Book picks similar to
Cyber Mercenaries by Tim Maurer


cyber
non-fiction
cybersecurity
espionage

Cyberwar: How Russian Hackers and Trolls Helped Elect a President - What We Don't, Can't, and Do Know


Kathleen Hall Jamieson - 2018
    In particular, was his victory the result of Russian meddling in our political system? Up until now, the answer to that has been equivocal at best given how difficult it is to prove. Trump has vociferously denied it, as has Vladimir Putin himself. Even the famous intelligence reports establishing that the Russians interfered hold back from saying whether the interference tipped the scales in the outcome.In Cyberwar, however, the eminent scholar Kathleen Hall Jamieson, who sifted through a vast amount of polling and voting data, is able to conclude with a reasonable degree of certainty that Russian help was crucial in elevating Trump to the Oval Office. Put simply, by changing the behavior of key players and altering the focus and content of mainstream news, Russian hackers reshaped the 2016 electoral dynamic. At the same time, Russian trolls used social media to target voting groups indispensable to a Trump victory or Clinton defeat. There are of course many arguments on offer that push against the idea that the Russians handed Trump his victory. Russia's goal was fomenting division, not electing Trump. Most of the Russian ads reportedly did not reference either the election or a candidate. Nor did they differ much from U.S.-based messaging that was already in play. Russian intervention did not surgically target Trump in key states. Finally, if WikiLeaks' releases of stolen email had truly affected the vote, Clinton's perceived honesty would have dropped in October. Jamieson, drawing from her four decades of research on the role of media in American elections, dispenses with these arguments through a forensic tracing of both Russian hackers' impact on media coverage as well as the ebbs and flows of Trump's polling support over the course of the campaign. To be sure, it is impossible to prove with absolute certainty that the Russians handed the election to Trump because there is too much that we don't know. That said, the lessons of a half century of research on the role of media framing in elections strongly suggests that many voters' opinions were altered by Russia's wide-ranging and coordinated campaign-including at least seventy eight thousand votes in three key states. Combining scholarly rigor with a bracing argument, Cyberwar shows that we can now be reasonably confident that Russian efforts helped put Trump in the White House.

The LogStash Book


James Turnbull - 2013
    We're going to do that by introducing you to Example.com, where you're going to start a new job as one of its SysAdmins. The first project you'll be in charge of is developing its new log management solution. We'll teach you how to:* Install and deploy LogStash.* Ship events from a LogStash Shipper to a central LogStash server.* Filter incoming events using a variety of techniques.* Output those events to a selection of useful destinations.* Use LogStash's Web interface and alternative interfaces like Kibana.* Scale out your LogStash implementation as your environment grows.* Quickly and easily extend LogStash to deliver additional functionality you might need.By the end of the book you should have a functional and effective log management solution that you can deploy into your own environment.

Tubes: A Journey to the Center of the Internet


Andrew Blum - 2012
    But what is it physically? And where is it really? Our mental map of the network is as blank as the map of the ocean that Columbus carried on his first Atlantic voyage. The Internet, its material nuts and bolts, is an unexplored territory. Until now.In Tubes, journalist Andrew Blum goes inside the Internet's physical infrastructure and flips on the lights, revealing an utterly fresh look at the online world we think we know. It is a shockingly tactile realm of unmarked compounds, populated by a special caste of engineer who pieces together our networks by hand; where glass fibers pulse with light and creaky telegraph buildings, tortuously rewired, become communication hubs once again. From the room in Los Angeles where the Internet first flickered to life to the caverns beneath Manhattan where new fiber-optic cable is buried; from the coast of Portugal, where a ten-thousand-mile undersea cable just two thumbs wide connects Europe and Africa, to the wilds of the Pacific Northwest, where Google, Microsoft, and Facebook have built monumental data centers—Blum chronicles the dramatic story of the Internet's development, explains how it all works, and takes the first-ever in-depth look inside its hidden monuments.This is a book about real places on the map: their sounds and smells, their storied pasts, their physical details, and the people who live there. For all the talk of the "placelessness" of our digital age, the Internet is as fixed in real, physical spaces as the railroad or telephone. You can map it and touch it, and you can visit it. Is the Internet in fact "a series of tubes" as Ted Stevens, the late senator from Alaska, once famously described it? How can we know the Internet's possibilities if we don't know its parts?Like Tracy Kidder's classic The Soul of a New Machine or Tom Vanderbilt's recent bestseller Traffic, Tubes combines on-the-ground reporting and lucid explanation into an engaging, mind-bending narrative to help us understand the physical world that underlies our digital lives.

802.11 Wireless Networks: The Definitive Guide


Matthew S. Gast - 2002
    Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:deployment considerationsnetwork monitoring and performance tuningwireless security issueshow to use and select access pointsnetwork monitoring essentialswireless card configurationsecurity issues unique to wireless networksWith wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide, 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence.

Black Hat Python: Python Programming for Hackers and Pentesters


Justin Seitz - 2014
    But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:Create a trojan command-and-control using GitHubDetect sandboxing and automate common malware tasks, like keylogging and screenshottingEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machineExtend the popular Burp Suite web-hacking toolAbuse Windows COM automation to perform a man-in-the-browser attackExfiltrate data from a network most sneakilyInsider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python."

I is for Infidel: From Holy War to Holy Terror in Afghanistan


Kathy Gannon - 2005
    She had the world to choose from: she chose Afghanistan. She went to witness the final humiliation of a superpower in terminal decline as the Soviet Union was defeated by the mujahedeen. What she didn't know then was that Afghanistan would remain her focus for the next eighteen years. Gannon, uniquely among Western journalists, witnessed Afghanistan's tragic opera: the final collapse of communism followed by bitterly feuding warlords being driven from power by an Islamicist organization called the Taliban; the subsequent arrival of Arabs and exiles, among them Osama bin Laden; and the transformation of the country into the staging post for a global jihad. Gannon observed something else as well: the terrible, unforeseen consequences of Western intervention, the ongoing suffering of ordinary Afghans, and the ability of the most corrupt and depraved of the warlords to reinvent and reinsert themselves into successive governments. I is for Infidel is the story of a country told by a writer with a uniquely intimate knowledge of its people and recent history. It will transform readers' understanding of Afghanistan, and inspire awe at the resilience of its people in the face of the monstrous warmongers we have to some extent created there.

Rogue Justice: The Making of the Security State


Karen J. Greenberg - 2016
    From that day forward, the Bush administration turned to the Department of Justice to give its imprimatur to activities that had previously been unthinkable—from the NSA's spying on US citizens to indefinite detention to torture. Many of these activities were secretly authorized, others done in the light of day. When President Obama took office, many observers expected a reversal of these encroachments upon civil liberties and justice, but the new administration found the rogue policies to be deeply entrenched, and, at times, worth preserving. Obama ramped up targeted killings, held fast to aggressive surveillance policies, and fell short on bringing reform to detention and interrogation. How did America veer so far from its founding principles of justice? Rogue Justice connects the dots for the first time—from the Patriot Act to today’s military commissions, from terrorism prosecutions to intelligence priorities, from the ACLU’s activism to Edward Snowden’s revelations. And it poses a stark question: will the American justice system ever recover from the compromises it made for the war on terror?Riveting and deeply reported, Rogue Justice could only have been written by Karen Greenberg, one of this country’s top experts on Guantánamo, torture, and terrorism, with a deep knowledge of both the Bush and Obama administrations. Now she brings to life the full story of law and policy after 9/11, introducing us to the key players and events, showing that time and again, when liberty and security have clashed, justice has been the victim.

Cryptography Engineering: Design Principles and Practical Applications


Niels Ferguson - 2010
    Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.

Android Hacker's Handbook


Joshua J. Drake - 2013
    Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.

The Wires of War: Technology and the Global Struggle for Power


Jacob Helberg - 2021
    During this time, he found himself in the midst of what can only be described as a quickly escalating two-front technology cold war between democracy and autocracy. On the front-end, we’re fighting to control the software—applications, news information, social media platforms, and more—of what we see on the screens of our computers, tablets, and phones, a clash which started out primarily with Russia but now increasingly includes China and Iran. Even more ominously, we’re also engaged in a hidden back-end battle—largely with China—to control the internet’s hardware, which includes devices like cellular phones, satellites, fiber-optic cables, and 5G networks. This tech-fueled war will shape the world’s balance of power for the coming century as autocracies exploit 21st-century methods to redivide the world into 20th-century-style spheres of influence. Without a firm partnership with the government, Silicon Valley is unable to protect democracy from the autocrats looking to sabotage it from Beijing to Moscow and Tehran. Helberg offers “unnervingly convincing evidence that time is running out in the ‘gray war’ with the enemies of freedom” (Kirkus Reviews) which could affect every meaningful aspect of our lives, including our economy, our infrastructure, our national security, and ultimately, our national sovereignty.

Legacy of Ashes: The History of the CIA


Tim Weiner - 2007
    Its mission was to know the world. When it did not succeed, it set out to change the world. Its failures have handed us, in the words of President Eisenhower, “a legacy of ashes.”Now Pulitzer Prize–winning author Tim Weiner offers the first definitive history of the CIA—and everything is on the record. LEGACY OF ASHES is based on more than 50,000 documents, primarily from the archives of the CIA itself, and hundreds of interviews with CIA veterans, including ten Directors of Central Intelligence. It takes the CIA from its creation after World War II, through its battles in the cold war and the war on terror, to its near-collapse after September 11th, 2001.Tim Weiner’s past work on the CIA and American intelligence was hailed as “impressively reported” and “immensely entertaining” in The New York Times.The Wall Street Journal called it “truly extraordinary . . . the best book ever written on a case of espionage.” Here is the hidden history of the CIA: why eleven presidents and three generations of CIA officers have been unable to understand the world; why nearly every CIA director has left the agency in worse shape than he found it; and how these failures have profoundly jeopardized our national security.

Hate Crimes in Cyberspace


Danielle Keats Citron - 2014
    Less familiar but far more serious is the way some use networked technologies to target real people, subjecting them, by name and address, to vicious, often terrifying, online abuse. In an in-depth investigation of a problem that is too often trivialized by lawmakers and the media, Danielle Keats Citron exposes the startling extent of personal cyber-attacks and proposes practical, lawful ways to prevent and punish online harassment. A refutation of those who claim that these attacks are legal, or at least impossible to stop, Hate Crimes in Cyberspace reveals the serious emotional, professional, and financial harms incurred by victims.Persistent online attacks disproportionately target women and frequently include detailed fantasies of rape as well as reputation-ruining lies and sexually explicit photographs. And if dealing with a single attacker’s “revenge porn” were not enough, harassing posts that make their way onto social media sites often feed on one another, turning lone instigators into cyber-mobs.Hate Crimes in Cyberspace rejects the view of the Internet as an anarchic Wild West, where those who venture online must be thick-skinned enough to endure all manner of verbal assault in the name of free speech protection, no matter how distasteful or abusive. Cyber-harassment is a matter of civil rights law, Citron contends, and legal precedents as well as social norms of decency and civility must be leveraged to stop it.

With Every Mistake


Gwynne Dyer - 2005
    With Every Mistake is not only a collection of the very best of Dyer’s recent work, but an examination of how, time and again, the media skews fact and opinion, wielding formidable influence on how we all shape our own thoughts. And why is so much of the information wrong? Is it herd instinct, official manipulation, robber-baron owners with ideological obsessions — or just the conflict between the inherently bitty, short-term nature of news reporting and analysis and the longer perspectives needed to understand what is actually going on? How much misinformation stems from simple ignorance and laziness?

Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali


OccupyTheWeb - 2018
    Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password crackerHacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

The Edge: Is the Military Dominance of the West Coming to an End?


Mark Urban - 2015
    Meanwhile, growing nationalism is hampering international cooperation and fuelling conflict everywhere. The west's will - as well as its capability - to shape the world is ebbing away.Beset by economic woes, western countries are continuing the post-Cold War process of disarmament at the very moment that many believe a new Cold War is starting. NATO members have compared Vladimir Putin's foreign policy to that of Adolf Hitler, newly empowered groups such as ISIS, not to mention some governments, are tearing up the rulebook of acceptable international behaviour, and the military prowess that the western world once regarded as its prerogative is being dwarfed by countries like India and China.Tightly argued by Newsnight's diplomatic and defence editor Mark Urban, THE EDGE is a sharp polemic that breaks new ground in examining the workings and consequences of these geo-political tectonics, and shows just how rapidly the balance of power has been upended.