Book picks similar to
Cyberphobia: Identity, Trust, Security and the Internet by Edward Lucas
non-fiction
technology
nonfiction
tech
To Be a Machine : Adventures Among Cyborgs, Utopians, Hackers, and the Futurists Solving the Modest Problem of Death
Mark O'Connell - 2017
It has found adherents in Silicon Valley billionaires Ray Kurzweil and Peter Diamandis. Google has entered the picture, establishing a bio-tech subsidiary aimed at solving the problem of aging.In To Be a Machine, journalist Mark O'Connell takes a headlong dive into this burgeoning movement. He travels to the laboratories, conferences, and basements of today's foremost transhumanists, where he's presented with the staggering possibilities and moral quandaries of new technologies like mind uploading, artificial superintelligence, cryonics, and device implants.A contributor to Slate, The New Yorker, and The New York Times Magazine, O'Connell serves as a sharp and lively guide to the outer limits of technology in the twenty first century. In investigating what it means to be a machine, he offers a surprising, singular meditation on what it means to be human."
Kill All Normies: Online Culture Wars from 4chan and Tumblr to Trump and the Alt-Right
Angela Nagle - 2017
On one side the alt right ranges from the once obscure neo-reactionary and white separatist movements, to geeky subcultures like 4chan, to more mainstream manifestations such as the Trump-supporting gay libertarian Milo Yiannopolous. On the other side, a culture of struggle sessions and virtue signalling lurks behind a therapeutic language of trigger warnings and safe spaces. The feminist side of the online culture wars has its equally geeky subcultures right through to its mainstream expression. Kill All Normies explores some of the cultural genealogies and past parallels of these styles and subcultures, drawing from transgressive styles of 60s libertinism and conservative movements, to make the case for a rejection of the perpetual cultural turn.
Technically Wrong: Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech
Sara Wachter-Boettcher - 2017
But few of us realize just how many oversights, biases, and downright ethical nightmares are baked inside the tech products we use every day. It’s time we change that.In Technically Wrong, Sara Wachter-Boettcher demystifies the tech industry, leaving those of us on the other side of the screen better prepared to make informed choices about the services we use—and to demand more from the companies behind them.
It's Complicated: The Social Lives of Networked Teens
Danah Boyd - 2014
. . It’s Complicated will update your mind.”—Alissa Quart, New York Times Book Review “A fascinating, well-researched and (mostly) reassuring look at how today's tech-savvy teenagers are using social media.”—People “The briefest possible summary? The kids are all right, but society isn’t.”—Andrew Leonard, Salon What is new about how teenagers communicate through services such as Facebook, Twitter, and Instagram? Do social media affect the quality of teens’ lives? In this eye-opening book, youth culture and technology expert danah boyd uncovers some of the major myths regarding teens' use of social media. She explores tropes about identity, privacy, safety, danger, and bullying. Ultimately, boyd argues that society fails young people when paternalism and protectionism hinder teenagers’ ability to become informed, thoughtful, and engaged citizens through their online interactions. Yet despite an environment of rampant fear-mongering, boyd finds that teens often find ways to engage and to develop a sense of identity. Boyd’s conclusions are essential reading not only for parents, teachers, and others who work with teens but also for anyone interested in the impact of emerging technologies on society, culture, and commerce in years to come. Offering insights gleaned from more than a decade of original fieldwork interviewing teenagers across the United States, boyd concludes reassuringly that the kids are all right. At the same time, she acknowledges that coming to terms with life in a networked era is not easy or obvious. In a technologically mediated world, life is bound to be complicated.
The Tcp/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
Charles Kozierok - 2005
It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone understand the dozens of protocols and technologies that run the Internet, with full coverage of PPP, ARP, IP, IPv6, IP NAT, IPSec, Mobile IP, ICMP, RIP, BGP, TCP, UDP, DNS, DHCP, SNMP, FTP, SMTP, NNTP, HTTP, Telnet and much more. The author offers not only a detailed view of the TCP/IP protocol suite, but also describes networking fundamentals and the important OSI Reference Model.
Windows Internals: Covering Windows Server 2008 and Windows Vista (Pro-Developer)
Mark E. Russinovich - 2008
Fully updated for Windows Server® 2008 and Windows Vista®, this classic guide delivers key architectural insights on system design, debugging, performance, and support—along with hands-on experiments to experience Windows internal behavior firsthand. Delve inside Windows architecture and internals:
Understand how the core system and management mechanisms work—from the object manager to services to the registry
Explore internal system data structures using tools like the kernel debugger
Grasp the scheduler's priority and CPU placement algorithms
Go inside the Windows security model to see how it authorizes access to data
Understand how Windows manages physical and virtual memory
Tour the Windows networking stack from top to bottom—including APIs, protocol drivers, and network adapter drivers
Troubleshoot file-system access problems and system boot problems
Learn how to analyze crashes
The Price of Everything: Solving the Mystery of Why We Pay What We Do
Eduardo Porter - 2011
Many of the prices we pay seem to make little sense. We shell out $2.29 for a coffee at Starbucks when a nearly identical brew can be had at the corner deli for less than a dollar. We may be less willing to give blood for $25 than to donate it for free. Americans hire cheap illegal immigrants to fix the roof or mow the lawn, and vote for politicians who promise to spend billions to keep them out of the country. And citizens of the industrialized West pay hundreds of dollars a year in taxes or cash for someone to cart away trash that would be a valuable commodity in poorer parts of the world. The Price of Everything starts with a simple premise: there is a price behind each choice that we make, whether we're deciding to have a baby, drive a car, or buy a book. We often fail to appreciate just how critical prices are as a motivating force shaping our lives. But their power becomes clear when distorted prices steer our decisions the wrong way. Eduardo Porter uncovers the true story behind the prices we pay and reveals what those prices are actually telling us. He takes us on a global economic adventure, from comparing the relative price of a vote in corrupt São Tomé and in the ostensibly uncorrupt United States, to assessing the cost of happiness in Bhutan, to deducing the dollar value we assign to human life. His unique approach helps explain: * Why polygamous societies actually place a higher value on women than monogamous ones. * Why someone may find more value in a $14 million license plate than the standard issue, $95 one. * Why some government agencies believe one year of life for a senior citizen is four times more valuable than that of a younger person. Porter weaves together the constant-and often unconscious-cost and value assessments we all make every day. While exploring the fascinating story behind the price of everything from marriage and death to mattresses and horsemeat, Porter draws unexpected connections that bridge a wide range of disciplines and cultures. The result is a cogent and insightful narrative about how the world really works.Watch a Video
Threat Modeling: Designing for Security
Adam Shostack - 2014
Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
Public Parts: How Sharing in the Digital Age is Revolutionizing Life, Business, and Society
Jeff Jarvis - 2011
More than 750 million people (and half of all Americans) use Facebook, where we share a billion times a day. The collective voice of Twitter echoes instantly 100 million times daily, from Tahrir Square to the Mall of America, on subjects that range from democratic reform to unfolding natural disasters to celebrity gossip. New tools let us share our photos, videos, purchases, knowledge, friendships, locations, and lives.Yet change brings fear, and many people--nostalgic for a more homogeneous mass culture and provoked by well-meaning advocates for privacy--despair that the internet and how we share there is making us dumber, crasser, distracted, and vulnerable to threats of all kinds. But not Jeff Jarvis.In this shibboleth-destroying book, "Public Parts "argues persuasively and personally that the internet and our new sense of publicness are, in fact, doing the opposite. Jarvis travels back in time to show the amazing parallels of fear and resistance that met the advent of other innovations such as the camera and the printing press. The internet, he argues, will change business, society, and life as profoundly as Gutenberg's invention, shifting power from old institutions to us all.Based on extensive interviews, "Public Parts "introduces us to the men and women building a new industry based on sharing. Some of them have become household names--Facebook's Mark Zuckerberg, Google's Eric Schmidt, and Twitter's Evan Williams. Others may soon be recognized as the industrialists, philosophers, and designers of our future. Jarvis explores the promising ways in which the internet and publicness allow us to collaborate, think, ways--how we manufacture and market, buy and sell, organize and govern, teach and learn. He also examines the necessity as well as the limits of privacy in an effort to understand and thus protect it. This new and open era has already profoundly disrupted economies, industries, laws, ethics, childhood, and many other facets of our daily lives. But the change has just begun. The shape of the future is not assured. The amazing new tools of publicness can be used to good ends and bad. The choices--and the responsibilities--lie with us. Jarvis makes an urgent case that the future of the internet--what one technologist calls "the eighth continent"--requires as much protection as the physical space we share, the air we breathe, and the rights we afford one another. It is a space of the public, for the public, and by the public. It needs protection and respect from all of us. As Secretary of State Hillary Clinton said in the wake of the uprisings in the Middle East, "If people around the world are going to come together every day online and have a safe and productive experience, we need a shared vision to guide us." Jeff Jarvis has that vision and will be that guide.
Troll Hunting: Inside the World of Online Hate and its Human Fallout
Ginger Gorman - 2019
She received scores of hateful tweets, including a death threat. A picture of Ginger heavily pregnant alongside her husband and two-and-half year old daughter appeared on a fascist website. Understandably she was terrified, but once the attack subsided, she found herself curious. Who were these trolls? How and why did they coordinate such an attack? And how does someone fight back against a troll?Over the next five years Gorman spoke to psychologists, trolling victims, law enforcement, academics and, most importantly, the trolls themselves, embedding herself into their online communities and their psyches in ways she had never anticipated. What she discovered was both profoundly shocking and fascinating. Syndicates of highly organised predator trolls across the globe systematically set out to disrupt and disturb. Some want to highlight the media's alleged left-wing bias, some want to bring down capitalism, and some just want to have fun. Even if it means destroying someone's life...An intense and compelling read, Troll Hunting is an important window into not just the mindset and motivation of trolls, but the history of this kind of aberrant behaviour. Ginger Gorman has gained unprecedented access to trolls, even formed strange and enduring relationships with them, and her comprehensive investigation into what makes them tick has given us a brilliant book that is impossible to put down.
Defensive Security Handbook: Best Practices for Securing Infrastructure
Lee Brotherston - 2017
For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring
Algorithms of Oppression: How Search Engines Reinforce Racism
Safiya Umoja Noble - 2018
But, if you type in "white girls," the results are radically different. The suggested porn sites and un-moderated discussions about "why black women are so sassy" or "why black women are so angry" presents a disturbing portrait of black womanhood in modern society.In Algorithms of Oppression, Safiya Umoja Noble challenges the idea that search engines like Google offer an equal playing field for all forms of ideas, identities, and activities. Data discrimination is a real social problem; Noble argues that the combination of private interests in promoting certain sites, along with the monopoly status of a relatively small number of Internet search engines, leads to a biased set of search algorithms that privilege whiteness and discriminate against people of color, specifically women of color.Through an analysis of textual and media searches as well as extensive research on paid online advertising, Noble exposes a culture of racism and sexism in the way discoverability is created online. As search engines and their related companies grow in importance - operating as a source for email, a major vehicle for primary and secondary school learning, and beyond - understanding and reversing these disquieting trends and discriminatory practices is of utmost importance.An original, surprising and, at times, disturbing account of bias on the internet, Algorithms of Oppression contributes to our understanding of how racism is created, maintained, and disseminated in the 21st century.
Pandora's Lab: Seven Stories of Science Gone Wrong
Paul A. Offit - 2017
These are today's sins of science—as deplorable as mistaken past ideas about advocating racial purity or using lobotomies as a cure for mental illness. These unwitting errors add up to seven lessons both cautionary and profound, narrated by renowned author and speaker Paul A. Offit. Offit uses these lessons to investigate how we can separate good science from bad, using some of today's most controversial creations—e-cigarettes, GMOs, drug treatments for ADHD—as case studies. For every "Aha!" moment that should have been an "Oh no," this book is an engrossing account of how science has been misused disastrously—and how we can learn to use its power for good.
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
T.J. O'Connor - 2012
Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
Peopleware: Productive Projects and Teams
Tom DeMarco - 1987
The answers aren't easy -- just incredibly successful.
