Book picks similar to
The Hacker Crackdown: Law and Disorder on the Electronic Frontier by Bruce Sterling
non-fiction
history
nonfiction
technology
The Mythical Man-Month: Essays on Software Engineering
Frederick P. Brooks Jr. - 1975
With a blend of software engineering facts and thought-provoking opinions, Fred Brooks offers insight for anyone managing complex projects. These essays draw from his experience as project manager for the IBM System/360 computer family and then for OS/360, its massive software system. Now, 45 years after the initial publication of his book, Brooks has revisited his original ideas and added new thoughts and advice, both for readers already familiar with his work and for readers discovering it for the first time.The added chapters contain (1) a crisp condensation of all the propositions asserted in the original book, including Brooks' central argument in The Mythical Man-Month: that large programming projects suffer management problems different from small ones due to the division of labor; that the conceptual integrity of the product is therefore critical; and that it is difficult but possible to achieve this unity; (2) Brooks' view of these propositions a generation later; (3) a reprint of his classic 1986 paper "No Silver Bullet"; and (4) today's thoughts on the 1986 assertion, "There will be no silver bullet within ten years."
Black Code: Inside the Battle for Cyberspace
Robert J. Deibert - 2013
We depend on it for everything we do. We have reengineered our business, governance, and social relations around a planetary network unlike any before it. But there are dangers looming, and malign forces are threatening to transform this extraordinary domain.In Black Code, Ronald J. Deibert, a leading expert on digital technology, security, and human rights, lifts the lid on cyberspace and shows what’s at stake for Internet users and citizens. As cyberspace develops in unprecedented ways, powerful agents are scrambling for control. Predatory cyber criminal gangs such as Koobface have made social media their stalking ground. The discovery of Stuxnet, a computer worm reportedly developed by Israel and the United States and aimed at Iran’s nuclear facilities, showed that state cyberwar is now a very real possibility. Governments and corporations are in collusion and are setting the rules of the road behind closed doors.This is not the way it was supposed to be. The Internet’s original promise of a global commons of shared knowledge and communications is now under threat. Drawing on the first-hand experiences of one of the most important protagonists in the battle — the Citizen Lab and its global network of frontline researchers, who have spent more than a decade cracking cyber espionage rings and uncovering attacks on citizens and NGOs worldwide — Black Code takes readers on a fascinating journey into the battle for cyberspace. Thought-provoking, compelling, and sometimes frightening, it is a wakeup call to citizens who have come to take the Internet for granted. Cyberspace is ours, it is what we make of it, Deibert argues, and we need to act now before it slips through our grasp.
Losing the Signal: The Untold Story Behind the Extraordinary Rise and Spectacular Fall of BlackBerry
Jacquie McNish - 2015
Today that number is one percent. What went so wrong? Losing the Signal is a riveting story of a company that toppled global giants before succumbing to the ruthlessly competitive forces of Silicon Valley. This is not a conventional tale of modern business failure by fraud and greed. The rise and fall of BlackBerry reveals the dangerous speed at which innovators race along the information superhighway. With unprecedented access to key players, senior executives, directors and competitors, Losing the Signal unveils the remarkable rise of a company that started above a bagel store in Ontario. At the heart of the story is an unlikely partnership between a visionary engineer, Mike Lazaridis, and an abrasive Harvard Business school grad, Jim Balsillie. Together, they engineered a pioneering pocket email device that became the tool of choice for presidents and CEOs. The partnership enjoyed only a brief moment on top of the world, however. At the very moment BlackBerry was ranked the world's fastest growing company internal feuds and chaotic growth crippled the company as it faced its gravest test: Apple and Google's entry in to mobile phones. Expertly told by acclaimed journalists, Jacquie McNish and Sean Silcoff, this is an entertaining, whirlwind narrative that goes behind the scenes to reveal one of the most compelling business stories of the new century.
Underground: The Tokyo Gas Attack and the Japanese Psyche
Haruki Murakami - 1997
The unthinkable had happened, a major urban transit system had become the target of a terrorist attack. In an attempt to discover why, Haruki Murakami, internationally acclaimed author of The Wind-Up Bird Chronicle and arguably Japan’s most important contemporary novelist, talked to the people who lived through the catastrophe—from a Subway Authority employee with survivor guilt, to a fashion salesman with more venom for the media than for the perpetrators, to a young cult member who vehemently condemns the attack though he has not quit Aum. Through these and many other voices, Murakami exposes intriguing aspects of the Japanese psyche. And as he discerns the fundamental issues leading to the attack, we achieve a clear vision of an event that could occur anytime, anywhere. Hauntingly compelling and inescapably important, Underground is a powerful work of journalistic literature from one of the world’s most perceptive writers.
Alone Together: Why We Expect More from Technology and Less from Each Other
Sherry Turkle - 2011
Developing technology promises closeness. Sometimes it delivers, but much of our modern life leaves us less connected with people and more connected to simulations of them.In Alone Together, MIT technology and society professor Sherry Turkle explores the power of our new tools and toys to dramatically alter our social lives. It’s a nuanced exploration of what we are looking for—and sacrificing—in a world of electronic companions and social networking tools, and an argument that, despite the hand-waving of today’s self-described prophets of the future, it will be the next generation who will chart the path between isolation and connectivity.
Kali Linux Revealed: Mastering the Penetration Testing Distribution
Raphaël Hertzog - 2017
They provided a secure and reliable foundation, allowing us to concentrate on securing our digital world.An amazing community has built up around Kali Linux. Every month, more than 300,000 of us download a version of Kali. We come together in online and real-world training rooms and grind through the sprawling Offensive Security Penetration Testing Labs, pursuing the near-legendary Offensive Security certifications. We come together on the Kali forums, some 40,000 strong, and hundreds of us at a time can be found on the Kali IRC channel. We gather at conferences and attend Kali Dojos to learn from the developers themselves how to best leverage Kali.However, the Kali team has never released an official Kali Linux manual, until now.In this book, we'll focus on the Kali Linux platform itself, and help you understand and maximize Kali from the ground up. The developers will walk you through Kali Linux features and fundamentals, provide a crash course in basic Linux commands and concepts, and then walk you through the most common Kali Linux installation scenarios. You'll learn how to configure, troubleshoot and secure Kali Linux and then dive into the powerful Debian package manager. Throughout this expansive section, you'll learn how to install and configure packages, how to update and upgrade your Kali installation, and how to create your own custom packages. Then you'll learn how to deploy your custom installation across massive enterprise networks. Finally, you'll be guided through advanced topics such as kernel compilation, custom ISO creation, industrial-strength encryption, and even how to install crypto kill switches to safeguard your sensitive information.Whether you're a veteran or an absolute n00b, this is the best place to start with Kali Linux, the security professional's platform of choice.
The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the Global Economic Order
Paul Vigna - 2015
A cyber-enigma with an enthusiastic following, it pops up in headlines and fuels endless media debate. You can apparently use it to buy anything from coffee to cars, yet few people seem to truly understand what it is. This raises the question: Why should anyone care about bitcoin?In The Age of Cryptocurrency, Wall Street journalists Paul Vigna and Michael J. Casey deliver the definitive answer to this question. Cybermoney is poised to launch a revolution, one that could reinvent traditional financial and social structures while bringing the world's billions of "unbanked" individuals into a new global economy. Cryptocurrency holds the promise of a financial system without a middleman, one owned by the people who use it and one safeguarded from the devastation of a 2008-type crash.But bitcoin, the most famous of the cybermonies, carries a reputation for instability, wild fluctuation, and illicit business; some fear it has the power to eliminate jobs and to upend the concept of a nation state. It implies, above all, monumental and wide-reaching change-for better and for worse. But it is here to stay, and you ignore it at your peril.Vigna and Casey demystify cryptocurrency-its origins, its function, and what you need to know to navigate a cyber-economy. The digital currency world will look very different from the paper currency world; The Age of Cryptocurrency will teach you how to be ready.
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Andrew Jaquith - 2007
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index
The Blue Nowhere
Jeffery Deaver - 2001
To stop him, the authorities free imprisoned former hacker Wyatt Gillette to aid the investigation. Teamed with old-school homicide detective Frank Bishop, Gillette must combine their disparate talents to catch a brilliant and merciless killer.
Refactoring: Improving the Design of Existing Code
Martin Fowler - 1999
Significant numbers of poorly designed programs have been created by less-experienced developers, resulting in applications that are inefficient and hard to maintain and extend. Increasingly, software system professionals are discovering just how difficult it is to work with these inherited, non-optimal applications. For several years, expert-level object programmers have employed a growing collection of techniques to improve the structural integrity and performance of such existing software programs. Referred to as refactoring, these practices have remained in the domain of experts because no attempt has been made to transcribe the lore into a form that all developers could use... until now. In Refactoring: Improving the Design of Existing Software, renowned object technology mentor Martin Fowler breaks new ground, demystifying these master practices and demonstrating how software practitioners can realize the significant benefits of this new process.
Steal This Computer Book 4.0 – What They Won′t Tell You About the Internet 4e
Wallace Wang - 2006
It is an unabashed look at the dark side of the Net--the stuff many other books gloss over. It's hard-edged, wisecracking, and often quite cynical as it pours over the reality of online scams, illegal activities, and simple annoyances. Wang's stated goal is to open the reader's eyes about what's really there. He shows what's being done, how it's being done, and how to avoid problems or even strike back. He begins with a chapter about the news media, and his message is that no source is to be trusted completely. He examines issues important to Internet users: the cost of getting computerized (with tips on how to find the real bargains), who is using the Internet as a source of hate information, and how your privacy can be invaded and protected. He shows you the secrets of malicious hackers and others and how some of them attack computer systems without the ethical mindset typical of the original, idealistic hackers. Wang shows you how you can set up your defenses against such an onslaught, discussing how to protect yourself and your kids from online stalkers and how online con games work. Wang never claims that the Internet is the electronic den of darkness that the pop media make it out to be. But he makes it clear that something this big has its lowlights--it's own "net noir." His messages are "know your enemy" and "be careful who you trust," an ideology verified by the examples he provides. --Elizabeth Lewis This offbeat, non-technical book examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, and entertaining, the completely revised fourth edition of Steal This Computer Book contains new chapters that discuss the hacker mentality, lock picking, exploiting P2P file sharing networks, and how people manipulate search engines and pop-up ads. Includes a CD with hundreds of megabytes of hack
A History of the Future in 100 Objects
Adrian Hon - 2013
Some of the objects are described by future historians; others through found materials, short stories, or dialogues. All come from a very real future.
How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and Informatics
N. Katherine Hayles - 1999
While some marvel at these changes, envisioning consciousness downloaded into a computer or humans "beamed" Star Trek-style, others view them with horror, seeing monsters brooding in the machines. In How We Became Posthuman, N. Katherine Hayles separates hype from fact, investigating the fate of embodiment in an information age.Hayles relates three interwoven stories: how information lost its body, that is, how it came to be conceptualized as an entity separate from the material forms that carry it; the cultural and technological construction of the cyborg; and the dismantling of the liberal humanist "subject" in cybernetic discourse, along with the emergence of the "posthuman."Ranging widely across the history of technology, cultural studies, and literary criticism, Hayles shows what had to be erased, forgotten, and elided to conceive of information as a disembodied entity. Thus she moves from the post-World War II Macy Conferences on cybernetics to the 1952 novel Limbo by cybernetics aficionado Bernard Wolfe; from the concept of self-making to Philip K. Dick's literary explorations of hallucination and reality; and from artificial life to postmodern novels exploring the implications of seeing humans as cybernetic systems.Although becoming posthuman can be nightmarish, Hayles shows how it can also be liberating. From the birth of cybernetics to artificial life, How We Became Posthuman provides an indispensable account of how we arrived in our virtual age, and of where we might go from here.
Gang Leader for a Day: A Rogue Sociologist Takes to the Streets
Sudhir Venkatesh - 2008
Gang Leader for a Day is the fascinating full story of how Sudhir Venkatesh managed to gain entrée into the gang, what he learned, and how his method revolutionized the academic establishment. When Venkatesh walked into an abandoned building in one of Chicago's most notorious housing projects, he was looking for people to take a multiple-choice survey on urban poverty. A first-year grad student, he would befriend a gang leader named JT and spend the better part of the next decade inside the projects under JT's protection, documenting what he saw there. Over the next seven years, Venkatesh observed JT and the rest of the gang as they operated their crack selling business, conducted PR within their community, and rose up or fell within the ranks of the gang's complex organizational structure. Gang Leader for a Day is an inside view into the morally ambiguous, highly intricate, often corrupt struggle to survive in an urban war zone. It is also the story of a complicated friendship between two young and ambitious men, a universe apart.
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
Michael Bazzell - 2012
In this book, he shares his methods in great detail. Each step of his process is explained throughout twenty-five chapters of specialized websites, software solutions, and creative search techniques. Over 250 resources are identified with narrative tutorials and screen captures. This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to "think outside the box" when scouring the internet for personal information. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to use various technologies for an unintended purpose. This book will greatly improve anyone's online investigative skills. Among other techniques, you will learn how to locate: Hidden Social Network Content Cell Phone Subscriber Information Deleted Websites & Posts Missing Facebook Profile Data Full Twitter Account Data Alias Social Network Profiles Free Investigative Software Useful Browser Extensions Alternative Search Engine Results Website Owner Information Photo GPS & Metadata Live Streaming Social Content Social Content by Location IP Addresses of Users Additional User Accounts Sensitive Documents & Photos Private Email Addresses Duplicate Video Posts Mobile App Network Data Unlisted Addresses s Public Government Records Document Metadata Rental Vehicle Contracts Online Criminal Activity Personal Radio Communications Compromised Email Information Automated Collection Solutions Linux Investigative Programs Dark Web Content (Tor) Restricted YouTube Content Hidden Website Details Vehicle Registration Details