Book picks similar to
Cyber Mercenaries by Tim Maurer
non-fiction
cyber
cybersecurity
espionage
World Order
Henry Kissinger - 2014
Drawing on his experience as one of the foremost statesmen of the modern era—advising presidents, traveling the world, observing and shaping the central foreign policy events of recent decades—Kissinger now reveals his analysis of the ultimate challenge for the twenty-first century: how to build a shared international order in a world of divergent historical perspectives, violent conflict, proliferating technology, and ideological extremism.There has never been a true “world order,” Kissinger observes. For most of history, civilizations defined their own concepts of order. Each considered itself the center of the world and envisioned its distinct principles as universally relevant. China conceived of a global cultural hierarchy with the Emperor at its pinnacle. In Europe, Rome imagined itself surrounded by barbarians; when Rome fragmented, European peoples refined a concept of an equilibrium of sovereign states and sought to export it across the world. Islam, in its early centuries, considered itself the world’s sole legitimate political unit, destined to expand indefinitely until the world was brought into harmony by religious principles. The United States was born of a conviction about the universal applicability of democracy—a conviction that has guided its policies ever since.Now international affairs take place on a global basis, and these historical concepts of world order are meeting. Every region participates in questions of high policy in every other, often instantaneously. Yet there is no consensus among the major actors about the rules and limits guiding this process, or its ultimate destination. The result is mounting tension.Grounded in Kissinger’s deep study of history and his experience as National Security Advisor and Secretary of State, World Order guides readers through crucial episodes in recent world history. Kissinger offers a unique glimpse into the inner deliberations of the Nixon administration’s negotiations with Hanoi over the end of the Vietnam War, as well as Ronald Reagan’s tense debates with Soviet Premier Gorbachev in Reykjavík. He offers compelling insights into the future of U.S.–China relations and the evolution of the European Union, and examines lessons of the conflicts in Iraq and Afghanistan. Taking readers from his analysis of nuclear negotiations with Iran through the West’s response to the Arab Spring and tensions with Russia over Ukraine, World Order anchors Kissinger’s historical analysis in the decisive events of our time.Provocative and articulate, blending historical insight with geopolitical prognostication, World Order is a unique work that could come only from a lifelong policymaker and diplomat.
A Theory of the Drone
Grégoire Chamayou - 2013
public. Not since debates over nuclear warfare has American military strategy been the subject of discussion in living rooms, classrooms, and houses of worship. Yet as this groundbreaking new work shows, the full implications of drones have barely been addressed in the recent media storm.In a unique take on a subject that has grabbed headlines and is consuming billions of taxpayer dollars each year, philosopher Grégoire Chamayou applies the lens of philosophy to our understanding of how drones are changing our world. For the first time in history, a state has claimed the right to wage war across a mobile battlefield that potentially spans the globe. Remote-control flying weapons, he argues, take us well beyond even George W. Bush’s justification for the war on terror.What we are seeing is a fundamental transformation of the laws of war that have defined military conflict as between combatants. As more and more drones are launched into battle, war now has the potential to transform into a realm of secretive, targeted assassinations of individuals—beyond the view and control not only of potential enemies but also of citizens of democracies themselves. Far more than a simple technology, Chamayou shows, drones are profoundly influencing what it means for a democracy to wage war. A Theory of the Drone will be essential reading for all who care about this important question.
Tor and The Dark Net: Remain Anonymous Online and Evade NSA Spying (Tor, Dark Net, Anonymous Online, NSA Spying)
James Smith - 2016
Some may know and choose to ignore the fact, but every single thing you do online is being tracked and guess what? For better or for worse it is there forever. Whether you're simply browsing websites or you are accessing confidential information that you would rather no one know about there are ways to remain anonymous. Imagine this scenario, you create an account on a forum with your name and decide to do some political freedom fighting with it. Years down the road a future employer of yours does a simple google search of your name and finds everything you've ever done. They don't hire you. This is a very simple scenario that just scratches the surface of reasons to stay anonymous but the point remains the same. Knowing when and how to remain anonymous is very important. Many people already realize this but have no clue where to start. This book has step by step instructions and techniques involving Tor, VPN's, Proxies, and more that will take you to the deepest levels of anonymity in which not even the all seeing NSA will be able to track you. Bonus download included in the book! (Step-by-step guide to setup TOR) A Preview of What You Will Learn ✔ How to Remain COMPLETELY Anonymous ✔ Exactly What Tor, VPN's, and PGP Are. ✔ How To Setup and Use Tor Correctly For Maximum Safety ✔ Key Mistakes To Avoid ✔ The Real Capabilities of The NSA ✔ Much, much more! Take back your privacy today. Scroll up and buy this book!
The Internet Police: How Crime Went Online, and the Cops Followed
Nate Anderson - 2013
It’s not just computer hackers and cyber crooks who lurk in the dark corners of the Web—the cops are there, too.In The Internet Police, Ars Technica deputy editor Nate Anderson takes readers on a behind-the-screens tour of landmark cybercrime cases, revealing how criminals continue to find digital and legal loopholes even as police hurry to cinch them closed. From the Cleveland man whose "natural male enhancement" pill inadvertently protected the privacy of your e-mail to the Russian spam king who ended up in a Milwaukee jail to the Australian arrest that ultimately led to the breakup of the largest child pornography ring in the United States, Anderson draws on interviews, court documents, and law-enforcement reports to reconstruct accounts of how online policing actually works. Questions of online crime are as complex and interconnected as the Internet itself. With each episode in The Internet Police, Anderson shows the dark side of online spaces—but also how dystopian a fully "ordered" alternative would be.Includes an afterword that details law enforcement's dramatic seizure of the online black market Silk Road.
Hiding from the Internet: Eliminating Personal Online Information
Michael Bazzell - 2012
Author Michael Bazzell has been well known in government circles for his ability to locate personal information about anyone through the internet. In Hiding from the Internet: Eliminating Personal Online Information, he exposes the resources that broadcast your personal details to public view. He has researched each source and identified the best method to have your private details removed from the databases that store profiles on all of us. This book will serve as a reference guide for anyone that values privacy. Each technique is explained in simple steps. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The author provides personal experiences from his journey to disappear from public view. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to force companies to remove you from their data collection systems. This book exposes loopholes that create unique opportunities for privacy seekers. Among other techniques, you will learn to: Remove your personal information from public databases and people search sites Create free anonymous mail addresses, email addresses, and telephone numbers Control your privacy settings on social networks and remove sensitive data Provide disinformation to conceal true private details Force data brokers to stop sharing your information with both private and public organizations Prevent marketing companies from monitoring your browsing, searching, and shopping habits Remove your landline and cellular telephone numbers from online websites Use a credit freeze to eliminate the worry of financial identity theft and fraud Change your future habits to promote complete privacy and anonymity Conduct a complete background check to verify proper information removalConfigure a home firewall with VPN Kill-SwitchPurchase a completely invisible home or vehicle
How to Get Away With Murder in America
Evan Wright - 2012
Investigative reporting on a CIA officer from Miami who may have had ties to a cocaine trafficker while rising to the top of the agency's counter-terrorist division during 9/11.
Web Hacking 101
Peter Yaworski
With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different.Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties. With over 30 examples, the book covers topics like:HTML InjectionCross site scripting (XSS)Cross site request forgery (CSRF)Open RedirectsRemote Code Execution (RCE)Application Logicand more...Each example includes a classification of the attack, a report link, the bounty paid, easy to understand description and key takeaways. After reading this book, your eyes will be opened to the wide array of vulnerabilities that exist and you'll likely never look at a website or API the same way.
Just and Unjust Wars: A Moral Argument With Historical Illustrations
Michael Walzer - 1976
He studies a variety of conflicts over the course of history, as well as the testimony of those who have been most directly involved--participants, decision makers, and victims. In his introduction to this new edition, Walzer specifically addresses the moral issues surrounding the war in and occupation of Iraq, reminding us once again that "the argument about war and justice is still a political and moral necessity."
CISSP Study Guide
Eric Conrad - 2010
The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. It also provides tips on how to prepare for the exam and take the exam. It also contains CISSP practice quizzes to test ones knowledge. The first domain provides information about risk analysis and mitigation. It also discusses security governance. The second domain discusses different techniques for access control, which is the basis for all the security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental for operating the system and software security components. Domain 6 is a critical domain in the Common Body of Knowledge, the Business Continuity Planning, and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domains 7, 8, and 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework in determining the laws about information system.
Free as in Freedom: Richard Stallman's Crusade for Free Software
Sam Williams - 2002
It examines Stallman's unique personality and how that personality has been at turns a driving force and a drawback in terms of the movement's overall success.Free as in Freedom examines one man's 20-year attempt to codify and communicate the ethics of 1970s era "hacking" culture in such a way that later generations might easily share and build upon the knowledge of their computing forebears. The book documents Stallman's personal evolution from teenage misfit to prescient adult hacker to political leader and examines how that evolution has shaped the free software movement. Like Alan Greenspan in the financial sector, Richard Stallman has assumed the role of tribal elder within the hacking community, a community that bills itself as anarchic and averse to central leadership or authority. How did this paradox come about? Free as in Freedom provides an answer. It also looks at how the latest twists and turns in the software marketplace have diminished Stallman's leadership role in some areas while augmenting it in others.Finally, Free as in Freedom examines both Stallman and the free software movement from historical viewpoint. Will future generations see Stallman as a genius or crackpot? The answer to that question depends partly on which side of the free software debate the reader currently stands and partly upon the reader's own outlook for the future. 100 years from now, when terms such as "computer," "operating system" and perhaps even "software" itself seem hopelessly quaint, will Richard Stallman's particular vision of freedom still resonate, or will it have taken its place alongside other utopian concepts on the 'ash-heap of history?'
The Hacker Playbook 2: Practical Guide To Penetration Testing
Peter Kim - 2015
The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.
Codebreakers: The Inside Story of Bletchley Park
F.H. Hinsley - 1993
Almost to the end of the war, the Germans had firm faith in the Enigma ciphering machine, but in fact the codebreakers were deciphering nearly 4,000 German transmissions daily by 1942, reaping a wealth of information on such important matters as the effort to resupply Rommel's army in North Africa and the effect of Allied attempts to mislead the Germans about the location of D-Day landings. Indeed, Winston Churchill hailed the work of Bletchley Park as the secret weapon that won the war. Only now, nearly half a century since the end of the Second World War, have any of the men and women in this group come forward to tell this remarkable story in their own words--a story that an oath of secrecy long prevented them from revealing. In Codebreakers, F.H. Hinsley and Alan Stripp have gathered together twenty-seven first-hand accounts of one of the most amazing feats in intelligence history. These engaging memoirs, each written by a different member of the codebreakers team, recount the long hours working in total secrecy and the feelings of camaraderie, tension, excitement, and frustration as these men and women, both British and American, did some of the most important work of the war. These talented people share not only their technical knowledge of cryptography and military logistics, but also poignant personal recollections as well. Walter Eytan, one of a handful of Jews at Betchley Park, recalls intercepting a message from a German vessel which reported that it carried Jews en route for Piraeus zur Endlosung (for the final solution). Eytan writes I had never heard this expression before, but instinctively, I knew what it must mean, and I have never forgotten that moment. Vivienne Alford tells of her chilling memory of hearing that the atomic bomb had been dropped on Hiroshima, and the stillness that came over her and her co-workers in Naval Section VI. And William Millward confides that he is still haunted by the work he did in Hut 3 nearly fifty years ago. I sometimes wonder, especially during the night, how many sailors I drowned. Few readers will finish this book without feeling that the codebreakers were essential to the outcome of the war--and thereby of major importance in helping to shape the world we live in today.
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
Chris Eagle - 2008
With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other disassemblers slow your analysis with inflexibility, IDA invites you to customize its output for improved readability and usefulness. You'll save time and effort as you learn to:Identify known library routines, so you can focus your analysis on other areas of the code Extend IDA to support new processors and filetypes, making disassembly possible for new or obscure architectures Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more Utilize IDA's built-in debugger to tackle obfuscated code that would defeat a stand-alone disassembler You'll still need serious assembly skills to tackle the toughest executables, but IDA makes things a lot easier. Whether you're analyzing the software on a black box or conducting hard-core vulnerability research, a mastery of IDA Pro is crucial to your success. Take your skills to the next level with The IDA Pro Book.
Comptia Security+: Get Certified Get Ahead: Sy0-301 Study Guide
Darril Gibson - 2011
The SY0-301 version covers every aspect of the SY0-301 exam, and includes the same elements readers raved about in the previous version. Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action. The author uses many of the same analogies and explanations he's honed in the classroom that have helped hundreds of students master the Security+ content. You'll understand the important and relevant security topics for the Security+ exam, without being overloaded with unnecessary details. Additionally, each chapter includes a comprehensive review section to help you focus on what's important. Over 450 realistic practice test questions with in-depth explanations will help you test your comprehension and readiness for the exam. The book includes a 100 question pre-test, a 100 question post-test, and practice test questions at the end of every chapter. Each practice test question includes a detailed explanation to help you understand the content and the reasoning behind the question. You'll be ready to take and pass the exam the first time you take it. If you plan to pursue any of the advanced security certifications, this guide will also help you lay a solid foundation of security knowledge. Learn this material, and you'll be a step ahead for other exams. This SY0-301 study guide is for any IT or security professional interested in advancing in their field, and a must read for anyone striving to master the basics of IT systems security. The author supplements the book with blog posts here: http: //blogs.getcertifiedgetahead.com/. This page provides a full listing of mobile device apps from the author: http: //learnzapp.com/partners/darrilgibson/