Book picks similar to
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers by Andy Greenberg
non-fiction
nonfiction
politics
technology
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Michal Zalewski - 2005
Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.
Fire and Fury: Inside the Trump White House
Michael Wolff - 2018
Brilliantly reported and astoundingly fresh, Fire and Fury shows us how and why Donald Trump has become the king of discord and disunion.
Digital Minimalism: Choosing a Focused Life in a Noisy World
Cal Newport - 2019
Digital minimalism applies this idea to our personal technology. It's the key to living a focused life in an increasingly noisy world.In this timely and enlightening book, the bestselling author of Deep Work introduces a philosophy for technology use that has already improved countless lives.Digital minimalists are all around us. They're the calm, happy people who can hold long conversations without furtive glances at their phones. They can get lost in a good book, a woodworking project, or a leisurely morning run. They can have fun with friends and family without the obsessive urge to document the experience. They stay informed about the news of the day, but don't feel overwhelmed by it. They don't experience "fear of missing out" because they already know which activities provide them meaning and satisfaction.Now, Newport gives us a name for this quiet movement, and makes a persuasive case for its urgency in our tech-saturated world. Common sense tips, like turning off notifications, or occasional rituals like observing a digital sabbath, don't go far enough in helping us take back control of our technological lives, and attempts to unplug completely are complicated by the demands of family, friends and work. What we need instead is a thoughtful method to decide what tools to use, for what purposes, and under what conditions.Drawing on a diverse array of real-life examples, from Amish farmers to harried parents to Silicon Valley programmers, Newport identifies the common practices of digital minimalists and the ideas that underpin them. He shows how digital minimalists are rethinking their relationship to social media, rediscovering the pleasures of the offline world, and reconnecting with their inner selves through regular periods of solitude. He then shares strategies for integrating these practices into your life, starting with a thirty-day "digital declutter" process that has already helped thousands feel less overwhelmed and more in control.Technology is intrinsically neither good nor bad. The key is using it to support your goals and values, rather than letting it use you. This book shows the way.
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Michael Sikorski - 2011
When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.
Can't Even: How Millennials Became the Burnout Generation
Anne Helen Petersen - 2020
While burnout may seem like the default setting for the modern era, in Can’t Even, BuzzFeed culture writer and former academic Anne Helen Petersen argues that burnout is a definitional condition for the millennial generation, born out of distrust in the institutions that have failed us, the unrealistic expectations of the modern workplace, and a sharp uptick in anxiety and hopelessness exacerbated by the constant pressure to “perform” our lives online. The genesis for the book is Petersen’s viral BuzzFeed article on the topic, which has amassed over eight million reads since its publication in January 2019.Can’t Even goes beyond the original article, as Petersen examines how millennials have arrived at this point of burnout (think: unchecked capitalism and changing labor laws) and examines the phenomenon through a variety of lenses—including how burnout affects the way we work, parent, and socialize—describing its resonance in alarming familiarity. Utilizing a combination of sociohistorical framework, original interviews, and detailed analysis, Can’t Even offers a galvanizing, intimate, and ultimately redemptive look at the lives of this much-maligned generation, and will be required reading for both millennials and the parents and employers trying to understand them.
The Future of the Internet and How to Stop It
Jonathan L. Zittrain - 2008
With the unwitting help of its users, the generative Internet is on a path to a lockdown, ending its cycle of innovation—and facilitating unsettling new kinds of control.IPods, iPhones, Xboxes, and TiVos represent the first wave of Internet-centered products that can’t be easily modified by anyone except their vendors or selected partners. These “tethered appliances” have already been used in remarkable but little-known ways: car GPS systems have been reconfigured at the demand of law enforcement to eavesdrop on the occupants at all times, and digital video recorders have been ordered to self-destruct thanks to a lawsuit against the manufacturer thousands of miles away. New Web 2.0 platforms like Google mash-ups and Facebook are rightly touted—but their applications can be similarly monitored and eliminated from a central source. As tethered appliances and applications eclipse the PC, the very nature of the Internet—its “generativity,” or innovative character—is at risk.The Internet’s current trajectory is one of lost opportunity. Its salvation, Zittrain argues, lies in the hands of its millions of users. Drawing on generative technologies like Wikipedia that have so far survived their own successes, this book shows how to develop new technologies and social structures that allow users to work creatively and collaboratively, participate in solutions, and become true “netizens.”The book is available to download under a Creative Commons Attribution Non-Commercial Share-Alike 3.0 license: Download PDF. http://futureoftheinternet.org/download
The Spy and the Traitor: The Greatest Espionage Story of the Cold War
Ben Macintyre - 2018
In his grey suit and tie, he looked like any other Soviet citizen. The bag alone was mildly conspicuous, printed with the red logo of Safeway, the British supermarket.The man was a spy for MI6. A senior KGB officer, for more than a decade he had supplied his British spymasters with a stream of priceless secrets from deep within the Soviet intelligence machine. No spy had done more to damage the KGB. The Safeway bag was a signal: to activate his escape plan to be smuggled out of Soviet Russia. So began one of the boldest and most extraordinary episodes in the history of spying. Ben Macintyre reveals a tale of espionage, betrayal and raw courage that changed the course of the Cold War forever...
The Forever War
Dexter Filkins - 2008
We go into the homes of suicide bombers and into street-to-street fighting with a battalion of marines. We meet Iraqi insurgents, an American captain who loses a quarter of his men in eight days, and a young soldier from Georgia on a rooftop at midnight reminiscing about his girlfriend back home. A car bomb explodes, bullets fly, and a mother cradles her blinded son.Like no other book, The Forever War allows us a visceral understanding of today’s battlefields and of the experiences of the people on the ground, warriors and innocents alike. It is a brilliant, fearless work, not just about America’s wars after 9/11, but ultimately about the nature of war itself.
The Code Breaker: Jennifer Doudna, Gene Editing, and the Future of the Human Race
Walter Isaacson - 2021
As she sped through the pages, she became enthralled by the intense drama behind the competition to discover the code of life. Even though her high school counselor told her girls didn’t become scientists, she decided she would.Driven by a passion to understand how nature works and to turn discoveries into inventions, she would help to make what the book’s author, James Watson, told her was the most important biological advance since his co-discovery of the structure of DNA. She and her collaborators turned a curiosity of nature into an invention that will transform the human race: an easy-to-use tool that can edit DNA. Known as CRISPR, it opened a brave new world of medical miracles and moral questions. The development of CRISPR and the race to create vaccines for coronavirus will hasten our transition to the next great innovation revolution. The past half-century has been a digital age, based on the microchip, computer, and internet. Now we are entering a life-science revolution. Children who study digital coding will be joined by those who study genetic code. Should we use our new evolution-hacking powers to make us less susceptible to viruses? What a wonderful boon that would be! And what about preventing depression? Hmmm…Should we allow parents, if they can afford it, to enhance the height or muscles or IQ of their kids? After helping to discover CRISPR, Doudna became a leader in wrestling with these moral issues and, with her collaborator Emmanuelle Charpentier, won the Nobel Prize in 2020.
This Changes Everything: Capitalism vs. The Climate
Naomi Klein - 2014
It's not about carbon—it's about capitalism. The good news is that we can seize this crisis to transform our failed economic system and build something radically better. In her most provocative book yet, Naomi Klein, author of the global bestsellers Shock Doctrine and No Logo, exposes the myths that are clouding climate debate. You have been told the market will save us, when in fact the addiction to profit and growth is digging us in deeper every day. You have been told it's impossible to get off fossil fuels when in fact we know exactly how to do it—it just requires breaking every rule in the 'free-market' playbook. You have also been told that humanity is too greedy and selfish to rise to this challenge. In fact, all around the world, the fight back is already succeeding in ways both surprising and inspiring. It's about changing the world, before the world changes so drastically that no one is safe. Either we leap—or we sink. This Changes Everything is a book that will redefine our era.
Move Fast and Break Things: How Facebook, Google, and Amazon Cornered Culture and Undermined Democracy
Jonathan Taplin - 2017
Since 2001, newspaper and music revenues have fallen by 70%, book publishing, film and television profits have also fallen dramatically. Revenues at Google in this same period grew from $400 million to $74.5 billion. Google's YouTube today controls 60% of the streaming audio business and pays only 11% of the streaming audio revenues. More creative content is being consumed than ever before, but less revenue is flowing to creators and owners of the content.With the reallocation of money to monopoly platforms comes a shift in power. Google, Facebook, and Amazon now enjoy political power on par with Big Oil and Big Pharma, which in part explains how such a tremendous shift in revenues from artists to platforms could have been achieved and why it has gone unchallenged for so long.The stakes in this story go far beyond the livelihood of any one musician or journalist. As Taplin observes, the fact that more and more Americans receive their news, music and other forms of entertainment from a small group of companies poses a real threat to democracy. Move Fast and Break Things offers a vital, forward-thinking prescription for how artists can reclaim their audiences using knowledge of the past and a determination to work together. Using his own half-century career as a music and film producer and early pioneer of streaming video online, Taplin offers new ways to think about the design of the World Wide Web and specifically the way we live with the firms that dominate it.Table of contentsIntroduction1. The Great Disruption2. Levon's Story3. Tech's Counterculture Roots4. The Libertarian Counterinsurgency5. Digital Destruction6. Monopoly in the Digital Age7. Google's Regulatory Capture8. The Social Media Revolution9. Pirates of the Internet10. Libertarian and the 1 Percent11. What It Means to Be Human12. The Digital RenaissanceAfterword
The Chickenshit Club: Why the Justice Department Fails to Prosecute Executives
Jesse Eisinger - 2017
The Chickenshit Club—an inside reference to prosecutors too scared of failure and too daunted by legal impediments to do their jobs—explains why in “an absorbing financial history, a monumental work of journalism…a first-rate study of the federal bureaucracy” (Bloomberg Businessweek).Jesse Eisigner begins the story in the 1970s, when the government pioneered the notion that top corporate executives, not just seedy crooks, could commit heinous crimes and go to prison. He brings us to trading desks on Wall Street, to corporate boardrooms and the offices of prosecutors and FBI agents. These revealing looks provide context for the evolution of the Justice Department’s approach to pursuing corporate criminals through the early 2000s and into the Justice Department’s approach to pursuing corporate criminals through the early 2000s and into the Justice Department of today, including the prosecutorial fiascos, corporate lobbying, trial losses, and culture shifts that have stripped the government of the will and ability to prosecute top corporate executives.“Brave and elegant….a fearless reporter…Eisinger’s important and profound book takes no prisoners (The Washington Post). Exposing one of the most important scandals of our time, The Chickenshit Club provides a clear, detailed explanation as to how our Justice Department has come to avoid, bungle, and mismanage the fight to bring these alleged criminals to justice. “This book is a wakeup call…a chilling read, and a needed one” (NPR.org).
Zero Day
Mark E. Russinovich - 2011
An oil tanker runs aground in Japan when its navigational system suddenly stops dead. Hospitals everywhere have to abandon their computer databases when patients die after being administered incorrect dosages of their medicine. In the Midwest, a nuclear power plant nearly becomes the next Chernobyl when its cooling systems malfunction.At first, these random computer failures seem like unrelated events. But Jeff Aiken, a former government analyst who quit in disgust after witnessing the gross errors that led to 9/11, thinks otherwise. Jeff fears a more serious attack targeting the U.S. computer infrastructure is already under way. And as other menacing computer malfunctions pop up around the world, some with deadly results, he realizes that there isn't much time if he hopes to prevent an international catastrophe.Written by a global authority on cyber security, Zero Day presents a chilling "what if" scenario that, in a world completely reliant on technology, is more than possible today -- it's a cataclysmic disaster just waiting to happen.
American Overdose: The Opioid Tragedy in Three Acts
Chris McGreal - 2018
But American Overdose exposes the powerful forces they were up against, including the pharmaceutical industry's coopting of the Food and Drug Administration and Congress in the drive to push painkillers--resulting in the resurgence of heroin cartels in the American heartland. McGreal tells the story, in terms both broad and intimate, of people hit by a catastrophe they never saw coming. Years in the making, its ruinous consequences will stretch years into the future.
Inside Cyber Warfare: Mapping the Cyber Underworld
Jeffrey Carr - 2009
You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and PalestineDiscover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nationsRead about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survivalFind out why many attacks originate from servers in the United States, and who's responsibleLearn how hackers are "weaponizing" malware to attack vulnerabilities at the application level