Book picks similar to
Cyber Mercenaries by Tim Maurer
non-fiction
cyber
cybersecurity
espionage
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie - 2020
Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement.Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing.Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you:The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Simon Singh - 1999
From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.
The Cold War: A New History
John Lewis Gaddis - 2005
Drawing on newly opened archives and the reminiscences of the major players, John Lewis Gaddis explains not just what happened but why—from the months in 1945 when the U.S. and the U.S.S.R. went from alliance to antagonism to the barely averted holocaust of the Cuban Missile Crisis to the maneuvers of Nixon and Mao, Reagan and Gorbachev. Brilliant, accessible, almost Shakespearean in its drama, The Cold War stands as a triumphant summation of the era that, more than any other, shaped our own.
The Moscow Rules: The Secret CIA Tactics That Helped America Win the Cold War
Antonio J. Méndez - 2019
Soviets kept files on all foreigners, studied their patterns, tapped their phones, and even planted listening devices within the US Embassy. In short, intelligence work was effectively impossible. The Soviet threat loomed larger than ever. The Moscow Rules tells the story of the intelligence breakthrough that turned the odds in America's favor. As Chief of Disguise and Authentication, Mendez was instrumental in creating and honing a series of tactics that allowed officers to finally get one step ahead of the KGB. These techniques included everything from elaborate, Hollywood-inspired identity swaps, to deception or evasion techniques, to more mundane document forgery. With these new guidelines in place, and with an armory of new gadgets perfected by the Office of Technical Services including miniature cameras, suitcase release body doubles, and wall repelling mechanisms, the CIA managed to gain a foothold in Moscow and pull off some of the greatest intelligence operations in the history of espionage. As America is again confronted by the threat of Russian disinformation, the dramatic inside story of how we defeated our once-and-future enemy is as timely as ever.
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide
James Michael Stewart - 2015
This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Four unique 250 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security
AI Superpowers: China, Silicon Valley, and the New World Order
Kai-Fu Lee - 2018
Kai-Fu Lee—one of the world’s most respected experts on AI and China—reveals that China has suddenly caught up to the US at an astonishingly rapid and unexpected pace.In AI Superpowers, Kai-Fu Lee argues powerfully that because of these unprecedented developments in AI, dramatic changes will be happening much sooner than many of us expected. Indeed, as the US-Sino AI competition begins to heat up, Lee urges the US and China to both accept and to embrace the great responsibilities that come with significant technological power.Most experts already say that AI will have a devastating impact on blue-collar jobs. But Lee predicts that Chinese and American AI will have a strong impact on white-collar jobs as well. Is universal basic income the solution? In Lee’s opinion, probably not. But he provides a clear description of which jobs will be affected and how soon, which jobs can be enhanced with AI, and most importantly, how we can provide solutions to some of the most profound changes in human history that are coming soon.
Threat Modeling: Designing for Security
Adam Shostack - 2014
Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
The WikiLeaks Files: The World According to US Empire
Julian AssangeRuss Wellen - 2015
It also discovered the dark truths of national policies, human rights violations, covert operations & cover-ups. The WikiLeaks Files is the 1st volume that uses experts to collate the most important cables & show their historic importance. The book explores in a series of chapters covering the major regions of the world how the USA has imposed its will. It reveals how it imposes its agenda on the world: a new form of imperialism that uses a variety of tactics from torture & military action, to trade deals & “soft power,” in order to expand its influence. It shows the details of the close relationship between government & big business in promoting US goods. The WikiLeaks Files is the most comprehensive analysis of State department cables to date. Assange's introduction exposes the on-going debates on freedom of information, international surveillance & justice. Regional expert contributors include Dan Beeton, Phyllis Bennis, Michael Busch, Peter Certo, Conn Hallinan, Sarah Harrison, Richard Heydarian, Dahr Jamail, Jake Johnston, Alexander Main, Robert Naiman, Francis Njubi Nesbitt, Linda Pearson, Gareth Porter, Tim Shorrock, Russ Wellen & Stephen Zunes.IntroductionAmerica & the dictators Dictators & human rightsWar & terrorism Indexing the empire/Sarah Harrison US war crimes & the ICC/Linda PearsonEurope/Michael Busch Russia/Russ Wellen Turkey/Conn HallinanIsrael/Stephen Zunes & Peter CertoSyria/Robert Naiman Iran/Gareth Porter Iraq/Dahr Jamail Afghanistan/Phyllis BennisEast Asia/Tim Shorrock Southeast Asia/Richard Heydarian South Africa/Francis Njubi NesbittLatin America & the Caribbean/Alexander Main, Jake Johnston & Dan BeetonVenezuela/Dan Beeton, Jake Johnston & Alexander Main
A World in Disarray: American Foreign Policy and the Crisis of the Old Order
Richard N. Haass - 2017
The rules, policies, and institutions that have guided the world since World War II have largely run their course. Respect for sovereignty alone cannot uphold order in an age defined by global challenges from terrorism and the spread of nuclear weapons to climate change and cyberspace. Meanwhile, great power rivalry is returning. Weak states pose problems just as confounding as strong ones. The United States remains the world’s strongest country, but American foreign policy has at times made matters worse, both by what the U.S. has done and by what it has failed to do. The Middle East is in chaos, Asia is threatened by China’s rise and a reckless North Korea, and Europe, for decades the world’s most stable region, is now anything but. As Richard Haass explains, the election of Donald Trump and the unexpected vote for “Brexit” signals that many in modern democracies reject important aspects of globalization, including borders open to trade and immigrants.In A World in Disarray, Haass argues for an updated global operating system—call it world order 2.0—that reflects the reality that power is widely distributed and that borders count for less. One critical element of this adjustment will be adopting a new approach to sovereignty, one that embraces its obligations and responsibilities as well as its rights and protections. Haass also details how the U.S. should act towards China and Russia, as well as in Asia, Europe, and the Middle East. He suggests, too, what the country should do to address its dysfunctional politics, mounting debt, and the lack of agreement on the nature of its relationship with the world.A World in Disarray is a wise examination, one rich in history, of the current world, along with how we got here and what needs doing. Haass shows that the world cannot have stability or prosperity without the United States, but that the United States cannot be a force for global stability and prosperity without its politicians and citizens reaching a new understanding.
The Sword and the Shield: The Mitrokhin Archive & the Secret History of the KGB
Christopher Andrew - 1985
Vasili Mitrokhin, a secret dissident who worked in the KGB archive, smuggled out copies of its most highly classified files every day for twelve years. In 1992, a U.S. ally succeeded in exfiltrating the KGB officer and his entire archive out of Moscow. The archive covers the entire period from the Bolshevik Revolution to the 1980s and includes revelations concerning almost every country in the world. But the KGB's main target, of course, was the United States. Though there is top-secret material on almost every country in the world, the United States is at the top of the list. As well as containing many fascinating revelations, this is a major contribution to the secret history of the twentieth century. Among the topics and revelations explored are: The KGB's covert operations in the United States and throughout the West, some of which remain dangerous today. KGB files on Oswald and the JFK assassination that Boris Yeltsin almost certainly has no intention of showing President Clinton. The KGB's attempts to discredit civil rights leader in the 1960s, including its infiltration of the inner circle of a key leader. The KGB's use of radio intercept posts in New York and Washington, D.C., in the 1970s to intercept high-level U.S. government communications. The KGB's attempts to steal technological secrets from major U.S. aerospace and technology corporations. KGB covert operations against former President Ronald Reagan, which began five years before he became president. KGB spies who successfully posed as U.S. citizens under a series of ingenious disguises, including several who attained access to the upper echelons of New York society.
Tmux 2: Productive Mouse-Free Development
Brian P. Hogan - 2016
The time you spend context switching between your editor and your consoles eats away at your productivity. Take control of your environment with tmux, a terminal multiplexer that you can tailor to your workflow. With this updated second edition for tmux 2.3, you'll customize, script, and leverage tmux's unique abilities to craft a productive terminal environment that lets you keep your fingers on your keyboard's home row.You have a database console, web server, test runner, and text editor running at the same time, but switching between them and trying to find what you need takes up valuable time and breaks your concentration. By using tmux 2.3, you can improve your productivity and regain your focus. This book will show you how.This second edition includes many features requested by readers, including how to integrate plugins into your workflow, how to integrate tmux with Vim for seamless navigation - oh, and how to use tmux on Windows 10.Use tmux to manage multiple terminal sessions in a single window using only your keyboard. Manage and run programs side by side in panes, and create the perfect development environment with custom scripts so that when you're ready to work, your programs are waiting for you. Manipulate text with tmux's copy and paste buffers, so you can move text around freely between applications. Discover how easy it is to use tmux to collaborate remotely with others, and explore more advanced usage as you manage multiple tmux sessions, add custom scripts into the tmux status line, and integrate tmux with your system.Whether you're an application developer or a system administrator, you'll find many useful tricks and techniques to help you take control of your terminal.
Boots on the Ground: A Month with the 82nd Airborne in the Battle for Iraq
Karl Zinsmeister - 2003
Signed flat (without inscription) by author; Stated First Edition and first printing. See scans and description. New York: Truman Talley Books (St. Martin 's Press), 2003. 'Boots On The Ground: A Month With The 82nd Airborne In The Battle For Iraq', by Karl Zinsmeister. Octavo, illustrated jacket, black boards with copper spine imprinting, buff endpapers, author-signed on first free endpaper ('flat' signed, i.e. without inscription - see scan), 255 pp. ( x + 213 + 32 pp. color photographic section). New, and immaculate, cover to cover, including jacket. An example for the collector. A first-hand account of the title experience, by the editor-in-chief of American Enterprise magazine, who was, in 2003, a frontline reporter embedded with the 82nd Airborne. Ships in a new, sturdy, protective box, of course - not a bag. L202
Reversing: Secrets of Reverse Engineering
Eldad Eilam - 2005
The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into disassembly-code-level reverse engineering-and explaining how to decipher assembly language
Brave New War: The Next Stage of Terrorism and the End of Globalization
John Robb - 2007
He shows how combating the shutdown of the world's oil, high-tech, and financial markets could cost us the thing we've come to value the most--worldwide economic and cultural integration--and what we must do now to safeguard against this new method of warfare.