Book picks similar to
Exploding Data: Reclaiming Our Cybersecurity in the Digital Age by Michael Chertoff
non-fiction
technology
politics
tech
Rise of the Machines: A Cybernetic History
Thomas Rid - 2016
Rise of the Machines reclaims the spectacular story of cybernetics, one of the twentieth century’s pivotal ideas.Springing from the mind of mathematician Norbert Wiener amid the devastation of World War II, the cybernetic vision underpinned a host of seductive myths about the future of machines. Cybernetics triggered blissful cults and military gizmos, the Whole Earth Catalog and the air force’s foray into virtual space, as well as crypto-anarchists fighting for internet freedom.In Rise of the Machines, Thomas Rid draws on unpublished sources—including interviews with hippies, anarchists, sleuths, and spies—to offer an unparalleled perspective into our anxious embrace of technology.
The Zero Marginal Cost Society: The Internet of Things, the Collaborative Commons, and the Eclipse of Capitalism
Jeremy Rifkin - 2014
(Marginal cost is the cost of producing additional units of a good or service, if fixed costs are not counted.) While economists have always welcomed a reduction in marginal cost, they never anticipated the possibility of a technological revolution that might bring marginal costs to near zero, making goods and services priceless, nearly free, and abundant, and no longer subject to market forces.Now, a formidable new technology infrastructure—the Internet of things (IoT)—is emerging with the potential of pushing large segments of economic life to near zero marginal cost in the years ahead. Rifkin describes how the Communication Internet is converging with a nascent Energy Internet and Logistics Internet to create a new technology platform that connects everything and everyone. Billions of sensors are being attached to natural resources, production lines, the electricity grid, logistics networks, recycling flows, and implanted in homes, offices, stores, vehicles, and even human beings, feeding Big Data into an IoT global neural network. Prosumers can connect to the network and use Big Data, analytics, and algorithms to accelerate efficiency, dramatically increase productivity, and lower the marginal cost of producing and sharing a wide range of products and services to near zero, just like they now do with information goods.The plummeting of marginal costs is spawning a hybrid economy—part capitalist market and part Collaborative Commons—with far reaching implications for society, according to Rifkin. Hundreds of millions of people are already transferring parts of their economic lives to the global Collaborative Commons. Prosumers are plugging into the fledgling IoT and making and sharing their own information, entertainment, green energy, and 3D-printed products at near zero marginal cost. They are also sharing cars, homes, clothes and other items via social media sites, rentals, redistribution clubs, and cooperatives at low or near zero marginal cost. Students are enrolling in free massive open online courses (MOOCs) that operate at near zero marginal cost. Social entrepreneurs are even bypassing the banking establishment and using crowdfunding to finance startup businesses as well as creating alternative currencies in the fledgling sharing economy. In this new world, social capital is as important as financial capital, access trumps ownership, sustainability supersedes consumerism, cooperation ousts competition, and "exchange value" in the capitalist marketplace is increasingly replaced by "sharable value" on the Collaborative Commons.Rifkin concludes that capitalism will remain with us, albeit in an increasingly streamlined role, primarily as an aggregator of network services and solutions, allowing it to flourish as a powerful niche player in the coming era. We are, however, says Rifkin, entering a world beyond markets where we are learning how to live together in an increasingly interdependent global Collaborative Commons.
Hacking: The Art of Exploitation
Jon Erickson - 2003
This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
File System Forensic Analysis
Brian Carrier - 2005
Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.
The Imagineers of War: The Untold Story of DARPA, the Pentagon Agency That Changed the World
Sharon Weinberger - 2017
Founded in 1958 in response to the launch of Sputnik, DARPA has been responsible for countless inventions and technologies that have evolved from the agency's mission: forward-thinking solutions to the Pentagon's challenges. Sharon Weinberger gives us a riveting account of DARPA's successes and failures, useful innovations and wild-eyed schemes: we see how the nuclear threat sparked investment in computer networking, which led to the Internet, as well as plans to power a missile-seeking particle beam by draining the Great Lakes...how, in Vietnam, DARPA developed technology for the world's first armed drones and was also responsible for Agent Orange... how DARPA's recent success with self-driving cars is counterbalanced with its disappointing contributions to the Afghanistan and Iraq wars. Weinberger has spoken to dozens of former DARPA and Pentagon officials--many of whom had never been interviewed before about their work with the agency--and synthesized countless documents obtained under the Freedom of Information Act. The result is a riveting history of a meeting point of science, technology, and politics.
Cypherpunks: Freedom and the Future of the Internet
Julian Assange - 2012
Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us. Among the topics addressed are: Do Facebook and Google constitute "the greatest surveillance machine that ever existed," perpetually tracking our location, our contacts and our lives? Far from being victims of that surveillance, are most of us willing collaborators? Are there legitimate forms of surveillance, for instance in relation to the "Four Horsemen of the Infopocalypse" (money laundering, drugs, terrorism and pornography)? And do we have the ability, through conscious action and technological savvy, to resist this tide and secure a world where freedom is something which the Internet helps bring about?The harassment of WikiLeaks and other Internet activists, together with attempts to introduce anti-file sharing legislation such as SOPA and ACTA, indicate that the politics of the Internet have reached a crossroads. In one direction lies a future that guarantees, in the watchwords of the cypherpunks, "privacy for the weak and transparency for the powerful"; in the other lies an Internet that allows government and large corporations to discover ever more about internet users while hiding their own activities. Assange and his co-discussants unpick the complex issues surrounding this crucial choice with clarity and engaging enthusiasm.
Accessory to War: The Unspoken Alliance Between Astrophysics and the Military
Neil deGrasse Tyson - 2018
Spanning early celestial navigation to satellite-enabled warfare, Accessory to War is a richly researched and provocative examination of the intersection of science, technology, industry, and power that will introduce Tyson’s millions of fans to yet another dimension of how the universe has shaped our lives and our world.
Dataclysm: Who We Are (When We Think No One's Looking)
Christian Rudder - 2014
In Dataclysm, Christian Rudder uses it to show us who we truly are. For centuries, we’ve relied on polling or small-scale lab experiments to study human behavior. Today, a new approach is possible. As we live more of our lives online, researchers can finally observe us directly, in vast numbers, and without filters. Data scientists have become the new demographers. In this daring and original book, Rudder explains how Facebook "likes" can predict, with surprising accuracy, a person’s sexual orientation and even intelligence; how attractive women receive exponentially more interview requests; and why you must have haters to be hot. He charts the rise and fall of America’s most reviled word through Google Search and examines the new dynamics of collaborative rage on Twitter. He shows how people express themselves, both privately and publicly. What is the least Asian thing you can say? Do people bathe more in Vermont or New Jersey? What do black women think about Simon & Garfunkel? (Hint: they don’t think about Simon & Garfunkel.) Rudder also traces human migration over time, showing how groups of people move from certain small towns to the same big cities across the globe. And he grapples with the challenge of maintaining privacy in a world where these explorations are possible. Visually arresting and full of wit and insight, Dataclysm is a new way of seeing ourselves—a brilliant alchemy, in which math is made human and numbers become the narrative of our time.
Chatter: Dispatches from the Secret World of Global Eavesdropping
Patrick Radden Keefe - 2005
In the late 1990s, when Keefe was a graduate student in England, he heard stories about an eavesdropping network led by the United States that spanned the planet. The system, known as Echelon, allowed America and its allies to intercept the private phone calls and e-mails of civilians and governments around the world. Taking the mystery of Echelon as his point of departure, Keefe explores the nature and context of communications interception, drawing together fascinating strands of history, fresh investigative reporting, and riveting, eye-opening anecdotes. The result is a bold and distinctive book, part detective story, part travel-writing, part essay on paranoia and secrecy in a digital age.Chatter starts out at Menwith Hill, a secret eavesdropping station covered in mysterious, gargantuan golf balls, in England’s Yorkshire moors. From there, the narrative moves quickly to another American spy station hidden in the Australian outback; from the intelligence bureaucracy in Washington to the European Parliament in Brussels; from an abandoned National Security Agency base in the mountains of North Carolina to the remote Indian Ocean island of Diego Garcia. As Keefe chases down the truth of contemporary surveillance by intelligence agencies, he unearths reams of little-known information and introduces us to a rogue’s gallery of unforgettable characters. We meet a former British eavesdropper who now listens in on the United States Air Force for sport; an intelligence translator who risked prison to reveal an American operation to spy on the United Nations Security Council; a former member of the Senate committee on intelligence who says that oversight is so bad, a lot of senators only sit on the committee for the travel.Provocative, often funny, and alarming without being alarmist, Chatter is a journey through a bizarre and shadowy world with vast implications for our security as well as our privacy. It is also the debut of a major new voice in nonfiction.
Targeted: My Inside Story of Cambridge Analytica and How Trump and Facebook Broke Democracy
Brittany Kaiser - 2019
A veteran of Barack Obama's 2008 campaign, Kaiser's goal was to utilize data for humanitarian purposes, most notably to prevent genocide and human rights abuses. But her experience inside Cambridge Analytica opened her eyes to the tremendous risks that this unregulated industry poses to privacy and democracy.Targeted is Kaiser's eyewitness chronicle of the dramatic and disturbing story of the rise and fall of Cambridge Analytica. She reveals to the public how Facebook's lax policies and lack of sufficient national laws allowed voters to be manipulated in both Britain and the United States, where personal data was weaponized to spread fake news and racist messaging during the Brexit vote and the 2016 election. But the damage isn't done Kaiser warns; the 2020 election can be compromised as well if we continue to do nothing.In the aftermath of the U.S. election, as she became aware of the horrifying reality of what Cambridge Analytica had done in support of Donald Trump, Kaiser made the difficult choice to expose the truth. Risking her career, relationships, and personal safety, she told authorities about the data industry's unethical business practices, eventually testifying before Parliament about the company's Brexit efforts and helping Special Counsel Robert Mueller's investigation into Russian interference in the 2016 election, alongside at least 10 other international investigations.Packed with never-before-publicly-told stories and insights, Targeted goes inside the secretive meetings with Trump campaign personnel and details the promises Cambridge Analytica made to win. Throughout, Kaiser makes the case for regulation, arguing that legal oversight of the data industry is not only justifiable but essential to ensuring the long-term safety of our democracy.
Learn Windows PowerShell 3 in a Month of Lunches
Don Jones - 2011
Just set aside one hour a day—lunchtime would be perfect—for a month, and you'll be automating Windows tasks faster than you ever thought possible. You'll start with the basics—what is PowerShell and what can you do with it. Then, you'll move systematically through the techniques and features you'll use to make your job easier and your day shorter. This totally revised second edition covers new PowerShell 3 features designed for Windows 8 and Windows Server 2012.Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.What's InsideLearn PowerShell from the beginning—no experience required! Covers PowerShell 3, Windows 8, and Windows Server 2012 Each lesson should take you one hour or lessAbout the TechnologyPowerShell is both a language and an administrative shell with which you can control and automate nearly every aspect of Windows. It accepts and executes commands immediately, and you can write scripts to manage most Windows servers like Exchange, IIS, and SharePoint.Experience with Windows administration is helpful. No programming experience is assumed.Table of ContentsBefore you begin Meet PowerShell Using the help system Running commands Working with providers The pipeline: connecting commands Adding commands Objects: data by another name The pipeline, deeper Formatting—and why it's done on the right Filtering and comparisons A practical interlude Remote control: one to one, and one to many Using Windows Management Instrumentation Multitasking with background jobs Working with many objects, one at a time Security alert! Variables: a place to store your stuff Input and output Sessions: remote control with less work You call this scripting? Improving your parameterized script Advanced remoting configuration Using regular expressions to parse text files Additional random tips, tricks, and techniques Using someone else's script Never the end PowerShell cheat sheet
How Music Got Free: The End of an Industry, the Turn of the Century, and the Patient Zero of Piracy
Stephen Richard Witt - 2015
It’s about the greatest pirate in history, the most powerful executive in the music business, a revolutionary invention and an illegal website four times the size of the iTunes Music Store. Journalist Stephen Witt traces the secret history of digital music piracy, from the German audio engineers who invented the mp3, to a North Carolina compact-disc manufacturing plant where factory worker Dell Glover leaked nearly two thousand albums over the course of a decade, to the high-rises of midtown Manhattan where music executive Doug Morris cornered the global market on rap, and, finally, into the darkest recesses of the Internet.Through these interwoven narratives, Witt has written a thrilling book that depicts the moment in history when ordinary life became forever entwined with the world online — when, suddenly, all the music ever recorded was available for free. In the page-turning tradition of writers like Michael Lewis and Lawrence Wright, Witt’s deeply-reported first book introduces the unforgettable characters—inventors, executives, factory workers, and smugglers—who revolutionized an entire artform, and reveals for the first time the secret underworld of media pirates that transformed our digital lives.An irresistible never-before-told story of greed, cunning, genius, and deceit, How Music Got Free isn’t just a story of the music industry—it’s a must-read history of the Internet itself.
Never Enough: A Navy SEAL Commander on Living a Life of Excellence, Agility, and Meaning
Mike Hayes - 2021
He has been held at gunpoint and threatened with execution. He’s jumped out of a building rigged to explode, helped amputate a teammate’s leg, and made countless split-second life-and-death decisions. He’s written countless emails to his family, telling them how much he loves them, just in case those were the last words of his they’d ever read. Outside of the SEALs, he’s run meetings in the White House Situation Room, negotiated international arms treaties, and developed high-impact corporate strategies.Over his many years of leadership, he has always strived to be better, to contribute more, and to put others first. That’s what makes him an effective leader, and it’s the quality that he’s identified in all of the great leaders he’s encountered. That continual striving to lift those around him has filled Mike’s life with meaning and purpose, has made him secure in the knowledge that he brings his best to everything he does, and has made him someone others can rely on.In Never Enough, Mike Hayes recounts dramatic stories and offers battle- and boardroom-tested advice that will motivate readers to do work of value, live lives of purpose, and stretch themselves to reach their highest potential.
UNIX and Linux System Administration Handbook
Evi Nemeth - 2010
This is one of those cases. The UNIX System Administration Handbook is one of the few books we ever measured ourselves against." -From the Foreword by Tim O'Reilly, founder of O'Reilly Media "This book is fun and functional as a desktop reference. If you use UNIX and Linux systems, you need this book in your short-reach library. It covers a bit of the systems' history but doesn't bloviate. It's just straightfoward information delivered in colorful and memorable fashion." -Jason A. Nunnelley"This is a comprehensive guide to the care and feeding of UNIX and Linux systems. The authors present the facts along with seasoned advice and real-world examples. Their perspective on the variations among systems is valuable for anyone who runs a heterogeneous computing facility." -Pat Parseghian The twentieth anniversary edition of the world's best-selling UNIX system administration book has been made even better by adding coverage of the leading Linux distributions: Ubuntu, openSUSE, and RHEL. This book approaches system administration in a practical way and is an invaluable reference for both new administrators and experienced professionals. It details best practices for every facet of system administration, including storage management, network design and administration, email, web hosting, scripting, software configuration management, performance analysis, Windows interoperability, virtualization, DNS, security, management of IT service organizations, and much more. UNIX(R) and Linux(R) System Administration Handbook, Fourth Edition, reflects the current versions of these operating systems: Ubuntu(R) LinuxopenSUSE(R) LinuxRed Hat(R) Enterprise Linux(R)Oracle America(R) Solaris(TM) (formerly Sun Solaris)HP HP-UX(R)IBM AIX(R)
Cognitive Surplus: Creativity and Generosity in a Connected Age
Clay Shirky - 2010
For decades, technology encouraged people to squander their time and intellect as passive consumers. Today, tech has finally caught up with human potential. In Cognitive Surplus, Internet guru Clay Shirky forecasts the thrilling changes we will all enjoy as new digital technology puts our untapped resources of talent and goodwill to use at last. Since we Americans were suburbanized and educated by the postwar boom, we've had a surfeit of intellect, energy, and time-what Shirky calls a cognitive surplus. But this abundance had little impact on the common good because television consumed the lion's share of it-and we consume TV passively, in isolation from one another. Now, for the first time, people are embracing new media that allow us to pool our efforts at vanishingly low cost. The results of this aggregated effort range from mind expanding-reference tools like Wikipedia-to lifesaving-such as Ushahidi.com, which has allowed Kenyans to sidestep government censorship and report on acts of violence in real time. Shirky argues persuasively that this cognitive surplus-rather than being some strange new departure from normal behavior-actually returns our society to forms of collaboration that were natural to us up through the early twentieth century. He also charts the vast effects that our cognitive surplus- aided by new technologies-will have on twenty-first-century society, and how we can best exploit those effects. Shirky envisions an era of lower creative quality on average but greater innovation, an increase in transparency in all areas of society, and a dramatic rise in productivity that will transform our civilization. The potential impact of cognitive surplus is enormous. As Shirky points out, Wikipedia was built out of roughly 1 percent of the man-hours that Americans spend watching TV every year. Wikipedia and other current products of cognitive surplus are only the iceberg's tip. Shirky shows how society and our daily lives will be improved dramatically as we learn to exploit our goodwill and free time like never before.