Book picks similar to
Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves by Adam Levin
non-fiction
nonfiction
business
cybersecurity
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
Gabriella Coleman - 2014
She ended up becoming so closely connected to Anonymous that the tricky story of her inside–outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.The narrative brims with details unearthed from within a notoriously mysterious subculture, whose semi-legendary tricksters—such as Topiary, tflow, Anachaos, and Sabu—emerge as complex, diverse, politically and culturally sophisticated people. Propelled by years of chats and encounters with a multitude of hackers, including imprisoned activist Jeremy Hammond and the double agent who helped put him away, Hector Monsegur, Hacker, Hoaxer, Whistleblower, Spy is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age, including the history of “trolling,” the ethics and metaphysics of hacking, and the origins and manifold meanings of “the lulz.”
The Four: The Hidden DNA of Amazon, Apple, Facebook, and Google
Scott Galloway - 2017
Just about everyone thinks they know how they got there. Just about everyone is wrong. For all that's been written about the Four over the last two decades, no one has captured their power and staggering success as insightfully as Scott Galloway.Instead of buying the myths these compa-nies broadcast, Galloway asks fundamental questions. How did the Four infiltrate our lives so completely that they're almost impossible to avoid (or boycott)? Why does the stock market forgive them for sins that would destroy other firms? And as they race to become the world's first trillion-dollar company, can anyone chal-lenge them?In the same irreverent style that has made him one of the world's most celebrated business professors, Galloway deconstructs the strategies of the Four that lurk beneath their shiny veneers. He shows how they manipulate the fundamental emotional needs that have driven us since our ancestors lived in caves, at a speed and scope others can't match. And he reveals how you can apply the lessons of their ascent to your own business or career.Whether you want to compete with them, do business with them, or simply live in the world they dominate, you need to understand the Four.
Spy the Lie: Three Former CIA Officers Reveal Their Secrets to Uncloaking Deception
Philip Houston - 2012
Be it hiring a new employee, investing in a financial interest, speaking with your child about drugs, confronting your significant other about suspected infidelity, or even dating someone new, having the ability to unmask a lie can have far-reaching and even life-altering consequences.As former CIA officers, Philip Houston, Michael Floyd, and Susan Carnicero are among the world’s best at recognizing deceptive behavior. Spy the Lie chronicles the captivating story of how they used a methodology Houston developed to detect deception in the counterterrorism and criminal investigation realms, and shows how these techniques can be applied in our daily lives.Through fascinating anecdotes from their intelligence careers, the authors teach listeners how to recognize deceptive behaviors, both verbal and nonverbal, that we all tend to display when we respond to questions untruthfully. For the first time, they share with the general public their methodology and their secrets to the art of asking questions that elicit the truth.Spy the Lie is a game-changer. You may never experience another book that has a more dramatic impact on your career, your relationships, or your future.©2012 Philip Houston, Susan Carnicero, Don Tennant, Michael Floyd (P)2012 Macmillan
The Honest Truth About Dishonesty: How We Lie to Everyone - Especially Ourselves
Dan Ariely - 2012
From Washington to Wall Street, the classroom to the workplace, unethical behavior is everywhere. None of us is immune, whether it's the white lie to head off trouble or padding our expense reports. In The (Honest) Truth About Dishonesty, award-winning, bestselling author Dan Ariely turns his unique insight and innovative research to the question of dishonesty.Generally, we assume that cheating, like most other decisions, is based on a rational cost-benefit analysis. But Ariely argues, and then demonstrates, that it's actually the irrational forces that we don't take into account that often determine whether we behave ethically or not. For every Enron or political bribe, there are countless puffed résumés, hidden commissions, and knockoff purses. In The (Honest) Truth About Dishonesty, Ariely shows why some things are easier to lie about; how getting caught matters less than we think; and how business practices pave the way for unethical behavior, both intentionally and unintentionally. Ariely explores how unethical behavior works in the personal, professional, and political worlds, and how it affects all of us, even as we think of ourselves as having high moral standards.But all is not lost. Ariely also identifies what keeps us honest, pointing the way for achieving higher ethics in our everyday lives. With compelling personal and academic findings, The (Honest) Truth About Dishonesty will change the way we see ourselves, our actions, and others.
The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
Adam Segal - 2016
Nation-states wielded military force, financial pressure, and diplomatic persuasion to create “world order.” Even after the end of the Cold War, the elements comprising world order remained essentially unchanged.But 2012 marked a transformation in geopolitics and the tactics of both the established powers and smaller entities looking to challenge the international community. That year, the US government revealed its involvement in Operation “Olympic Games,” a mission aimed at disrupting the Iranian nuclear program through cyberattacks; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield.Cyber conflict is hard to track, often delivered by proxies, and has outcomes that are hard to gauge. It demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, cybersecurity expert Adam Segal reveals, power has been well and truly hacked.
The Developer's Code: What Real Programmers Do
Ka Wai Cheung - 2012
There are no trite superlatives here. Packed with lessons learned from more than a decade of software development experience, author Ka Wai Cheung takes you through the programming profession from nearly every angle to uncover ways of sustaining a healthy connection with your work. You'll see how to stay productive even on the longest projects. You'll create a workflow that works with you, not against you. And you'll learn how to deal with clients whose goals don't align with your own. If you don't handle them just right, issues such as these can crush even the most seasoned, motivated developer. But with the right approach, you can transcend these common problems and become the professional developer you want to be. In more than 50 nuggets of wisdom, you'll learn: Why many traditional approaches to process and development roles in this industry are wrong - and how to sniff them out. Why you must always say "no" to the software pet project and open-ended timelines. How to incorporate code generation into your development process, and why its benefits go far beyond just faster code output. What to do when your client or end user disagrees with an approach you believe in. How to pay your knowledge forward to future generations of programmers through teaching and evangelism. If you're in this industry for the long run, you'll be coming back to this book again and again.
MCSA/MCSE Self-Paced Training Kit (Exam 70-290): Managing and Maintaining a Microsoft Windows Server 2003 Environment
Dan Holme - 2003
As you d expect, there s accurate, clearly written coverage of every exam objective (now including Service Pack 1): installation and configuration; user, group, and computer accounts; filesystems and backup/recovery; hardware, disk storage, and printers; Update Services and licensing; monitoring, and more. The content s been extensively revamped and more effectively focused on the exam s objectives. There s also a large Prepare for the Test section packed with questions, answers, testing skills, and suggested practices. You ll find more case studies, more troubleshooting scenarios, electronic practice testing in practically any form your heart desires, and (if you don t have Windows Server handy) a 120-day evaluation version. There s even a 15% discount coupon for your exam -- making this package an even more compelling proposition. Bill Camarda, from the June 2006 href="http://www.barnesandnoble.com/newslet... Only
Python Crash Course: A Hands-On, Project-Based Introduction to Programming
Eric Matthes - 2015
You'll also learn how to make your programs interactive and how to test your code safely before adding it to a project. In the second half of the book, you'll put your new knowledge into practice with three substantial projects: a Space Invaders-inspired arcade game, data visualizations with Python's super-handy libraries, and a simple web app you can deploy online.As you work through Python Crash Course, you'll learn how to: Use powerful Python libraries and tools, including matplotlib, NumPy, and PygalMake 2D games that respond to keypresses and mouse clicks, and that grow more difficult as the game progressesWork with data to generate interactive visualizationsCreate and customize simple web apps and deploy them safely onlineDeal with mistakes and errors so you can solve your own programming problemsIf you've been thinking seriously about digging into programming, Python Crash Course will get you up to speed and have you writing real programs fast. Why wait any longer? Start your engines and code!
Bottle of Lies: The Inside Story of the Generic Drug Boom
Katherine Eban - 2019
Drawing on exclusive accounts from whistleblowers and regulators, as well as thousands of pages of confidential FDA documents, Eban reveals an industry where fraud is rampant, companies routinely falsify data, and executives circumvent almost every principle of safe manufacturing to minimize cost and maximize profit, confident in their ability to fool inspectors. Meanwhile, patients unwittingly consume medicine with unpredictable and dangerous effects.The story of generic drugs is truly global. It connects middle America to China, India, sub-Saharan Africa and Brazil, and represents the ultimate litmus test of globalization: what are the risks of moving drug manufacturing offshore, and are they worth the savings? A decade-long investigation with international sweep, high-stakes brinkmanship and big money at its core, Bottle of Lies reveals how the world’s greatest public-health innovation has become one of its most astonishing swindles.
Content Strategy for the Web
Kristina Halvorson - 2009
Redesigning your home page won't help. Investing in a new content management system won't fix it, either. So, where do you start? Without meaningful content, your website isn't worth much to your key audiences. But creating (and caring for) "meaningful" content is far more complicated than we're often willing to acknowledge. Content Strategy for the Web explains how to create and deliver useful, usable content for your online audiences, when and where they need it most. It also shares content best practices so you can get your next website redesign right, on time and on budget. For the first time, you'll: See content strategy (and its business value) explained in plain languageFind out why so many web projects implode in the content development phase ... and how to avoid the associated, unnecessary costs and delaysLearn how to audit and analyze your contentMake smarter, achievable decisions about which content to create and howFind out how to maintain consistent, accurate, compelling content over timeGet solid, practical advice on staffing for content-related roles and responsibilities "
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
Mark Dowd - 2006
Drawing on their extraordinary experience, they introduce a start-to-finish methodology for "ripping apart" applications to reveal even the most subtle and well-hidden security flaws.
iGen: Why Today’s Super-Connected Kids Are Growing Up Less Rebellious, More Tolerant, Less Happy--and Completely Unprepared for Adulthood--and What That Means for the Rest of Us
Jean M. Twenge - 2017
Born in the mid-1990s to the mid-2000s and later, iGen is the first generation to spend their entire adolescence in the age of the smartphone. With social media and texting replacing other activities, iGen spends less time with their friends in person—perhaps why they are experiencing unprecedented levels of anxiety, depression, and loneliness. But technology is not the only thing that makes iGen distinct from every generation before them; they are also different in how they spend their time, how they behave, and in their attitudes toward religion, sexuality, and politics. They socialize in completely new ways, reject once sacred social taboos, and want different things from their lives and careers. More than previous generations, they are obsessed with safety, focused on tolerance, and have no patience for inequality. iGen is also growing up more slowly than previous generations: eighteen-year-olds look and act like fifteen-year-olds used to. As this new group of young people grows into adulthood, we all need to understand them: Friends and family need to look out for them; businesses must figure out how to recruit them and sell to them; colleges and universities must know how to educate and guide them. And members of iGen also need to understand themselves as they communicate with their elders and explain their views to their older peers. Because where iGen goes, so goes our nation—and the world.
One Click: Jeff Bezos and the Rise of Amazon.com
Richard L. Brandt - 2011
It can almost be summed up by the button on every page: "Buy now with one click."Why has Amazon been so successful? Much of it has to do with Jeff Bezos, the CEO and founder, whose unique combination of character traits and business strategy have driven Amazon to the top of the online retail world.Richard Brandt charts Bezos's rise from computer nerd to world- changing entrepreneur. His success can be credited to his forward-looking insights and ruthless business sense. Brandt explains: Why Bezos decided to allow negative product reviews, correctly guessing that the earned trust would outweigh possible lost sales. Why Amazon zealously guards some patents yet freely shares others. Why Bezos called becoming profitable the "dumbest" thing they could do in 1997. How Amazon.com became one of the only dotcoms to survive the bust of the early 2000s. Where the company is headed next.Through interviews with Amazon employees, competitors, and observers, Brandt has deciphered how Bezos makes decisions. The story of Amazon's ongoing evolution is a case study in how to reinvent an entire industry, and one that anyone in business today ignores at their peril.
The Filter Bubble: What the Internet is Hiding From You
Eli Pariser - 2011
Instead of giving you the most broadly popular result, Google now tries to predict what you are most likely to click on. According to MoveOn.org board president Eli Pariser, Google's change in policy is symptomatic of the most significant shift to take place on the Web in recent years - the rise of personalization. In this groundbreaking investigation of the new hidden Web, Pariser uncovers how this growing trend threatens to control how we consume and share information as a society-and reveals what we can do about it.Though the phenomenon has gone largely undetected until now, personalized filters are sweeping the Web, creating individual universes of information for each of us. Facebook - the primary news source for an increasing number of Americans - prioritizes the links it believes will appeal to you so that if you are a liberal, you can expect to see only progressive links. Even an old-media bastion like "The Washington Post" devotes the top of its home page to a news feed with the links your Facebook friends are sharing. Behind the scenes a burgeoning industry of data companies is tracking your personal information to sell to advertisers, from your political leanings to the color you painted your living room to the hiking boots you just browsed on Zappos.In a personalized world, we will increasingly be typed and fed only news that is pleasant, familiar, and confirms our beliefs - and because these filters are invisible, we won't know what is being hidden from us. Our past interests will determine what we are exposed to in the future, leaving less room for the unexpected encounters that spark creativity, innovation, and the democratic exchange of ideas.While we all worry that the Internet is eroding privacy or shrinking our attention spans, Pariser uncovers a more pernicious and far-reaching trend on the Internet and shows how we can - and must - change course. With vivid detail and remarkable scope, The Filter Bubble reveals how personalization undermines the Internet's original purpose as an open platform for the spread of ideas and could leave us all in an isolated, echoing world.
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kevin Poulsen - 2011
Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As the black-hat 'Iceman', he'd seen the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, and in their dysfunction was the ultimate challenge: he would stage a coup and steal their ill-gotten gains from right under their noses.Through the story of Max Butler's remarkable rise, KINGPIN lays bare the workings of a silent crime wave affecting millions worldwide. It exposes vast online-fraud supermarkets stocked with credit card numbers, counterfeit cheques, hacked bank accounts and fake passports. Thanks to Kevin Poulsen's remarkable access to both cops and criminals, we step inside the quiet,desperate battle that law enforcement fights against these scammers. And learn that the boy next door may not be all he seems.