The Carry-On Traveller: The Ultimate Guide to Packing Light


Erin McNeaney - 2016
    You struggle to fit everything in your bag, you get stressed lugging it around, and you pay a fortune in airline luggage fees.The Carry-On Traveller will teach you not only how to lighten your load, but how to pack everything you need into a single carry-on-size bag. You can apply these strategies to any trip, whether you are travelling for a week or a year, to hot or cold climates, alone or with kids.By travelling carry-on only, you’ll save time at airports, avoid wasting money on checked luggage fees (which are increasingly common), and reduce the stress of hauling bulky bags.It’s not an all or nothing approach. Packing light is a learning process, and you might want to take it gradually. Even if you don’t travel carry-on only on your next trip, this book will help you pack lighter.

How to Disappear: Erase your Digital Footprint, Leave False Trails, and Vanish without A Trace


Frank M. Ahearn - 2010
    How to Disappear is the authoritative and comprehensive guide for people who seek to protect their privacy as well as for anyone who’s ever entertained the fantasy of disappearing—whether actually dropping out of sight or by eliminating the traceable evidence of their existence.

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers


Andy Greenberg - 2019
    Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes became ever more brazen, eventually leading to the first-ever blackouts triggered by hackers. They culminated in the summer of 2017 when malware known as NotPetya was unleashed, compromising, disrupting, and paralyzing some of the world's largest companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. NotPetya spread around the world, inflicting an unprecedented ten billions of dollars in damage--the largest, most penetrating cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in the internet's history: Sandworm. Believed to be working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored hacking force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.From WIRED senior writer Andy Greenberg comes Sandworm, the true story of the desperate hunt to identify and track those attackers. It considers the danger this force poses to our national stability and security. And as the Kremlin's role in manipulating foreign governments and sparking chaos globally comes into greater focus, Sandworm reveals the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield--where the line between digital and physical conflict begins to blur, with world-shaking implications.

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race


Nicole Perlroth - 2021
    One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine).For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down.Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.

The Case of the Missing Moon Rocks


Joe Kloc - 2012
    Decades ago, astronauts brought back 850 pounds of rocks from their lunar journeys; the U.S. gave some away as “goodwill” gifts to the world’s nations. Over time, many of them disappeared, stolen or lost in the aftermath of political turmoil, and offered for millions on the black market. Gutheinz, first as a NASA investigator and then the leader of a intrepid group of students, has dedicated his life to getting them back. Author Joe Kloc tells a wild story of geopolitics, crime, science, and one man’s obsession with keeping the moon out of the wrong hands.

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World


Bruce Schneier - 2015
    Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.

Spycraft Rebooted: How Technology is Changing Espionage


Edward Lucas - 2018
    Once, intelligence operations could employ James Bond-style forgeries and disguises to infiltrate a target, but modern-day spies must succeed at the seemingly impossible: to hide in plain sight in a world where everything is visible.Our technology-reliant lives are a trail of electronic interactions; from card payments to CCTV, we leave involuntary and often unwitting digital footprints. Faking this online trail is hard, while the lack of one is dangerously conspicuous. When even an expertly forged ID has little chance against biometric databases and facial recognition technology, how can open societies’ intelligence agencies continue to operate undercover?In this gripping, meticulously researched study, drawing on numerous real-life cases, Edward Lucas, an acclaimed espionage expert, tracks the changing landscape of international spycraft—and highlights the West’s growing disadvantage against its autocratic adversaries.

Understanding Air France 447


Bill Palmer - 2013
    Written by A330 Captain, Bill Palmer, this book opens to understanding the actions of the crew, how they failed to understand and control the problem, and how the airplane works and the part it played. All in easy to understand terms.Addressed are the many contributing aspects of weather, human factors, and airplane system operation and design that the crew could not recover from. How each contributed is covered in detail along with what has been done, and needs to be done in the future to prevent this from happening again.Also see the book's companion website: UnderstandingAF447.com for supplemental materials referred to in the book or to contact the author.

Dissecting The Hack: The F0rb1dd3n Network


Jayson E. Street - 2009
    One half massive case study, one half technical manual, Dissecting the Hack has it all - learn all about hacking tools and techniques and how to defend your network against threats. Yes, the security threats are real - read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit and expunge with the tools and techniques shown in the story. Every hack is real and can be used by you once you have the knowledge within this book! Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their codeIntroduces basic hacking techniques in real life context for ease of learningPresented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack

The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen


Jonathan Littman - 1997
    Busted as a teenager for hacking into Pac Bell phone networks, Kevin Poulsen would find his punishment was a job with a Silicon Valley defense contractor. By day he seemed to have gone straight, toiling on systems for computer-aided war. But by night he burglarized telephone switching offices, adopting the personae and aliases of his favorite comic-book anti heroes - the Watchmen. When authorities found a locker crammed with swiped telecommunications equipment, Poulsen became a fugitive from the FBI, living the life of a cyberpunk in a neon Hollywood underground. Soon he made the front pages of the New York Times and became the first hacker charged with espionage. Littman takes us behind the headlines and into the world of Poulsen and his rogues' gallery of cyberthieves. Drawing on hundreds of hours of interviews with Poulsen, his confederates, and the authorities, he spins a thrilling chase story on the electronic frontier. The nation's phone network was Poulsen's playground. On Los Angeles's lucrative radio giveaways, Poulsen worked his magic, winning Porsches and tens of thousands of dollars. He secretly switched on the numbers of defunct Yellow Pages escort ads and took his cut of the profits. And he could wiretap or electronically stalk whomever he pleased, his childhood love or movie stars. The FBI seemed no match for Poulsen. But as Unsolved Mysteries prepared a broadcast on the hacker's crimes, LAPD vice stumbled onto his trail, and an undercover operation began on Sunset Strip.

The Assault on Intelligence: American National Security in an Age of Lies


Michael V. Hayden - 2018
    Meanwhile, the world order is teetering on the brink. North Korea is on the verge of having a nuclear weapon that could reach all of the United States, Russians have mastered a new form of information warfare that undercuts democracy, and the role of China in the global community remains unclear. There will always be value to experience and expertise, devotion to facts, humility in the face of complexity, and a respect for ideas, but in this moment they seem more important, and more endangered, than they've ever been. American Intelligence--the ultimate truth teller--has a responsibility in a post-truth world beyond merely warning of external dangers, and in The Assault on Intelligence, General Michael Hayden takes up that urgent work with profound passion, insight and authority. It is a sobering vision. The American intelligence community is more at risk than is commonly understood, for every good reason. Civil war or societal collapse is not necessarily imminent or inevitable, but our democracy's core structures, processes, and attitudes are under great stress. Many of the premises on which we have based our understanding of governance are now challenged, eroded, or simply gone. And we have a President in office who responds to overwhelming evidence from the intelligence community that the Russians are, by all acceptable standards of cyber conflict, in a state of outright war against us, not by leading a strong response, but by shooting the messenger. There are fundamental changes afoot in the world and in this country. The Assault on Intelligence shows us what they are, reveals how crippled we've become in our capacity to address them, and points toward a series of effective responses. Because when we lose our intelligence, literally and figuratively, democracy dies.

Criminal Law


Joel Samaha - 2007
    With a balanced blend of case excerpts and author commentary, Samaha guides you as you hone your critical thinking and legal analysis skills. You'll see the principles, defenses, and elements of crime at work as you progress through the book-and you'll learn about the general principles of criminal liability and its defenses, as well as the elements of crimes against persons property, society, and crimes against the state. Featuring the latest topics and court cases, as well as many study tools to help you do well in this course, Samaha's CRIMINAL LAW is a text you will want to keep as a valuable reference even after you graduate and begin your career in the criminal justice field of your choosing.

Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance


Julia Angwin - 2014
    We are being watched.We see online ads from websites we've visited, long after we've moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what's in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines.In Dragnet Nation, award-winning investigative journalist Julia Angwin reports from the front lines of America's surveillance economy, offering a revelatory and unsettling look at how the government, private companies, and even criminals use technology to indiscriminately sweep up vast amounts of our personal data. In a world where we can be watched in our own homes, where we can no longer keep secrets, and where we can be impersonated, financially manipulated, or even placed in a police lineup, Angwin argues that the greatest long-term danger is that we start to internalize the surveillance and censor our words and thoughts, until we lose the very freedom that makes us unique individuals. Appalled at such a prospect, Angwin conducts a series of experiments to try to protect herself, ranging from quitting Google to carrying a "burner" phone, showing how difficult it is for an average citizen to resist the dragnets' reach.Her book is a cautionary tale for all of us, with profound implications for our values, our society, and our very selves.

Dark Territory: The Secret History of Cyber War


Fred Kaplan - 2016
    The general said it was. This set in motion the first presidential directive on computer security.The first use of cyber techniques in battle occurred in George H.W. Bush's Kuwait invasion in 1991 to disable Saddam's military communications. One year later, the NSA Director watched Sneakers, in which one of the characters says wars will soon be decided not by bullets or bombs but by information. The NSA and the Pentagon have been rowing over control of cyber weapons ever since.From the 1994 (aborted) US invasion of Haiti, when the plan was to neutralize Haitian air-defenses by making all the telephones in Haiti busy at the same time, to Obama's Defense Department 2015 report on cyber policy that spells out the lead role played by our offensive operation, Fred Kaplan tells the story of the NSA and the Pentagon as they explore, exploit, fight, and defend the US. Dark Territory reveals all the details, including the 1998 incident when someone hacked into major US military commands and it wasn't Iraq, but two teenagers from California; how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air-defense radar system; the time in 2014 when North Korea hacks Sony's networks to pressure the studio to cancel a major Hollywood blockbuster; and many more. Dark Territory is the most urgent and controversial topic in national defense policy.

Nikon D3100 for Dummies


Julie Adair King - 2010
    Say you?re already an experienced photographer? The helpful tips and tricks in this friendly book will get you quickly up to speed on the D3100's new 14-megapixel sensor, continous video/live focus, full HD video, expanded autofocus, and more. As a seasoned instructor at the Palm Beach Photographic Center, Julie anticipates all questions, whether you?re a beginner or digital camera pro, and offers pages of easy-to-follow advice.Helps you get every bit of functionality out of the new Nikon D3100 camera Walks you through its exciting new features, including the 14-megapixel sensor, continous video/live focus, full HD video, expanded autofocus, and the updated in-camera menu Explores shooting in Auto mode, managing playback options, and basic troubleshooting Explains how to adjust the camera's manual settings for your own preferred exposure, lighting, focus, and color style Covers digital photo housekeeping tips?how to organize, edit, and share your files Tap all the tools in this hot new DSLR camera and start taking some great pix with Nikon D3100 For Dummies.