Book picks similar to
The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats by Richard A. Clarke
cybersecurity
non-fiction
cyber
technology
The Code Breaker: Jennifer Doudna, Gene Editing, and the Future of the Human Race
Walter Isaacson - 2021
As she sped through the pages, she became enthralled by the intense drama behind the competition to discover the code of life. Even though her high school counselor told her girls didn’t become scientists, she decided she would.Driven by a passion to understand how nature works and to turn discoveries into inventions, she would help to make what the book’s author, James Watson, told her was the most important biological advance since his co-discovery of the structure of DNA. She and her collaborators turned a curiosity of nature into an invention that will transform the human race: an easy-to-use tool that can edit DNA. Known as CRISPR, it opened a brave new world of medical miracles and moral questions. The development of CRISPR and the race to create vaccines for coronavirus will hasten our transition to the next great innovation revolution. The past half-century has been a digital age, based on the microchip, computer, and internet. Now we are entering a life-science revolution. Children who study digital coding will be joined by those who study genetic code. Should we use our new evolution-hacking powers to make us less susceptible to viruses? What a wonderful boon that would be! And what about preventing depression? Hmmm…Should we allow parents, if they can afford it, to enhance the height or muscles or IQ of their kids? After helping to discover CRISPR, Doudna became a leader in wrestling with these moral issues and, with her collaborator Emmanuelle Charpentier, won the Nobel Prize in 2020.
Artificial Intelligence: A Guide for Thinking Humans
Melanie Mitchell - 2019
The award-winning author Melanie Mitchell, a leading computer scientist, now reveals AI’s turbulent history and the recent spate of apparent successes, grand hopes, and emerging fears surrounding it.In Artificial Intelligence, Mitchell turns to the most urgent questions concerning AI today: How intelligent—really—are the best AI programs? How do they work? What can they actually do, and when do they fail? How humanlike do we expect them to become, and how soon do we need to worry about them surpassing us? Along the way, she introduces the dominant models of modern AI and machine learning, describing cutting-edge AI programs, their human inventors, and the historical lines of thought underpinning recent achievements. She meets with fellow experts such as Douglas Hofstadter, the cognitive scientist and Pulitzer Prize–winning author of the modern classic Gödel, Escher, Bach, who explains why he is “terrified” about the future of AI. She explores the profound disconnect between the hype and the actual achievements in AI, providing a clear sense of what the field has accomplished and how much further it has to go.Interweaving stories about the science of AI and the people behind it, Artificial Intelligence brims with clear-sighted, captivating, and accessible accounts of the most interesting and provocative modern work in the field, flavored with Mitchell’s humor and personal observations. This frank, lively book is an indispensable guide to understanding today’s AI, its quest for “human-level” intelligence, and its impact on the future for us all.
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Chris Sanders - 2007
But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then analyze packets as you take an indepth look at real-world packet analysis and network troubleshooting. The way the pros do it.Wireshark (derived from the Ethereal project), has become the world's most popular network sniffing application. But while Wireshark comes with documentation, there's not a whole lot of information to show you how to use it in real-world scenarios. Practical Packet Analysis shows you how to:Use packet analysis to tackle common network problems, such as loss of connectivity, slow networks, malware infections, and more Build customized capture and display filters Tap into live network communication Graph traffic patterns to visualize the data flowing across your network Use advanced Wireshark features to understand confusing packets Build statistics and reports to help you better explain technical network information to non-technical usersBecause net-centric computing requires a deep understanding of network communication at the packet level, Practical Packet Analysis is a must have for any network technician, administrator, or engineer troubleshooting network problems of any kind.
Goliath: The 100-Year War Between Monopoly Power and Democracy
Matt Stoller - 2019
A concentration of power, whether in the hands of a military dictator or a JP Morgan, was understood as autocratic and dangerous to individual liberty and democracy. This idea stretched back to the country’s founding. In the 1930s, people observed that the Great Depression was caused by financial concentration in the hands of a few whose misuse of their power induced a financial collapse. They drew on this tradition to craft the New Deal. In Goliath, Matt Stoller explains how authoritarianism and populism have returned to American politics for the first time in eighty years, as the outcome of the 2016 election shook our faith in democratic institutions. It has brought to the fore dangerous forces that many modern Americans never even knew existed. Today’s bitter recriminations and panic represent more than just fear of the future, they reflect a basic confusion about what is happening and the historical backstory that brought us to this moment. The true effects of populism, a shrinking middle class, and concentrated financial wealth are only just beginning to manifest themselves under the current administrations. The lessons of Stoller’s study will only grow more relevant as time passes. Building upon his viral article in The Atlantic, “How the Democrats Killed Their Populist Soul,” Stoller illustrates in rich detail how we arrived at this tenuous moment, and the steps we must take to create a new democracy.
The New Digital Age: Reshaping the Future of People, Nations and Business
Eric Schmidt - 2013
And, the Director of Google Ideas, Jared Cohen, formerly an advisor to both Secretaries of State Condoleezza Rice and Hillary Clinton.Never before has the future been so vividly and transparently imagined. From technologies that will change lives (information systems that greatly increase productivity, safety and our quality of life, thought controlled motion technology that can revolutionize medical procedures, and near-perfect translation technology that allows us to have more diversified interactions) to our most important future considerations (curating our online identity and fighting those who would do harm with it) to the widespread political change that will transform the globe (through transformations in conflict, increasingly active and global citizenries, a new wave of cyber-terrorism and states operating simultaneously in the physical and virtual realms) to the ever present threats to our privacy and security, Schmidt and Cohen outline in great detail and scope all the promise and peril awaiting us in the coming decades.
Cyberphobia: Identity, Trust, Security and the Internet
Edward Lucas - 2015
Stories about weaknesses in cybersecurity like the "Heartbleed" leak, or malicious software on the cash registers at your local Target have become alarmingly common. Even more alarming is the sheer number of victims associated with these crimes--the identities and personal information of millions is stolen outright as criminals drain bank accounts and max out credit cards. The availability of stolen credit card information is now so common that it can be purchased on the black market for as little as four dollars with potentially thousands at stake for the victims. Possibly even more catastrophic are hackers at a national level that have begun stealing national security, or economic and trade secrets. The world economy and geopolitics hang in the balance.In Cyberphobia, Edward Lucas unpacks this shadowy, but metastasizing problem confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the internet, it might as well be the Wild West. Standards of securing our computers and other internet-connected technology are diverse, but just like the rules of the road meant to protect both individual drivers and everyone else driving alongside them, weak cybersecurity on the computers and internet systems near us put everyone at risk. Lucas sounds a compelling and necessary alarm on behalf of cybersecurity and prescribes immediate and bold solutions to this grave threat.
Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World
Don Tapscott - 2016
But it is much more than that, too. It is a public ledger to which everyone has access, but which no single person controls. It allows for companies and individuals to collaborate with an unprecedented degree of trust and transparency. It is cryptographically secure, but fundamentally open. And soon it will be everywhere.In Blockchain Revolution, Don and Alex Tapscott reveal how this game-changing technology will shape the future of the world economy, dramatically improving everything from healthcare records to online voting, and from insurance claims to artist royalty payments. Brilliantly researched and highly accessible, this is the essential text on the next major paradigm shift. Read it, or be left behind.
The Hundred-Year Marathon: China's Secret Strategy to Replace America as the Global Superpower
Michael Pillsbury - 2014
government's leading China experts reveals the hidden strategy fueling that country's rise – and how Americans have been seduced into helping China overtake us as the world's leading superpower.For more than forty years, the United States has played an indispensable role helping the Chinese government build a booming economy, develop its scientific and military capabilities, and take its place on the world stage, in the belief that China's rise will bring us cooperation, diplomacy, and free trade. But what if the "China Dream" is to replace us, just as America replaced the British Empire, without firing a shot?Based on interviews with Chinese defectors and newly declassified, previously undisclosed national security documents, The Hundred-Year Marathon reveals China's secret strategy to supplant the United States as the world's dominant power, and to do so by 2049, the one-hundredth anniversary of the founding of the People's Republic. Michael Pillsbury, a fluent Mandarin speaker who has served in senior national security positions in the U.S. government since the days of Richard Nixon and Henry Kissinger, draws on his decades of contact with the "hawks" in China's military and intelligence agencies and translates their documents, speeches, and books to show how the teachings of traditional Chinese statecraft underpin their actions. He offers an inside look at how the Chinese really view America and its leaders – as barbarians who will be the architects of their own demise.Pillsbury also explains how the U.S. government has helped – sometimes unwittingly and sometimes deliberately – to make this "China Dream" come true, and he calls for the United States to implement a new, more competitive strategy toward China as it really is, and not as we might wish it to be. The Hundred-Year Marathon is a wake-up call as we face the greatest national security challenge of the twenty-first century.
Ten Lessons for a Post-Pandemic World
Fareed Zakaria - 2020
CNN host and best-selling author Fareed Zakaria helps readers to understand the nature of a post-pandemic world: the political, social, technological, and economic impacts that may take years to unfold.In the form of ten straightforward “lessons,” covering topics from globalization and threat-preparedness to inequality and technological advancement, Zakaria creates a structure for readers to begin thinking beyond the immediate impacts of COVID-19. Ten Lessons for a Post-Pandemic World speaks to past, present, and future, and, while urgent and timely, is sure to become an enduring staple.
Our Final Invention: Artificial Intelligence and the End of the Human Era
James Barrat - 2013
Corporations & government agencies around the world are pouring billions into achieving AI’s Holy Grail—human-level intelligence. Once AI has attained it, scientists argue, it will have survival drives much like our own. We may be forced to compete with a rival more cunning, more powerful & more alien than we can imagine. Thru profiles of tech visionaries, industry watchdogs & groundbreaking AI systems, James Barrat's Our Final Invention explores the perils of the heedless pursuit of advanced AI. Until now, human intelligence has had no rival. Can we coexist with beings whose intelligence dwarfs our own? Will they allow us to?
The Glass Cage: How Our Computers Are Changing Us
Nicholas Carr - 2014
Even as they bring ease to our lives, these programs are stealing something essential from us.Drawing on psychological and neurological studies that underscore how tightly people’s happiness and satisfaction are tied to performing hard work in the real world, Carr reveals something we already suspect: shifting our attention to computer screens can leave us disengaged and discontented.From nineteenth-century textile mills to the cockpits of modern jets, from the frozen hunting grounds of Inuit tribes to the sterile landscapes of GPS maps, The Glass Cage explores the impact of automation from a deeply human perspective, examining the personal as well as the economic consequences of our growing dependence on computers.With a characteristic blend of history and philosophy, poetry and science, Carr takes us on a journey from the work and early theory of Adam Smith and Alfred North Whitehead to the latest research into human attention, memory, and happiness, culminating in a moving meditation on how we can use technology to expand the human experience.
The Big Nine: How the Tech Titans and Their Thinking Machines Could Warp Humanity
Amy Webb - 2019
We like to think that we are in control of the future of "artificial" intelligence. The reality, though, is that we -- the everyday people whose data powers AI -- aren't actually in control of anything. When, for example, we speak with Alexa, we contribute that data to a system we can't see and have no input into -- one largely free from regulation or oversight. The big nine corporations -- Amazon, Google, Facebook, Tencent, Baidu, Alibaba, Microsoft, IBM and Apple--are the new gods of AI and are short-changing our futures to reap immediate financial gain. In this book, Amy Webb reveals the pervasive, invisible ways in which the foundations of AI -- the people working on the system, their motivations, the technology itself -- is broken. Within our lifetimes, AI will, by design, begin to behave unpredictably, thinking and acting in ways which defy human logic. The big nine corporations may be inadvertently building and enabling vast arrays of intelligent systems that don't share our motivations, desires, or hopes for the future of humanity. Much more than a passionate, human-centered call-to-arms, this book delivers a strategy for changing course, and provides a path for liberating us from algorithmic decision-makers and powerful corporations.
Rise of the Warrior Cop: The Militarization of America's Police Forces
Radley Balko - 2013
As a result, our country has generally worked to keep the military out of law enforcement. But according to investigative reporter Radley Balko, over the last several decades, America’s cops have increasingly come to resemble ground troops. The consequences have been dire: the home is no longer a place of sanctuary, the Fourth Amendment has been gutted, and police today have been conditioned to see the citizens they serve as an other—an enemy.Today’s armored-up policemen are a far cry from the constables of early America. The unrest of the 1960s brought about the invention of the SWAT unit—which in turn led to the debut of military tactics in the ranks of police officers. Nixon’s War on Drugs, Reagan’s War on Poverty, Clinton’s COPS program, the post–9/11 security state under Bush and Obama: by degrees, each of these innovations expanded and empowered police forces, always at the expense of civil liberties. And these are just four among a slew of reckless programs.In Rise of the Warrior Cop, Balko shows how politicians’ ill-considered policies and relentless declarations of war against vague enemies like crime, drugs, and terror have blurred the distinction between cop and soldier. His fascinating, frightening narrative shows how over a generation, a creeping battlefield mentality has isolated and alienated American police officers and put them on a collision course with the values of a free society.
Threat Modeling: Designing for Security
Adam Shostack - 2014
Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
A Generation of Sociopaths: How the Baby Boomers Betrayed America
Bruce Cannon Gibney - 2017
In A Generation of Sociopaths, Gibney examines the disastrous policies of the most powerful generation in modern history, showing how the Boomers ruthlessly enriched themselves at the expense of future generations.Acting without empathy, prudence, or respect for facts--acting, in other words, as sociopaths--the Boomers turned American dynamism into stagnation, inequality, and bipartisan fiasco. The Boomers have set a time bomb for the 2030s, when damage to Social Security, public finances, and the environment will become catastrophic and possibly irreversible--and when, not coincidentally, Boomers will be dying off. Gibney argues that younger generations have a fleeting window to hold the Boomers accountable and begin restoring America.