Book picks similar to
Cyber Mercenaries by Tim Maurer
non-fiction
cyber
espionage
cybersecurity
Securing the City: Inside America's Best Counterterror Force--The NYPD
Christopher Dickey - 2009
Christopher Dickey takes us inside the best and most ambitious anti-terror operation in the country, the seat-of-the-pants intelligence operation of the NYPD—with undercover resources all over the world and two extraordinary men in charge..
Assad or We Burn the Country: How One Family's Lust for Power Destroyed Syria
Sam Dagher - 2019
Tlass pushed for conciliation but Assad decided to crush the uprising -- an act which would catapult the country into an eight-year long war, killing almost half a million and fueling terrorism and a global refugee crisis.Assad or We Burn the Country examines Syria's tragedy through the generational saga of the Assad and Tlass families, once deeply intertwined and now estranged in Bashar's bloody quest to preserve his father's inheritance. By drawing on his own reporting experience in Damascus and exclusive interviews with Tlass, Dagher takes readers within palace walls to reveal the family behind the destruction of a country and the chaos of an entire region.Dagher shows how one of the world's most vicious police states came to be and explains how a regional conflict extended globally, engulfing the Middle East and pitting the United States and Russia against one another.
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
John Sammons - 2011
This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations.This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available.This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security.
Windows Internals: Covering Windows Server 2008 and Windows Vista (Pro-Developer)
Mark E. Russinovich - 2008
Fully updated for Windows Server® 2008 and Windows Vista®, this classic guide delivers key architectural insights on system design, debugging, performance, and support—along with hands-on experiments to experience Windows internal behavior firsthand. Delve inside Windows architecture and internals:
Understand how the core system and management mechanisms work—from the object manager to services to the registry
Explore internal system data structures using tools like the kernel debugger
Grasp the scheduler's priority and CPU placement algorithms
Go inside the Windows security model to see how it authorizes access to data
Understand how Windows manages physical and virtual memory
Tour the Windows networking stack from top to bottom—including APIs, protocol drivers, and network adapter drivers
Troubleshoot file-system access problems and system boot problems
Learn how to analyze crashes
Siege at Jadotville: The Irish Army's Forgotten Battle
Declan Power - 2005
The notion of charging into adversity has been a cherished part of Ireland’s military history.In September 1961 another chapter should have been written into the annals, but it is a tale that lay shrouded in dust for years.The men of A Company, 35th Irish Infantry Battalion, arrived in the Congo as a UN contingent to help keep the peace. For many it would be their first trip outside their native shores. Some of the troops were teenage boys, their army-issue hobnailed boots still unbroken. They had never heard a shot fired in anger. Others were experienced professional soldiers, but were still not prepared for the action that was to take place.Led by Commandant Pat Quinlan, A Company found themselves tasked with protecting the European population at Jadotville, a small mining town in the southern Congolese province of Katanga. It fell to A Company to try and protect people who later turned on them. On 13 September 1961 the bright morning air of Jadotville was shattered by the sound of automatic gunfire.The men of A Company found their morning Mass parade interrupted, and within minutes went from holding rosaries to rifles as they entered the world of combat. This was to be no Srebrenica; though cut off and surrounded, the men of Jadotville held their ground and fought …This is their story.
Eastern Approaches
Fitzroy Maclean - 1949
Here Fitzroy Maclean recounts his extraordinary adventures in Soviet Central Asia, in the Western Desert, where he specialized in hair-raising commando-style raids behind enemy lines, and with Tito's partisans during the last months of the German occupation of Yugoslavia. An enthralling narrative, brilliantly told, "Eastern Approaches" is also a vivid personal view of episodes that have already become part of history.
This Is Not Propaganda: Adventures in the War Against Reality
Peter Pomerantsev - 2019
In this surreal atmosphere created to disorient us and undermine our sense of truth, we’ve lost not only our grip on peace and democracy — but our very notion of what those words even mean.Peter Pomerantsev takes us to the front lines of the disinformation age, where he meets Twitter revolutionaries and pop-up populists, “behavioral change” salesmen, Jihadi fanboys, Identitarians, truth cops, and many others. Forty years after his dissident parents were pursued by the KGB, Pomerantsev finds the Kremlin re-emerging as a great propaganda power. His research takes him back to Russia — but the answers he finds there are not what he expected.Blending reportage, family history, and intellectual adventure, This Is Not Propaganda explores how we can reimagine our politics and ourselves when reality seems to be coming apart.
Watershed 1967: India's Forgotten Victory Over China
Probal Dasgupta - 2020
The sole India–China conflict that remains etched in our collective memory is the 1962 war, which India tragically lost. But five years later, in 1967, India and China faced off once again in the heights of Cho La and Nathu La at the Sikkim border.This time, overcoming the odds, India triumphed. The fallout of these forgotten battles was immense. China shied away from actively allying with Pakistan and the US during the 1971 India–Pakistan war. And despite several stand-offs in the half century since then, Beijing has never again launched a military offensive against India. This incredible book tells us why these battles ushered in an era of peace.Full of thrilling international intrigue and nail-biting battle scenes, this book is based on extensive research and interviews with army officers and soldiers who participated in these historic battles. It aims to rectify a blind spot in history and shine the spotlight on a story of incredible bravery that India should be proud of.
Objective Troy: A Terrorist, a President, and the Rise of the Drone
Scott Shane - 2015
It follows Barack Obama’s campaign against the excesses of the Bush counterterrorism programs and his eventual embrace of the targeted killing of suspected militants. And it recounts how the president directed the mammoth machinery of spy agencies to hunt Awlaki down in a frantic, multi-million-dollar pursuit that would end with the death of Awlaki by a bizarre, robotic technology that is changing warfare—the drone. Scott Shane, who has covered terrorism for The New York Times over the last decade, weaves the clash between president and terrorist into both a riveting narrative and a deeply human account of the defining conflict of our era. Awlaki, who directed a plot that almost derailed Obama’s presidency, and then taunted him from his desert hideouts, will go down in history as the first United States citizen deliberately hunted and assassinated by his own government without trial. But his eloquent calls to jihad, amplified by YouTube, continue to lure young Westerners into terrorism—resulting in tragedies from the Boston marathon bombing to the murder of cartoonists at a Paris weekly. Awlaki’s life and death show how profoundly America has been changed by the threat of terrorism and by our own fears. Illuminating and provocative, and based on years of in depth reporting, Objective Troy is a brilliant reckoning with the moral challenge of terrorism and a masterful chronicle of our times.
Hacker's Delight
Henry S. Warren Jr. - 2002
Aiming to tell the dark secrets of computer arithmetic, this title is suitable for library developers, compiler writers, and lovers of elegant hacks.
Beirut Rules: The Murder of a CIA Station Chief and Hezbollah's War Against America
Fred Burton - 2018
Assigned as the new Beirut station chief, Buckley arrived to a war-torn city and a CIA station in tatters. A field operative at heart, he delved into Beirut's darkest corners, developing new sources and handling assets. Then, on October 23rd, a US Marine Corps barracks was destroyed in a plot masterminded by a young terrorist named Imad Mughniyeh. But even as President Reagan vowed revenge, Mughniyeh eyed a new target: Buckley. Beirut Rules is the pulse-by-pulse account of Buckley’s abduction, torture, and murder at the hands of Hezbollah terrorists. Drawing on never seen before U.S. government documents, as well as interviews with Buckley’s former coworkers, friends and family, Burton and Katz reveal how the pursuit to find Buckley in the wake of his kidnapping ignited a war against terror that continues to shape the Middle East to this day.
Steal This Computer Book 4.0 – What They Won′t Tell You About the Internet 4e
Wallace Wang - 2006
It is an unabashed look at the dark side of the Net--the stuff many other books gloss over. It's hard-edged, wisecracking, and often quite cynical as it pours over the reality of online scams, illegal activities, and simple annoyances. Wang's stated goal is to open the reader's eyes about what's really there. He shows what's being done, how it's being done, and how to avoid problems or even strike back. He begins with a chapter about the news media, and his message is that no source is to be trusted completely. He examines issues important to Internet users: the cost of getting computerized (with tips on how to find the real bargains), who is using the Internet as a source of hate information, and how your privacy can be invaded and protected. He shows you the secrets of malicious hackers and others and how some of them attack computer systems without the ethical mindset typical of the original, idealistic hackers. Wang shows you how you can set up your defenses against such an onslaught, discussing how to protect yourself and your kids from online stalkers and how online con games work. Wang never claims that the Internet is the electronic den of darkness that the pop media make it out to be. But he makes it clear that something this big has its lowlights--it's own "net noir." His messages are "know your enemy" and "be careful who you trust," an ideology verified by the examples he provides. --Elizabeth Lewis This offbeat, non-technical book examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, and entertaining, the completely revised fourth edition of Steal This Computer Book contains new chapters that discuss the hacker mentality, lock picking, exploiting P2P file sharing networks, and how people manipulate search engines and pop-up ads. Includes a CD with hundreds of megabytes of hack
Tournament of Shadows: The Great Game & the Race for Empire in Central Asia
Karl E. Meyer - 1999
The original Great Game, the clandestine struggle between Russia and Britain for mastery of Central Asia, has long been regarded as one of the greatest geopolitical conflicts in history. Many believed that control of the vast Eurasian heartland was the key to world dominion. The original Great Game ended with the Russian Revolution, but the geopolitical struggles in Central Asia continue to the present day. In this updated edition, the authors reflect on Central Asia's history since the end of the Russo-Afghan war, and particularly in the wake of 9/11.
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Andrew Jaquith - 2007
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index