The Mueller Report


The Washington Post - 2019
    This edition from The Washington Post/Scribner contains: —The long-awaited Report On The Investigation Into Russian Interference In The 2016 Presidential Election —An introduction by The Washington Post titled “A President, a Prosecutor, and the Protection of American Democracy” —A timeline of the major events of the Special Counsel’s investigation from May 2017, when Robert Mueller was appointed, to the report's delivery —A guide to individuals involved, including in the Special Counsel’s Office, the Department of Justice, the FBI, the Trump Campaign, the White House, the Trump legal defense team, and the Russians —Key documents in the Special Counsel’s investigation, including filings pertaining to General Michael T. Flynn, Paul Manafort, Michael Cohen, Roger Stone, and the Russian internet operation in St. Petersburg. Each document is introduced and explained by Washington Post reporters. One of the most urgent and important investigations ever conducted, the Mueller inquiry focuses on Donald Trump, his presidential campaign, and Russian interference in the 2016 election, and draws on the testimony of dozens of witnesses and the work of some of the country’s most seasoned prosecutors. The special counsel’s investigation looms as a turning point in American history. The Mueller Report is essential reading for all citizens concerned about the fate of the presidency and the future of our democracy.

My Kindle Fire (My...)


Jim Cheshire - 2011
    With this book you will learn how to tap into every Kindle Fire feature, including many of the hidden ones not discussed in other books. From setting up your Kindle Page, managing your music, watching movies, and downloading content - this book covers everything. The task based full-color format allows you to quickly and easily find the exact task you want to accomplish and walks you through it in a delightfully concise and visual manner. My Kindle Fire makes it easy for you to:• Master all the basics, fast: reading, playing, watching, browsing, and more• Tweak your Kindle Fire for quicker access and longer battery life• Sample best-seller book chapters for free• Mark up any eBook with highlights, notes, and bookmarks• Convert your personal documents for use on Kindle Fire• Discover Calibre, a powerful eBook management tool• Control even the largest music libraries• Get instant answers from Wikipedia, and from Kindle Fire’s built-in dictionary• Listen to personalized Internet radio stations created just for you• Use your Kindle Fire as a digital photo frame• Prevent unwanted subscription charges• Set up any email account to work on your Kindle Fire• Explore any web content with Amazon’s innovative Silk browser• Use Amazon Cloud to get your stuff anywhere—even if you left your Kindle at home• And much much more…Unlike many other guides which might only briefly mention or skip over some very import Kindle Fire features My Kindle Fire covers everything. Here are just a few of the things you'll find in My Kindle Fire that aren't covered in other guides: • Full coverage of Calibre, a free application for Mac or PC that helps manage your eBook library• A large number of walkthroughs for managing music playlists, including how to use cloud playlists. • How to reinstall multiple apps at once in case you reset your Kindle Fire. • Step-by-step walkthroughs on configuring all types of email accounts. • Coverage on handling attachments in your email application. • Importing contacts from your existing email application or cloud service and how you can export your contacts in order to back them up. • How to use Copy and Paste on the Kindle Fire. • How to use social networking integration with Facebook and others. • Walkthroughs on using the Gallery app, Pandora, Audible, and other popular apps. • Shows you how to access files on other computers in your house right from your Kindle Fire.

The Gangs of New York


Herbert Asbury - 1927
    It is a tour through a now unrecognizable city of abysmal poverty and habitual violence cobbled, as Luc Sante has written, "from legend, memory, police records, the self-aggrandizements of aging crooks, popular journalism, and solid historical research." Asbury presents the definitive work on this subject, an illumination of the gangs of old New York that ultimately gave rise to the modern Mafia and its depiction in films like The Godfather.

The Dichotomy of Leadership: Balancing the Challenges of Extreme Ownership to Lead and Win


Jocko Willink - 2018
    With their first book, Extreme Ownership (published in October 2015), Jocko Willink and Leif Babin set a new standard for leadership, challenging readers to become better leaders, better followers, and better people, in both their professional and personal lives. Now, in THE DICHOTOMY OF LEADERSHIP, Jocko and Leif dive even deeper into the unchartered and complex waters of a concept first introduced in Extreme Ownership: finding balance between the opposing forces that pull every leader in different directions. Here, Willink and Babin get granular into the nuances that every successful leader must navigate. Mastering the Dichotomy of Leadership requires understanding when to lead and when to follow; when to aggressively maneuver and when to pause and let things develop; when to detach and let the team run and when to dive into the details and micromanage. In addition, every leader must:· Take Extreme Ownership of everything that impacts their mission, yet utilize Decentralize Command by giving ownership to their team. · Care deeply about their people and their individual success and livelihoods, yet look out for the good of the overall team and above all accomplish the strategic mission. · Exhibit the most important quality in a leader—humility, but also be willing to speak up and push back against questionable decisions that could hurt the team and the mission.With examples from the authors’ combat and training experiences in the SEAL teams, and then a demonstration of how each lesson applies to the business world, Willink and Babin clearly explain THE DICHOTOMY OF LEADERSHIP—skills that are mission-critical for any leader and any team to achieve their ultimate goal: VICTORY.

Cop: A True Story


Michael L. Middleton - 1994
    In this brutally honest portrait, Sergeant Michael Middleton--a now-retired veteran of the LAPD--tells the gripping tale of his two decades on some of the America's meanest streets.

Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier


Suelette Dreyfus - 1997
    Spanning three continents and a decade of high level infiltration, they created chaos amongst some of the world's biggest and most powerful organisations, including NASA and the US military. Brilliant and obsessed, many of them found themselves addicted to hacking and phreaking. Some descended into drugs and madness, others ended up in jail.As riveting as the finest detective novel and meticulously researched, Underground follows the hackers through their crimes, their betrayals, the hunt, raids and investigations. It is a gripping tale of the digital underground.

Habeas Data: Privacy vs. the Rise of Surveillance Tech


Cyrus Farivar - 2018
    That means all of the technologies that have made our lives easier, faster, better, and/or more efficient have also simultaneously made it easier to keep an eye on our activities. Or, as we recently learned from reports about Cambridge Analytica, our data might be turned into a propaganda machine against us.  In 10 crucial legal cases, Habeas Data explores the tools of surveillance that exist today, how they work, and what the implications are for the future of privacy.

@War: The Rise of the Military-Internet Complex


Shane Harris - 2014
    In fact, as @WAR shows, U.S. hackers were crucial to our victory in Iraq. Shane Harris delves into the frontlines of America’s new cyber war. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook to collect vast amounts of information. The military has also formed a new alliance with tech and finance companies to patrol cyberspace, and Harris offers a deeper glimpse into this partnership than we have ever seen before. Finally, Harris explains what the new cybersecurity regime means for all of us, who spend our daily lives bound to the Internet — and are vulnerable to its dangers.

Metasploit: The Penetration Tester's Guide


David Kennedy - 2011
    But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software


Michael Sikorski - 2011
    When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.

Security Engineering: A Guide to Building Dependable Distributed Systems


Ross J. Anderson - 2008
    Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

The Coin Store: A True Story of Drug Cartels, Mobsters, Cops and Agents


Patrick Burns , Special Agent (Ret.) - 2016
    He was the King of Cocaine, the wealthiest and most violent criminal in the world. By the 1980s his Medellin Drug Cartel was responsible for smuggling several tons of cocaine into America each and every day, killing thousands of people along the way. The end result was hundreds of millions of dollars in cash profits. In response, and as part of President Reagan’s War on Drugs, Congress created the Money Laundering Act of 1986. The goal was to take the profit out of Escobar’s business. And the plan was working. Drug Money seizures went up. But as U.S. Agents became more and more efficient at finding the dirty cash, stashed inside ship bellies and truck beds at America’s ports and land borders, Pablo and other Cartel leaders sought a more efficient method to get their money back to Colombia. They found the solution in an unlikely place, a dusty back room of a tiny, rare coin shop in the small town of Cranston, Rhode Island. The shop owner was a young, local mobster who had already been laundering much of the Mob's stolen gold. With a few minor adjustments, his coin shop evolved into a springboard for a new venture, a billion dollar money laundering scheme. The Italian Mafia's stolen gold was used to dispose of the Colombian Cartel's dirty cash. It was the perfect scheme, brilliant. As his customer base grew, the young mobster, known as Fat Man, a.k.a. Mr. Cash, set up a string of phony gold shops crisscrossing America. The end result was one of the world's largest, most efficient money laundering networks. By some accounts, Fat Man laundered more than a billion dollars of drug profits for Pablo Escobar and the other Cartel leaders. This is the true story of how it all happened. It is a step –by- step view of how the scheme worked and how it was ultimately uncovered. This story reveals conventional and at times unconventional tactics used by the government in its three-year, worldwide investigation. It is also a behind-the-scenes look at Fat Man himself and his crew, as well as the agents and cops who pursued them. It was unlikely that Fat Man, a small town gangster, would ever become an international money launderer for the Colombian Drug Lords. But what was more unlikely was the fact that it took a rookie agent to finally uncover the scheme. And more unlikely than that was the fact that the rookie agent was Fat Man’s neighbor. Both were born within just a few days from each other, grew up just a few miles from each other, lived in similar blue-collar neighborhoods and even lived in all but identical homes. And both were influenced, in very different ways, by the New England Mob, which was headquartered nearby on Federal Hill in Providence, RI. While Fat Man relished a life of crime, I dreamed of becoming an agent. In 1987, while his scheme originally went unnoticed, I was at the Federal Law Enforcement Training Academy in southern Georgia. One year after the new Money Laundering Law was created, I began work as a new U.S. Treasury Agent. My first post of duty was Providence, RI. My first assignment was to follow a lead, a suspicious cash deposit at a local bank. It was originally considered to be a dead end, “keep busy” work for a new, inexperienced agent with little to do. But that changed when I followed the lead to Fat Man’s Coin Store. This is how it all happened.

DOUBT: The Madeleine McCann Mystery (Gone Girl Book 1)


Nick van der Leek - 2017
    We also know the original lead investigator, Goncalo Amaral’s, counter-narrative, now a legally defensible matter of public record. The questions that arise from these opposing narratives are dead simple: Which narrative is more credible? Which narrator is more credible? What was the motive behind all the publicity? Neither Madeleine nor her abductor ultimately benefited from the ongoing media barrage, so who did? True crime maestro, Nick van der Leek, plumbs quagmires of confusion and a thicket of thorny inconsistencies to probe what lies beneath: the psychologies. What is the significance of "doctors" as suspects? Did it matter or mean anything that the McCanns and their cabal of friends in the Algarve were mostly doctors? Peeling away the gossamer threads, over the course of just four days [April 29th – May 2nd], van der Leek intuits that very little was routine: not the weather, not where meals were eaten, not where or when they slept and not what they did as a family. But what were their routines when it came to other, murkier things, like sleeping patterns, cell phones and sedatives? Drawing intangibles out of the darkness, van der Leek sews the vexing loose ends from several conflicting stories into a definite - if not definitive - end-result.