Valley of Genius: The Uncensored History of Silicon Valley (As Told by the Hackers, Founders, and Freaks Who Made It Boom)


Adam Fisher - 2018
    It will take us all back to our roots in the counterculture, and will remind us of the true nature of the innovation process, before we tried to tame it with slogans and buzzwords." -- Po Bronson, #1 New York Times bestselling author of The Nudist on the Late Shift and NurtureshockA candid, colorful, and comprehensive oral history that reveals the secrets of Silicon Valley -- from the origins of Apple and Atari to the present day clashes of Google and Facebook, and all the start-ups and disruptions that happened along the way.Rarely has one economy asserted itself as swiftly--and as aggressively--as the entity we now know as Silicon Valley. Built with a seemingly permanent culture of reinvention, Silicon Valley does not fight change; it embraces it, and now powers the American economy and global innovation. So how did this omnipotent and ever-morphing place come to be? It was not by planning. It was, like many an empire before it, part luck, part timing, and part ambition. And part pure, unbridled genius...Drawing on over two hundred in-depth interviews, VALLEY OF GENIUS takes readers from the dawn of the personal computer and the internet, through the heyday of the web, up to the very moment when our current technological reality was invented. It interweaves accounts of invention and betrayal, overnight success and underground exploits, to tell the story of Silicon Valley like it has never been told before. Read it to discover the stories that Valley insiders tell each other: the tall tales that are all, improbably, true.

Ruined by Design: How Designers Destroyed the World, and What We Can Do to Fix It


Mike Monteiro - 2019
    Guns, which lead to so much death, work exactly as they’re designed to work. And every time we “improve” their design, they get better at killing. Facebook’s privacy settings, which have outed gay teens to their conservative parents, are working exactly as designed. Their “real names” iniative, which makes it easier for stalkers to re-find their victims, is working exactly as designed. Twitter’s toxicity and lack of civil discourse is working exactly as it’s designed to work.The world is working exactly as designed. And it’s not working very well. Which means we need to do a better job of designing it. Design is a craft with an amazing amount of power. The power to choose. The power to influence. As designers, we need to see ourselves as gatekeepers of what we are bringing into the world, and what we choose not to bring into the world. Design is a craft with responsibility. The responsibility to help create a better world for all.Design is also a craft with a lot of blood on its hands. Every cigarette ad is on us. Every gun is on us. Every ballot that a voter cannot understand is on us. Every time social network’s interface allows a stalker to find their victim, that’s on us. The monsters we unleash into the world will carry your name.This book will make you see that design is a political act. What we choose to design is a political act. Who we choose to work for is a political act. Who we choose to work with is a political act. And, most importantly, the people we’ve excluded from these decisions is the biggest (and stupidest) political act we’ve made as a society.If you’re a designer, this book might make you angry. It should make you angry. But it will also give you the tools you need to make better decisions. You will learn how to evaluate the potential benefits and harm of what you’re working on. You’ll learn how to present your concerns. You’ll learn the importance of building and working with diverse teams who can approach problems from multiple points-of-view. You’ll learn how to make a case using data and good storytelling. You’ll learn to say NO in a way that’ll make people listen. But mostly, this book will fill you with the confidence to do the job the way you always wanted to be able to do it. This book will help you understand your responsibilities.

Lurking: How a Person Became a User


Joanne McNeil - 2020
    It has created a new, unprecedented cultural space that we are all a part of—even if we don’t participate, that is how we participate—but by which we’re continually surprised, betrayed, enriched, befuddled. We have churned through platforms and technologies and in turn been churned by them. And yet, the internet is us and always has been.In Lurking, Joanne McNeil digs deep and identifies the primary (if sometimes contradictory) concerns of people online: searching, safety, privacy, identity, community, anonymity, and visibility. She charts what it is that brought people online and what keeps us here even as the social equations of digital life—what we’re made to trade, knowingly or otherwise, for the benefits of the internet—have shifted radically beneath us. It is a story we are accustomed to hearing as tales of entrepreneurs and visionaries and dynamic and powerful corporations, but there is a more profound, intimate story that hasn’t yet been told.Long one of the most incisive, ferociously intelligent, and widely respected cultural critics online, McNeil here establishes a singular vision of who we are now, tells the stories of how we became us, and helps us start to figure out what we do now.

The Numerati


Stephen Baker - 2008
    Now, in one of the greatest undertakings of the twenty-first century, a savvy group of mathematicians and computer scientists is beginning to sift through this data to dissect us and map out our next steps. Their goal? To manipulate our behavior -- what we buy, how we vote -- without our even realizing it.In this tour de force of original reporting and analysis, journalist Stephen Baker provides us with a fascinating guide to the world we're all entering -- and to the people controlling that world. The Numerati have infiltrated every realm of human affairs, profiling us as workers, shoppers, patients, voters, potential terrorists -- and lovers. The implications are vast. Our privacy evaporates. Our bosses can monitor and measure our every move (then reward or punish us). Politicians can find the swing voters among us, by plunking us all into new political groupings with names like "Hearth Keepers" and "Crossing Guards." It can sound scary. But the Numerati can also work on our behalf, diagnosing an illness before we're aware of the symptoms, or even helping us find our soul mate. Surprising, enlightening, and deeply relevant, The Numerati shows how a powerful new endeavor -- the mathematical modeling of humanity -- will transform every aspect of our lives. STEPHEN BAKER has written for BusinessWeek for over twenty years, covering Mexico and Latin America, the Rust Belt, European technology, and a host of other topics, including blogs, math, and nanotechnology. But he's always considered himself a foreign correspondent. This, he says, was especially useful as he met the Numerati. "While I came from the world of words, they inhabited the symbolic realms of math and computer science. This was foreign to me. My reporting became an anthropological mission." Baker has written for many publications, including the Wall Street Journal, the Los Angeles Times, and the Boston Globe. He won an Overseas Press Club Award for his portrait of the rising Mexican auto industry. He is the coauthor of blogspotting.net, featured by the New York Times as one of fifty blogs to watch.

Selfie: How We Became So Self-Obsessed and What It's Doing to Us


Will Storr - 2017
    This is our culture’s image of the perfect self. We see this person everywhere: in advertising, in the press, all over social media. We’re told that to be this person you just have to follow your dreams, that our potential is limitless, that we are the source of our own success. But this model of the perfect self can be extremely dangerous. People are suffering under the torture of this impossible fantasy. Unprecedented social pressure is leading to increases in depression and suicide. Where does this ideal come from? Why is it so powerful? Is there any way to break its spell? To answer these questions, Selfie by Will Storr takes us from the shores of Ancient Greece, through the Christian Middle Ages, to the self-esteem evangelists of 1980s California, the rise of narcissism and the selfie generation, and right up to the era of hyper-individualistic neoliberalism in which we live now. It tells the extraordinary story of the person we all know so intimately – our self.

The Revolt of the Public and the Crisis of Authority


Martin Gurri - 2014
    In the words of economist and scholar Arnold Kling, Martin Gurri saw it coming.Technology has categorically reversed the information balance of power between the public and the elites who manage the great hierarchical institutions of the industrial age government, political parties, the media.The Revolt of the Public tells the story of how insurgencies, enabled by digital devices and a vast information sphere, have mobilized millions of ordinary people around the world.Originally published in 2014, this updated edition of The Revolt of the Public includes an extensive analysis of Donald Trump's improbable rise to the presidency and the electoral triumphs of Brexit and concludes with a speculative look forward, pondering whether the current elite class can bring about a reformation of the democratic process and whether new organizing principles, adapted to a digital world, can arise out of the present political turbulence.

Dreamland: The True Tale of America's Opiate Epidemic


Sam Quinones - 2015
    Communities where heroin had never been seen before—from Charlotte, NC and Huntington, WVA, to Salt Lake City and Portland, OR—were overrun with it. Local police and residents were stunned. How could heroin, long considered a drug found only in the dense, urban environments along the East Coast, and trafficked into the United States by enormous Colombian drug cartels, be so incredibly ubiquitous in the American heartland? Who was bringing it here, and perhaps more importantly, why were so many townspeople suddenly eager for the comparatively cheap high it offered?With the same dramatic drive of El Narco and Methland, Sam Quinones weaves together two classic tales of American capitalism: The stories of young men in Mexico, independent of the drug cartels, in search of their own American Dream via the fast and enormous profits of trafficking cheap black-tar heroin to America’s rural and suburban addicts; and that of Purdue Pharma in Stamford, Connecticut, determined to corner the market on pain with its new and expensive miracle drug, Oxycontin; extremely addictive in its own right. Quinones illuminates just how these two stories fit together as cause and effect: hooked on costly Oxycontin, American addicts were lured to much cheaper black tar heroin and its powerful and dangerous long-lasting high. Embroiled alongside the suppliers and buyers are DEA agents, local, small-town sheriffs, and the US attorney from eastern Virginia whose case against Purdue Pharma and Oxycontin made him an enemy of the Bush-era Justice Department, ultimately stalling and destroying his career in public service.Dreamland is a scathing and incendiary account of drug culture and addiction spreading to every part of the American landscape.

Red Team Field Manual


Ben Clark - 2014
    The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.

Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali


OccupyTheWeb - 2018
    Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password crackerHacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor


Virginia Eubanks - 2018
    In Pittsburgh, a child welfare agency uses a statistical model to try to predict which children might be future victims of abuse or neglect.Since the dawn of the digital age, decision-making in finance, employment, politics, health and human services has undergone revolutionary change. Today, automated systems—rather than humans—control which neighborhoods get policed, which families attain needed resources, and who is investigated for fraud. While we all live under this new regime of data, the most invasive and punitive systems are aimed at the poor.In Automating Inequality, Virginia Eubanks systematically investigates the impacts of data mining, policy algorithms, and predictive risk models on poor and working-class people in America. The book is full of heart-wrenching and eye-opening stories, from a woman in Indiana whose benefits are literally cut off as she lays dying to a family in Pennsylvania in daily fear of losing their daughter because they fit a certain statistical profile.The U.S. has always used its most cutting-edge science and technology to contain, investigate, discipline and punish the destitute. Like the county poorhouse and scientific charity before them, digital tracking and automated decision-making hide poverty from the middle-class public and give the nation the ethical distance it needs to make inhumane choices: which families get food and which starve, who has housing and who remains homeless, and which families are broken up by the state. In the process, they weaken democracy and betray our most cherished national values.This deeply researched and passionate book could not be more timely.Naomi Klein: "This book is downright scary."Ethan Zuckerman, MIT: "Should be required reading."Dorothy Roberts, author of Killing the Black Body: "A must-read for everyone concerned about modern tools of inequality in America."Astra Taylor, author of The People's Platform: "This is the single most important book about technology you will read this year."

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation


Bruce Dang - 2014
    Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.

Trainwreck: The Women We Love to Hate, Mock, and Fear... and Why


Sady Doyle - 2016
     She’s Britney Spears shaving her head, Whitney Houston saying, “crack is whack,” and Amy Winehouse, dying in front of millions. But the trainwreck is also as old (and as meaningful) as feminism itself. From Mary Wollstonecraft—who, for decades after her death, was more famous for her illegitimate child and suicide attempts than for A Vindication of the Rights of Woman—to Charlotte Brontë, Billie Holiday, Sylvia Plath, and even Hillary Clinton, Sady Doyle’s Trainwreck dissects a centuries-old phenomenon and asks what it means now, in a time when we have unprecedented access to celebrities and civilians alike, and when women are pushing harder than ever against the boundaries of what it means to “behave.” Where did these women come from? What are their crimes? And what does it mean for the rest of us? For an age when any form of self-expression can be the one that ends you, Sady Doyle’s book is as fierce and intelligent as it is funny and compassionate—an essential, timely, feminist anatomy of the female trainwreck.

The Geeks Shall Inherit the Earth: Popularity, Quirk Theory and Why Outsiders Thrive After High School


Alexandra Robbins - 2009
    Of course, in middle school and high school, almost everyone is an outsider: the nerds, the new girls, the band geeks, the loners; even the "popular" cheerleaders. Alexandra Robbins' The Geeks Shall Inherit the Earth takes us inside the hallways of real schools to show us how shifting cliques and permanent marginalization affect children. Following individual students over the course of a year, she tracks the plight and possibilities of self-confessed nerds, freaks, punks, Goths, and weirdos. Her central message is heartening: Our increasingly homogenized society ultimately needs and welcomes the cafeteria fringe.

Rootkits: Subverting the Windows Kernel


Greg Hoglund - 2005
    It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks

Accidental Empires


Robert X. Cringely - 1992
    Accidental Empires is the trenchant, vastly readable history of that industry, focusing as much on the astoundingly odd personalities at its core—Steve Jobs, Bill Gates, Mitch Kapor, etc. and the hacker culture they spawned as it does on the remarkable technology they created. Cringely reveals the manias and foibles of these men (they are always men) with deadpan hilarity and cogently demonstrates how their neuroses have shaped the computer business. But Cringely gives us much more than high-tech voyeurism and insider gossip. From the birth of the transistor to the mid-life crisis of the computer industry, he spins a sweeping, uniquely American saga of creativity and ego that is at once uproarious, shocking and inspiring.