WikiLeaks: Inside Julian Assange's War on Secrecy


David Leigh - 2011
    A team of journalists with unparalleled inside access provides the first full, in-depth account of WikiLeaks, its founder Julian Assange, and the ethical, legal, and political controversies it has both uncovered and provoked.

Computer Networking: A Top-Down Approach


James F. Kurose - 2000
    Building on the successful top-down approach of previous editions, this fourth edition continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts.

Bitcoin Billionaires: A True Story of Genius, Betrayal, and Redemption


Ben Mezrich - 2019
    While nursing their wounds in Ibiza, they accidentally run into an eccentric character who tells them about a brand-new idea: cryptocurrency. Immersing themselves in what is then an obscure and sometimes sinister world, they begin to realize “crypto” is, in their own words, "either the next big thing or total bulls--t." There’s nothing left to do but make a bet.From the Silk Road to the halls of the Securities and Exchange Commission, Bitcoin Billionaires will take us on a wild and surprising ride while illuminating a tantalizing economic future. On November 26, 2017, the Winklevoss brothers became the first bitcoin billionaires. Here’s the story of how they got there—as only Ben Mezrich could tell it.

The Future of the Internet and How to Stop It


Jonathan L. Zittrain - 2008
    With the unwitting help of its users, the generative Internet is on a path to a lockdown, ending its cycle of innovation—and facilitating unsettling new kinds of control.IPods, iPhones, Xboxes, and TiVos represent the first wave of Internet-centered products that can’t be easily modified by anyone except their vendors or selected partners. These “tethered appliances” have already been used in remarkable but little-known ways: car GPS systems have been reconfigured at the demand of law enforcement to eavesdrop on the occupants at all times, and digital video recorders have been ordered to self-destruct thanks to a lawsuit against the manufacturer thousands of miles away. New Web 2.0 platforms like Google mash-ups and Facebook are rightly touted—but their applications can be similarly monitored and eliminated from a central source. As tethered appliances and applications eclipse the PC, the very nature of the Internet—its “generativity,” or innovative character—is at risk.The Internet’s current trajectory is one of lost opportunity. Its salvation, Zittrain argues, lies in the hands of its millions of users. Drawing on generative technologies like Wikipedia that have so far survived their own successes, this book shows how to develop new technologies and social structures that allow users to work creatively and collaboratively, participate in solutions, and become true “netizens.”The book is available to download under a Creative Commons Attribution Non-Commercial Share-Alike 3.0 license: Download PDF. http://futureoftheinternet.org/download

Dark Money: The Hidden History of the Billionaires Behind the Rise of the Radical Right


Jane Mayer - 2016
    But as Jane Mayer shows in this powerful, meticulously reported history, a network of exceedingly wealthy people with extreme libertarian views bankrolled a systematic, step-by-step plan to fundamentally alter the American political system.The network has brought together some of the richest people on the planet. Their core beliefs—that taxes are a form of tyranny; that government oversight of business is an assault on freedom—are sincerely held. But these beliefs also advance their personal and corporate interests: Many of their companies have run afoul of federal pollution, worker safety, securities, and tax laws.The chief figures in the network are Charles and David Koch, whose father made his fortune in part by building oil refineries in Stalin’s Russia and Hitler’s Germany. The patriarch later was a founding member of the John Birch Society, whose politics were so radical it believed Dwight Eisenhower was a communist. The brothers were schooled in a political philosophy that asserted the only role of government is to provide security and to enforce property rights.When libertarian ideas proved decidedly unpopular with voters, the Koch brothers and their allies chose another path. If they pooled their vast resources, they could fund an interlocking array of organizations that could work in tandem to influence and ultimately control academic institutions, think tanks, the courts, statehouses, Congress, and, they hoped, the presidency. Richard Mellon Scaife, the mercurial heir to banking and oil fortunes, had the brilliant insight that most of their political activities could be written off as tax-deductible “philanthropy.”These organizations were given innocuous names such as Americans for Prosperity. Funding sources were hidden whenever possible. This process reached its apotheosis with the allegedly populist Tea Party movement, abetted mightily by the Citizens United decision—a case conceived of by legal advocates funded by the network.The political operatives the network employs are disciplined, smart, and at times ruthless. Mayer documents instances in which people affiliated with these groups hired private detectives to impugn whistle-blowers, journalists, and even government investigators. And their efforts have been remarkably successful. Libertarian views on taxes and regulation, once far outside the mainstream and still rejected by most Americans, are ascendant in the majority of state governments, the Supreme Court, and Congress. Meaningful environmental, labor, finance, and tax reforms have been stymied.Jane Mayer spent five years conducting hundreds of interviews-including with several sources within the network-and scoured public records, private papers, and court proceedings in reporting this book. In a taut and utterly convincing narrative, she traces the byzantine trail of the billions of dollars spent by the network and provides vivid portraits of the colorful figures behind the new American oligarchy.Dark Money is a book that must be read by anyone who cares about the future of American democracy.

Python Crash Course: A Hands-On, Project-Based Introduction to Programming


Eric Matthes - 2015
    You'll also learn how to make your programs interactive and how to test your code safely before adding it to a project. In the second half of the book, you'll put your new knowledge into practice with three substantial projects: a Space Invaders-inspired arcade game, data visualizations with Python's super-handy libraries, and a simple web app you can deploy online.As you work through Python Crash Course, you'll learn how to: Use powerful Python libraries and tools, including matplotlib, NumPy, and PygalMake 2D games that respond to keypresses and mouse clicks, and that grow more difficult as the game progressesWork with data to generate interactive visualizationsCreate and customize simple web apps and deploy them safely onlineDeal with mistakes and errors so you can solve your own programming problemsIf you've been thinking seriously about digging into programming, Python Crash Course will get you up to speed and have you writing real programs fast. Why wait any longer? Start your engines and code!

The Hacker Playbook 2: Practical Guide To Penetration Testing


Peter Kim - 2015
    The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

Accidental Empires


Robert X. Cringely - 1992
    Accidental Empires is the trenchant, vastly readable history of that industry, focusing as much on the astoundingly odd personalities at its core—Steve Jobs, Bill Gates, Mitch Kapor, etc. and the hacker culture they spawned as it does on the remarkable technology they created. Cringely reveals the manias and foibles of these men (they are always men) with deadpan hilarity and cogently demonstrates how their neuroses have shaped the computer business. But Cringely gives us much more than high-tech voyeurism and insider gossip. From the birth of the transistor to the mid-life crisis of the computer industry, he spins a sweeping, uniquely American saga of creativity and ego that is at once uproarious, shocking and inspiring.

Threat Modeling: Designing for Security


Adam Shostack - 2014
    Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.

The Go Programming Language


Alan A.A. Donovan - 2015
    It has been winning converts from dynamic language enthusiasts as well as users of traditional compiled languages. The former appreciate the robustness and efficiency that Go's lightweight type system brings to their code; the latter find Go's simplicity and fast tools a refreshing change. Thanks to its well-designed standard libraries and its excellent support for concurrent programming, Go is fast becoming the language of choice for distributed systems. The Go Programming Language is the definitive book on Go for the working programmer. It assumes no prior knowledge of Go, nor any other specific programming language, so you'll find it an accessible guide whether you come from JavaScript, Ruby, Python, Java, or C++. The book will quickly get you started using Go effectively from the beginning, and by the end, you will know how to use it well to write clear, idiomatic and efficient programs to solve real-world problems. You'll understand not just how to use its standard libraries, but how they work, and how to apply the same design techniques to your own projects. The earlier chapters will introduce you to the basic concepts of Go programming---numbers, strings, functions---while at the same time presenting important computer science concepts like recursion, and useful examples of graphics, UTF-8, and error handling. The chapters on methods and interfaces will show you a new way to think about object-oriented programming; the chapter on concurrency explains why concurrency is so important in modern programming, and how Go helps you handle it well. You'll also learn about Go's pragmatic but effective approach to testing; how to build, test, and manage projects using the go tool, and the art of metaprogramming using reflection. The book contains hundreds of interesting and practical examples that cover the whole language and a wide range of applications. The code samples from the book are available for download from gopl.io.

Parkland: Birth of a Movement


Dave Cullen - 2019
    David Hogg called out Adult America. The uprising had begun. Cameron Kasky immediately recruited a colorful band of theatre kids and rising activists and brought them together in his living room to map out a movement. Four days after escaping Marjory Stoneman Douglas High School, two dozen extraordinary kids announced the audacious March for Our Lives. A month later, it was the fourth largest protest in American history.Dave Cullen, who has been reporting on the epidemic of school shootings for two decades, takes us along on the students’ nine-month odyssey to the midterms and beyond. With unrivaled access to their friends and families, meetings and homes, he pulls back the curtain to reveal intimate portraits of the quirky, playful organizers that have taken the nation by storm. Cullen brings us onto the bus for the Road to Change tour showing us how these kids seized an opportunity. They hit the highway to organize the young activist groups mushrooming across America in their image. Rattled but undeterred, they pressed on in gun country even as adversaries armed with assault weapons tailed them across Texas and Utah trying to scare them off. The Parkland students are genuinely candid about their experiences. We see them cope with shattered friendships and PTSD, along with the normal day-to-day struggles of school, including AP exams and college acceptances. Yet, with the idealism of youth they are mostly bubbling with fresh ideas. As victims refusing victimhood, they continue to devise clever new tactics to stir their generation to action while building a powerhouse network to match the NRA’s. This spell-binding book is a testament to change and a perceptive examination of a pivotal moment in American culture. After two decades of adult hand-wringing, the MFOL kids are mapping a way out. They see a long road ahead, a generational struggle to save every kid of every color from the ravages of gun violence in America. Parkland is a story of staggering empowerment and hope, told through the wildly creative and wickedly funny voices of a group of remarkable kids.

Prisoners of Geography: Ten Maps That Tell You Everything You Need to Know About Global Politics


Tim Marshall - 2015
    Their choices are limited by mountains, rivers, seas, and concrete. To understand world events, news organizations and other authorities often focus on people, ideas, and political movements, but without geography, we never have the full picture. Now, in the relevant and timely Prisoners of Geography, seasoned journalist Tim Marshall examines Russia, China, the USA, Latin America, the Middle East, Africa, Europe, Japan and Korea, and Greenland and the Arctic—their weather, seas, mountains, rivers, deserts, and borders—to provide a context often missing from our political reportage: how the physical characteristics of these countries affect their strengths and vulnerabilities and the decisions made by their leaders.In ten, up-to-date maps of each region, Marshall explains in clear and engaging prose the complex geo-political strategies of these key parts of the globe. What does it mean that Russia must have a navy, but also has frozen ports six months a year? How does this affect Putin’s treatment of Ukraine? How is China’s future constrained by its geography? Why will Europe never be united? Why will America never be invaded? Shining a light on the unavoidable physical realities that shape all of our aspirations and endeavors, Prisoners of Geography is the critical guide to one of the major (and most often overlooked) determining factors in world history.

The Signal and the Noise: Why So Many Predictions Fail—But Some Don't


Nate Silver - 2012
    He solidified his standing as the nation's foremost political forecaster with his near perfect prediction of the 2012 election. Silver is the founder and editor in chief of FiveThirtyEight.com. Drawing on his own groundbreaking work, Silver examines the world of prediction, investigating how we can distinguish a true signal from a universe of noisy data. Most predictions fail, often at great cost to society, because most of us have a poor understanding of probability and uncertainty. Both experts and laypeople mistake more confident predictions for more accurate ones. But overconfidence is often the reason for failure. If our appreciation of uncertainty improves, our predictions can get better too. This is the "prediction paradox": The more humility we have about our ability to make predictions, the more successful we can be in planning for the future.In keeping with his own aim to seek truth from data, Silver visits the most successful forecasters in a range of areas, from hurricanes to baseball, from the poker table to the stock market, from Capitol Hill to the NBA. He explains and evaluates how these forecasters think and what bonds they share. What lies behind their success? Are they good-or just lucky? What patterns have they unraveled? And are their forecasts really right? He explores unanticipated commonalities and exposes unexpected juxtapositions. And sometimes, it is not so much how good a prediction is in an absolute sense that matters but how good it is relative to the competition. In other cases, prediction is still a very rudimentary-and dangerous-science.Silver observes that the most accurate forecasters tend to have a superior command of probability, and they tend to be both humble and hardworking. They distinguish the predictable from the unpredictable, and they notice a thousand little details that lead them closer to the truth. Because of their appreciation of probability, they can distinguish the signal from the noise.

Liquid Rules: The Delightful and Dangerous Substances That Flow Through Our Lives


Mark Miodownik - 2018
    Structured around a plane journey that sees encounters with substances from water and glue to coffee and wine, Liquid Rules shows how these liquids can bring death and destruction as well as wonder and fascination.From László Bíró's revolutionary pen and Abraham Gesner's kerosene to cutting-edge research on self-repairing roads and liquid computers, Miodownik uses his winning formula of scientific storytelling to bring the everyday to life. He reveals why liquids can flow up a tree but down a hill, why oil is sticky, how waves can travel so far, and how to make the perfect cup of tea. Here are the secret lives of substances.

The Practice of Network Security Monitoring: Understanding Incident Detection and Response


Richard Bejtlich - 2013
    The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.