Book picks similar to
Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World by Eric Cole
non-fiction
won
giveaways
technology
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie - 2020
Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement.Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing.Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you:The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Justin Seitz - 2008
But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools - and how to build your own when the pre-built ones won't cut it.You'll learn how to:Automate tedious reversing and security tasks Design and program your own debugger Learn how to fuzz Windows drivers and create powerful fuzzers from scratch Have fun with code and library injection, soft and hard hooking techniques, and other software trickery Sniff secure traffic out of an encrypted web browser session Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more The world's best hackers are using Python to do their handiwork. Shouldn't you?
Heartsick
Jessie StephensJessie Stephens - 2021
And so we are left in the middle of the ocean, floating in a dinghy with no anchor, while the world waits for us to be okay again.'Claire has returned from London to the dust and familiarity of her childhood home, only to realise something is wrong with her partner Maggie.Patrick is a lonely uni student, until he meets Caitlin - but does she feel as connected as he does?Ana is happily married with three children. Then, one night, she falls in love with someone else.Based on three true stories, Heartsick is a compelling narrative nonfiction account of the many lows and occasional surprising highs of heartbreak. Bruising, beautiful, achingly specific but wholeheartedly universal, it reminds us that emotional pain can make us as it breaks us, and that storytelling has the ultimate healing power.
Pull: The Power of the Semantic Web to Transform Your Business
David Siegel - 2009
This book claimed that through a piece of software called a "browser," which accesses "web sites," the world economy and our daily lives would change forever. Would you have believed even 10 percent of that book? Did you take advantage of the first Internet wave and get ahead of the curve? "Pull" is the blueprint to the next disruptive wave. Some call it Web 3.0; others call it the semantic web. It's a fundamental transition from pushing information to pulling, using a new way of thinking and collaborating online. Using the principles of this book, you will slash 5-20 percent off your bottom line, make your customers happier, accelerate your industry, and prepare your company for the twenty-first century. It isn't going to be easy, and you don't have any choice. By 2015, your company will be more agile and your processes more flexible than you ever thought possible. The semantic web leads to possibilities straight from science fiction, such as buildings that can order their own supplies, eliminating the IRS, and lawyers finally making sense. But it also leads to major changes in every field, from shipping and retail distribution to health care and financial reporting. Through clear examples, case studies, principles, and scenarios, business strategist David Siegel takes you on a tour of this new world. You'll learn: -Which industries are already ahead. -Which industries are already dead. -How to make the power shift from pushing to pulling information. -How software, hardware, media, and marketing will all change. -How to plan your own strategy for embracing the semantic web. We are at the beginning of a new technology curve that will affect all areas of business. Right now, you have a choice. You can decide to start preparing for the exciting opportunities that lay ahead or you can leave this book on the shelf and get left in the dust like last time.
The Simulation Hypothesis
Rizwan Virk - 2019
Riz is the Executive Director of Play Labs @ MIT, a video game startup incubator at the MIT Game Lab.Drawing from research and concepts from computer science, artificial intelligence, video games, quantum physics, and referencing both speculative fiction and ancient eastern spiritual texts, Virk shows how all of these traditions come together to point to the idea that we may be inside a simulated reality like the Matrix.The Simulation Hypothesis is the idea that our physical reality, far from being a solid physical universe, is part of an increasingly sophisticated video game-like simulation, where we all have multiple lives, consisting of pixels with its own internal clock run by some giant Artificial Intelligence. Simulation theory explains some of the biggest mysteries of quantum and relativistic physics, such as quantum indeterminacy, parallel universes, and the integral nature of the speed of light.Recently, the idea that we may be living in a giant video game has received a lot of attention:"There's a one in a billion chance we are not living in a simulation" -Elon Musk"I find it hard to argue we are not in a simulation." -Neil deGrasse Tyson"We are living in computer generated reality." -Philip K. DickVideo game technology has developed from basic arcade and text adventures to MMORPGs. Video game designer Riz Virk shows how these games may continue to evolve in the future, including virtual reality, augmented reality, Artificial Intelligence, and quantum computing. This book shows how this evolution could lead us to the point of being able to develop all encompassing virtual worlds like the Oasis in Ready Player One, or the simulated reality in the Matrix.While the idea sounds like science fiction, many scientists, engineers, and professors have given the Simulation Hypothesis serious consideration. Futurist Ray Kurzweil has popularized the idea of downloading our consciousness into a silicon based device, which would mean we are just digital information after all. Some, like Oxford lecturer Nick Bostrom, goes further and thinks we may in fact be artificially intelligent consciousness inside such a simulation already!But the Simulation Hypothesis is not just a modern idea. Philosophers like Plato have been telling us that we live in a "cave" and can only see shadows of the real world. Mystics of all traditions have long contended that we are living in some kind of "illusion "and that there are other realities which we can access with our minds. While even Judeo-Christian traditions have this idea, Eastern traditions like Buddhism and Hinduism make this idea part of their core tradition -- that we are inside a dream world ("Maya" or illusion, or Vishnu's Dream), and we have "multiple lives" playing different characters when one dies, continuing to gain experience and "level up" after completing certain challenges. Sounds a lot like a video game!Whether you are a computer scientist, a fan of science fiction like the Matrix movies, a video game enthusiast, or a spiritual seeker, The Simulation Hypothesis touches on all these areas, and you will never look at the world the same way again!
What Game Are You Playing?: A Framework for Redefining Success and Achieving What Matters Most
Robin Moriarty - 2019
We build our personal and professional lives around those expectations and at some point, many of us wonder if we are on the right path. We may want to make changes, but it's difficult and we don't know how to start. In What Game Are You Playing?, author Robin Moriarty, PhD shares her view on what being “successful” should look like, and those views will be a surprise to many. According to Moriarty, life is a game, and it is up to each individual to determine just what kind of game they want to play. The author guides readers through a process that shows them how to assess their current state and outlines the steps they need to take in order to achieve their new game and own version of success.The book enables readers to— • Gain awareness of the way they want to live their lives • Reframe success on their own terms • Map out what they will need to do to get there Through a series of examples and exercises designed as a game, Moriarty helps readers recognize—and then step away from—the expectations of others so they can define and pursue their own version of success in work and in life. Through this process of finding and designing their own games,, readers will no longer be a pawn in someone else’s.
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Clifford Stoll - 1989
citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" -- a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases -- a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
Baby Steps Millionaires: How Ordinary People Built Extraordinary Wealth-- and How You Can Too
Dave Ramsey - 2022
The Art of Noticing: 131 Ways to Spark Creativity, Find Inspiration, and Discover Joy in the Everyday
Rob Walker - 2019
Our lives are in constant tether to phones, to email, and to social media. In this age of distraction, the ability to experience and be present is often lost: to think and to see and to listen.Enter Rob Walker's The Art of Noticing--an inspiring volume that will help you see the world anew. Through a series of simple and playful exercises--131 of them--Walker maps ways for you to become a clearer thinker, a better listener, a more creative workplace colleague, and finally, to rediscover what really matters to you.
The Jackass Whisperer: How to deal with the worst people at work, at home and online—even when the Jackass is you
Scott Stratten - 2019
Jackasses are those who make our lives needlessly harder. They drive too slowly in the fast lane and too quickly in the slow lane, reply all, heat up fish in the microwave at work and share way too much information about their cleanse on Facebook. They live in our homes, work in our offices and shop at our stores. Jackasses are among us, and we have some bad news for you: if you can't spot the Jackass at the (enter literally any place on the planet), then the Jackass is you. After a lifetime of research, Scott and Alison Stratten offer the definitive guide to surviving the Jackassery in your life and making the world a better place, one set of noise-cancelling headphones at a time.
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Andy Greenberg - 2019
Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes became ever more brazen, eventually leading to the first-ever blackouts triggered by hackers. They culminated in the summer of 2017 when malware known as NotPetya was unleashed, compromising, disrupting, and paralyzing some of the world's largest companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. NotPetya spread around the world, inflicting an unprecedented ten billions of dollars in damage--the largest, most penetrating cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in the internet's history: Sandworm. Believed to be working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored hacking force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.From WIRED senior writer Andy Greenberg comes Sandworm, the true story of the desperate hunt to identify and track those attackers. It considers the danger this force poses to our national stability and security. And as the Kremlin's role in manipulating foreign governments and sparking chaos globally comes into greater focus, Sandworm reveals the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield--where the line between digital and physical conflict begins to blur, with world-shaking implications.
The Exceptionals: How the Best Become the Best and How You Can Too
Kumar Mehta - 2021
They are the 1% of the 1%. They have reached seemingly unreachable heights. They may be athletes or entertainers who are household names, or they may be people who have invented life-saving drugs or won a Nobel Prize by making fundamental advances in knowledge. Or they may have changed the world through science or music or business by influencing millions or perhaps billions of lives.They are the people who have succeeded in being able to draw out the best talents they have within themselves and have maximized the physical, mental, and social potential available to them.The Exceptionals is their story, and it provides you with the blueprint to advance yourself from good to great—and from outstanding to elite.
Happier Human: 53 Science-Backed Habits to Increase Your Happiness
S.J. Scott - 2019
If all this sounds interesting, then you should check out: Happier Human: 53 Science-Backed Habits to Increase Your Happiness Written by Wall Street Journal bestselling author S.J. Scott, Happier Human provides a detailed examination of the strategies and ideas that actually make people happy. Each idea is supported by a wealth of research into why it works. Plus, it also includes a simple action plan for turning these ideas into permanent habits that people can incorporate into their busy lives. Inside this accessible, entertaining guide, you'll learn: The role happiness plays in your success (hint: it's so much bigger than you think!) Which of our emotions are broken, and what that means for you 5 fundamental needs we all experience on a daily basis 8 reasons people struggle with unhappiness today How to identify and use the "big levers of happiness" How adaptation dampens your happiness … and what you can do to fight that tendency What the 80/20 Rule actually means, and how to use it Tools to test your level of happiness right now How to find happiness with others and yourself The secret to eliminating bad habits once and for all Intelligent steps for removing unhappiness for your life immediately 53 fully science-backed strategies for reaching a higher level of bliss today ... and so much more. Ready to stop waiting for happiness and make it part of your life today? Don't wait any longer. Buy this book NOW to build the happier, healthier, stronger business you've always known you could have. Pick up your copy today by clicking the BUY NOW button at the top of this page!
Money Magic: An Economist’s Secrets to More Money, Less Risk, and a Better Life
Laurence J. Kotlikoff - 2022
Money Magic offers a clear path to a richer, happier, and safer financial life. Whether you’re making education, career, marriage, lifestyle, housing, investment, retirement, or Social Security decisions, Kotlikoff provides a clear framework for readers of all ages and income levels to learn tricks like:How to choose a career to maximize your lifetime earnings (hint: you may want to consider picking up a plunger instead of a stethoscope).How to buy a superior education on the cheap and graduate debt-free.Why it’s smarter to cash out your IRA to pay off your mortgage.Why delaying retirement for two years can reap dividends and how to lower your average lifetime tax bracket. Money Magic’s most powerful act is transforming your financial thinking, explaining not just what to do, but why to do it. Get ready to discover the economics approach to financial planning—the fruit of a century’s worth of research by thousands of cloistered economic wizards whose now-accessible collective findings turn conventional financial advice on its head. Kotlikoff uses his soft heart, hard nose, dry wit, and flashing wand to cast a powerful spell, leaving you eager to accomplish what you formerly dreaded: financial planning.