Book picks similar to
Cyber Wars: Hacks that Shocked the Business World by Charles Arthur
non-fiction
cybersecurity
security
scienceandtech
Robber Barons: The Lives and Careers of John D. Rockefeller, J.P. Morgan, Andrew Carnegie, and Cornelius Vanderbilt
Charles River Editors - 2016
Men like Andrew Carnegie built empires like Carnegie Steel, and financiers like J.P. Morgan merged and consolidated them. The era also made names like Astor, Cooke, and Vanderbilt instantly recognizable across the globe. Over time, the unfathomable wealth generated by the businesses made the individuals on top incredibly rich, and that in turn led to immense criticism and an infamous epithet used to rail against them: robber barons. Dozens of men were called “robber barons”, but few of them were as notorious as Cornelius Vanderbilt, who also happened to be one of the nation’s first business titans. Vanderbilt was a railroad and shipping magnate at a time that the industry was almost brand new, but he rode his success to become one of the richest and most powerful men in American history. When historians are asked to name the richest man in history, a name that often pops up is that of John D. Rockefeller, who co-founded Standard Oil and turned it into the first real trust in the United States. Rockefeller had been groomed ambitiously by a huckster father nicknamed “Devil Bill”, who was just as willing to cheat his son as an unsuspecting public, and John certainly chased his dreams of living long and large. Rockefeller forged his empire in the first few decades of his life and nearly worked himself to death by the time he was 50, which helped compel him to retire for the last several decades of his life. At one point, Rockefeller’s wealth was worth more than 1.5% of the entire country’s gross domestic product, and by adjusting for inflation, he is arguably the richest man in American history if not world history. When robber barons across America took the reins of vast industries, they needed financing, and many of them turned to the most famous banker of all: John Pierpont Morgan. It was J.P. Morgan who bankrolled the consolidation of behemoth corporations across various industries, including the merging of Edison General Electric and Thomson-Houston Electric Company, which subsequently became General Electric, still known simply as GE across the world today. Similarly, he financed Federal Steel Company and consolidated various other steel businesses to help form the United States Steel Corporation. While critics complained about the outsized influence that these gigantic businesses had, Morgan’s massive wealth also gave him unprecedented power in the financial sector and the ability to deal with politicians. In fact, Morgan played an important part in the Panic of 1907 and the subsequent decision to create the Federal Reserve as a monetary oversight. Ironically, one of America’s most famous robber barons, Andrew Carnegie, epitomized the American Dream, migrating with his poor family to America in the mid-19th century and rising to the top of the business world in his adopted country. A prodigious writer in addition to his keen sense of business, Carnegie was one of the most outspoken champions of capitalism at a time when there was pushback among lower social classes who witnessed the great disparities in wealth; as he once put it, “Upon the sacredness of property civilization itself depends—the right of the laborer to his hundred dollars in the savings bank, and equally the legal right of the millionaire to his millions.
DNS and BIND
Cricket Liu - 1996
This book brings you up-to-date with the latest changes in this crucial service.The fifth edition covers BIND 9.3.2, the most recent release of the BIND 9 series, as well as BIND 8.4.7. BIND 9.3.2 contains further improvements in security and IPv6 support, and important new features such as internationalized domain names, ENUM (electronic numbering), and SPF (the Sender Policy Framework).Whether you're an administrator involved with DNS on a daily basis or a user who wants to be more informed about the Internet and how it works, you'll find that this book is essential reading.Topics include:What DNS does, how it works, and when you need to use it How to find your own place in the Internet's namespace Setting up name servers Using MX records to route mail Configuring hosts to use DNS name servers Subdividing domains (parenting) Securing your name server: restricting who can query your server, preventing unauthorized zone transfers, avoiding bogus servers, etc. The DNS Security Extensions (DNSSEC) and Transaction Signatures (TSIG) Mapping one name to several servers for load sharing Dynamic updates, asynchronous notification of change to a zone, and incremental zone transfers Troubleshooting: using nslookup and dig, reading debugging output, common problems DNS programming using the resolver library and Perl's Net::DNS module
Beautiful Security: Leading Security Experts Explain How They Think (Theory In Practice, #28)
Andy Oram - 2009
Criminals succeed by exercising enormous creativity, and those defending against them must do the same.Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include:The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their prey How social networking, cloud computing, and other popular trends help or hurt our online security How metrics, requirements gathering, design, and law can take security to a higher level The real, little-publicized history of PGP This book includes contributions from:Peiter "Mudge" Zatko Jim Stickley Elizabeth Nichols Chenxi Wang Ed Bellis Ben Edelman Phil Zimmermann and Jon Callas Kathy Wang Mark Curphey John McManus James Routh Randy V. Sabett Anton Chuvakin Grant Geyer and Brian Dunphy Peter Wayner Michael Wood and Fernando Francisco All royalties will be donated to the Internet Engineering Task Force (IETF).
The Idea Factory: Bell Labs and the Great Age of American Innovation
Jon Gertner - 2012
From the transistor to the laser, it s hard to find an aspect of modern life that hasn t been touched by Bell Labs. Why did so many transformative ideas come from Bell Labs? In "The Idea Factory," Jon Gertner traces the origins of some of the twentieth century s most important inventions and delivers a riveting and heretofore untold chapter of American history. At its heart this is a story about the life and work of a small group of brilliant and eccentric men Mervin Kelly, Bill Shockley, Claude Shannon, John Pierce, and Bill Baker who spent their careers at Bell Labs. Their job was to research and develop the future of communications. Small-town boys, childhood hobbyists, oddballs: they give the lie to the idea that Bell Labs was a grim cathedral of top-down command and control.Gertner brings to life the powerful alchemy of the forces at work behind Bell Labs inventions, teasing out the intersections between science, business, and society. He distills the lessons that abide: how to recruit and nurture young talent; how to organize and lead fractious employees; how to find solutions to the most stubbornly vexing problems; how to transform a scientific discovery into a marketable product, then make it even better, cheaper, or both. Today, when the drive to invent has become a mantra, Bell Labs offers us a way to enrich our understanding of the challenges and solutions to technological innovation. Here, after all, was where the foundational ideas on the management of innovation were born. "The Idea Factory" is the story of the origins of modern communications and the beginnings of the information age a deeply human story of extraordinary men who were given extraordinary means time, space, funds, and access to one another and edged the world into a new dimension."
The Principles of Product Development Flow: Second Generation Lean Product Development
Donald G. Reinertsen - 2009
He explains why invisible and unmanaged queues are the underlying root cause of poor product development performance. He shows why these queues form and how they undermine the speed, quality, and efficiency in product development.
Code Halos: How the Digital Lives of People, Things, and Organizations Are Changing the Rules of Business
Malcolm Frank - 2014
Today's outliers in revenue growth and value creation are winning with a new set of rules. They are dominating by managing the information that surrounds people, organizations, processes, and products--what authors Malcolm Frank, Paul Roehrig, and Ben Pring call Code Halos. This is far beyond "Big Data" and analytics. Code Halos spark new commercial models that can dramatically flip market dominance from industry stalwarts to challengers. In this new book, the authors show leaders how digital innovators and traditional companies can build Code Halo solutions to drive success. The book:Examines the explosion of digital information that now surrounds us and describes the profound impact this is having on individuals, corporations, and societies; Shows how the Crossroads Model can help anticipate and navigate this market shift; Provides examples of traditional firms already harnessing the power of Code Halos including GE's Brilliant Machines, Disney's theme park Magic Band, and Allstate's mobile devices and analytics that transform auto insurance. With reasoned insight, new data, real-world cases, and practical guidance, Code Halos shows seasoned executives, entrepreneurs, students, line-of-business owners, and technology leaders how to master the new rules of the Code Halo economy.
Computer Networking: A Top-Down Approach
James F. Kurose - 2000
Building on the successful top-down approach of previous editions, this fourth edition continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts.
Code Complete
Steve McConnell - 1993
Now this classic book has been fully updated and revised with leading-edge practices--and hundreds of new code samples--illustrating the art and science of software construction. Capturing the body of knowledge available from research, academia, and everyday commercial practice, McConnell synthesizes the most effective techniques and must-know principles into clear, pragmatic guidance. No matter what your experience level, development environment, or project size, this book will inform and stimulate your thinking--and help you build the highest quality code. Discover the timeless techniques and strategies that help you: Design for minimum complexity and maximum creativity Reap the benefits of collaborative development Apply defensive programming techniques to reduce and flush out errors Exploit opportunities to refactor--or evolve--code, and do it safely Use construction practices that are right-weight for your project Debug problems quickly and effectively Resolve critical construction issues early and correctly Build quality into the beginning, middle, and end of your project
You Don't Know JS: Up & Going
Kyle Simpson - 2015
With the "You Don’t Know JS" book series, you’ll get a more complete understanding of JavaScript, including trickier parts of the language that many experienced JavaScript programmers simply avoid.The series’ first book, Up & Going, provides the necessary background for those of you with limited programming experience. By learning the basic building blocks of programming, as well as JavaScript’s core mechanisms, you’ll be prepared to dive into the other, more in-depth books in the series—and be well on your way toward true JavaScript.With this book you will:
Learn the essential programming building blocks, including operators, types, variables, conditionals, loops, and functions
Become familiar with JavaScript's core mechanisms such as values, function closures, this, and prototypes
Get an overview of other books in the series—and learn why it’s important to understand all parts of JavaScript
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Patrick Engebretson - 2011
No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate.Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phasesWritten by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State UniversityUtilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test
365 More Things People Believe That Aren't True
James Egan - 2014
Some mammoths were smaller than children. Owls are the dumbest birds in the world. Very few people with Tourette's syndrome swear. You can't get a six-pack from doing sit-ups. King Arthur's sword wasn't called Excalibur. Milk doesn't make your bones strong. There's no bones in your fingers. The Bible states that humans can't become angels. Humans have more than two nostrils. It's impossible to slide down a bannister. At a wedding, the bride doesn't walk down the aisle. Ties were invented for war, not fashion. Most Disney classics made almost no money. Slavery has only been illegal in the UK since 2010. George Washington wasn't the first American President. Velcro doesn’t exist. Nobody knows why we sleep.
Pull: The Power of the Semantic Web to Transform Your Business
David Siegel - 2009
This book claimed that through a piece of software called a "browser," which accesses "web sites," the world economy and our daily lives would change forever. Would you have believed even 10 percent of that book? Did you take advantage of the first Internet wave and get ahead of the curve? "Pull" is the blueprint to the next disruptive wave. Some call it Web 3.0; others call it the semantic web. It's a fundamental transition from pushing information to pulling, using a new way of thinking and collaborating online. Using the principles of this book, you will slash 5-20 percent off your bottom line, make your customers happier, accelerate your industry, and prepare your company for the twenty-first century. It isn't going to be easy, and you don't have any choice. By 2015, your company will be more agile and your processes more flexible than you ever thought possible. The semantic web leads to possibilities straight from science fiction, such as buildings that can order their own supplies, eliminating the IRS, and lawyers finally making sense. But it also leads to major changes in every field, from shipping and retail distribution to health care and financial reporting. Through clear examples, case studies, principles, and scenarios, business strategist David Siegel takes you on a tour of this new world. You'll learn: -Which industries are already ahead. -Which industries are already dead. -How to make the power shift from pushing to pulling information. -How software, hardware, media, and marketing will all change. -How to plan your own strategy for embracing the semantic web. We are at the beginning of a new technology curve that will affect all areas of business. Right now, you have a choice. You can decide to start preparing for the exciting opportunities that lay ahead or you can leave this book on the shelf and get left in the dust like last time.
Refactoring: Improving the Design of Existing Code
Martin Fowler - 1999
Significant numbers of poorly designed programs have been created by less-experienced developers, resulting in applications that are inefficient and hard to maintain and extend. Increasingly, software system professionals are discovering just how difficult it is to work with these inherited, non-optimal applications. For several years, expert-level object programmers have employed a growing collection of techniques to improve the structural integrity and performance of such existing software programs. Referred to as refactoring, these practices have remained in the domain of experts because no attempt has been made to transcribe the lore into a form that all developers could use... until now. In Refactoring: Improving the Design of Existing Software, renowned object technology mentor Martin Fowler breaks new ground, demystifying these master practices and demonstrating how software practitioners can realize the significant benefits of this new process.
The Mythical Man-Month: Essays on Software Engineering
Frederick P. Brooks Jr. - 1975
With a blend of software engineering facts and thought-provoking opinions, Fred Brooks offers insight for anyone managing complex projects. These essays draw from his experience as project manager for the IBM System/360 computer family and then for OS/360, its massive software system. Now, 45 years after the initial publication of his book, Brooks has revisited his original ideas and added new thoughts and advice, both for readers already familiar with his work and for readers discovering it for the first time.The added chapters contain (1) a crisp condensation of all the propositions asserted in the original book, including Brooks' central argument in The Mythical Man-Month: that large programming projects suffer management problems different from small ones due to the division of labor; that the conceptual integrity of the product is therefore critical; and that it is difficult but possible to achieve this unity; (2) Brooks' view of these propositions a generation later; (3) a reprint of his classic 1986 paper "No Silver Bullet"; and (4) today's thoughts on the 1986 assertion, "There will be no silver bullet within ten years."
Other People's Money: The Rise and Fall of Britain's Boldest Credit Card Fraudster
Neil Forsyth - 2007
Until, at the tender age of sixteen, he worked out how to use the credit card system to his advantage. Identifying the banks' security weaknesses, utilising his intelligence and charm, Elliot embarked on a massive spending spree. From London to New York, Ibiza to Beverly Hills, he lived the fantasy life, staying in famous hotels, flying first class, blowing a fortune on designer clothes. Time and time again, Elliot managed to wriggle free of the numerous authorities who were on his tail, while his life spiralled out of control. Meanwhile, from a police station at Heathrow, a detective was patiently tracking him down . . . With a likeable hero, filled with humour and as fast-paced as a thriller, Other People's Money is crime writing at its best.'A fascinating and illuminating story' Irvine Welsh'Exhilarating Brit variation on Catch Me if You Can, which never misses an opportunity to up the sweaty-palmed suspense.' "Arena"