity, with intriguing tales of both designers and the people impacted by their designs.Now, in The 99% Invisible City: A Field Guide to Hidden World of Everyday Design, host Roman Mars and coauthor Kurt Kohlstedt zoom in on the various elements that make our cities work, exploring the origins and other fascinating stories behind everything from power grids and fire escapes to drinking fountains and street signs. With deeply researched entries and beautiful line drawings throughout, The 99% Invisible City will captivate devoted fans of the show and anyone curious about design, urban environments, and the unsung marvels of the world around them.
Practical Cryptography
Niels Ferguson - 2003
The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies. Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers. Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).
Flash Boys: A Wall Street Revolt
Michael Lewis - 2014
stock market has been rigged for the benefit of insiders. They band together—some of them walking away from seven-figure salaries—to investigate, expose, and reform the insidious new ways that Wall Street generates profits. If you have any contact with the market, even a retirement account, this story is happening to you.
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
Don Murdoch - 2014
The BTHb includes essential information in a condensed handbook format. Main topics include the incident response process, how attackers work, common tools for incident response, a methodology for network analysis, common indicators of compromise, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, packet headers, and numerous other quick reference topics. The book is designed specifically to share "real life experience," so it is peppered with practical techniques from the authors' extensive career in handling incidents. Whether you are writing up your cases notes, analyzing potentially suspicious traffic, or called in to look over a misbehaving server - this book should help you handle the case and teach you some new techniques along the way.
Syria: A History of the Last Hundred Years
John McHugo - 2014
In this timely account, John McHugo seeks to contextualize the headlines, providing broad historical perspective and a richly layered analysis of a country few in the United States know or understand.McHugo charts the history of Syria from World War I to the tumultuous present, examining the country’s thwarted attempts at independence, the French policies that sowed the seeds of internal strife, and the fragility of its foundations as a nation. He then turns to more recent events: religious and sectarian tensions that have riven Syria, the pressures of the Cold War and the Arab-Israeli conflict, and two generations of rule by the Assads.The result is a fresh and rigorous narrative that explains both the creation and unraveling of the current regime and the roots of the broader Middle East conflict. As the Syrian civil war threatens to draw the U.S. military once again into the Middle East, here is a rare and authoritative guide to a complex nation that demands our attention.
Burning Fight: The Nineties Hardcore Revolution in Ethics, Politics, Spirit, and Sound
Brian Peterson - 2009
Burning Fight draws upon the memories of more than 150 individuals, many who played influential roles in the nineties hardcore scene, to understand what made this era so unique in its ability to synthesize music, politics, social issues and spirituality into a powerful counter-cultural movement. Includes interviews with Los Crudos, Unbroken, Earth Crisis, Inside Out, Avail, Shelter, Texas Is The Reason, Mouthpiece, Trial, Swing Kids, Coalesce, Burn, & many more.
Mastering ArcGIS
Maribeth H. Price - 2003
The author's step-by-step approach helps students negotiate the challenging tasks involved in learning sophisticated GIS software. The fifth edition is updated to follow the new software release of ArcGIS 10. An innovative and unique feature of "Mastering ArcGIS" is its accompanying CD-ROM with narrated video clips that show students exactly how to perform chapter tutorials before attempting an exercise on their own.
Android Phones for Dummies
Dan Gookin - 2012
Veteran world-renowned author Dan Gookin walks you through everything from getting started with setup and configuration to making the most of your phone's potential with texting, e-mailing, accessing the Internet and social networking sites, using the camera, synching with a PC, downloading apps, and more.Covers all the details of the operating system that applies to every Android phone, including Motorola Droids, HTC devices, Samsung Galaxy S phones, to name a few Walks you through basic phone operations while also encouraging you to explore your phone's full potential Serves as an ideal guide to an inexperienced Android newbie who is enthusiastic about getting a handle on everything an Android phone can do Android Phones For Dummies helps you get smarter with your Android smartphone.
Led by Donkeys: How Four Friends with a Ladder Took on Brexit
Led By Donkeys - 2020
Seeking to highlight the hypocrisy of their politicians on Brexit four friends armed with nothing more than ladders, roller brushes and a treasure trove of damning statements from their leaders slapped up the politicians' biggest lies on billboards around the country. This guerrilla operation wasn't easy, but it wasn't long before the British public enabled them to take things into their own hands - and the rest is history. Leave the EU or remain? An apparently simple question divided the nation in historic fashion. Many believed the words of these politicians. By putting up their quotes as billboards, self-styled 'Led By Donkeys' had clear intentions - to compare the promises that have been made across the years with the damning reality.
(ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple - 2018
This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Four unique 250 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Michael Hale Ligh - 2010
Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.
Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions
Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more
Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions
Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
A Deal With the Devil: Discovering Chris Watts: - Part Two - The Facts
Netta Newbound - 2020
How to Get Away With Murder in America
Evan Wright - 2012
Investigative reporting on a CIA officer from Miami who may have had ties to a cocaine trafficker while rising to the top of the agency's counter-terrorist division during 9/11.
Puppy Preschool: Raising Your Puppy Right---Right from the Start!
John Ross - 1996
He's warm, cuddly, great to hold and pet-- and simply a lot of fun.But watch out! Your adorable ball of fur can be a doggone handful. Given half the chance, he may take it upon himself to eat your furniture, terrorize the kids, dig up the garden, jump on your friends, and eliminate at the most inappropriate times.Let's face it, sometimes what you get raising a puppy can be a "dog's breakfast"-- a mixed bag of happiness and hassle. In order to make it through puppyhood with your sanity still in tact, you need to enroll your pup in Puppy Preschool.Here, in Puppy Preschool, John Ross and Barbara McKinney, the country's foremost dog-training experts, reveal the benefits of early training in this definitive guide devoted exclusively to the trials and triumphs of puppy rearing. Puppy Preschool rewrites the rules on puppy training. While previous training books begin their programs when the puppy has already reached four months of age, Puppy Preschool begins educating and disciplining at just eight weeks old, the time when most puppies are brought into their new homes. Using surefire, revolutionary techniques, Ross and McKinney provide a much-needed head start on good behavior. They offer essential training rules that will be useful throughout your puppy's formative education, including information on:* The right breed for your family or your lifestyle* The ten best breeds for the home* Early leash and collar procedures* Housebreaking* Preventing unwanted chewing* Health and grooming tips* Emergency care* Essential puppy-training equipment and safe, fun toys* A breakdown of puppy development from birth to eighteen months* The best ways for small children to interact with puppiesdn0Based on the same training philosophy presented in their classic book, Dog Talk, of raising your dog from a "canine point of view," Ross and McKinney give easy-to-follow training techniques that will make puppy rearing a great experience for everyone involved.