Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien"


Jeremy N. Smith - 2019
    When she arrived at MIT in the 1990s, Alien was quickly drawn to the school’s tradition of high‑risk physical trespassing: the original “hacking.” Within a year, one of her hallmates was dead and two others were arraigned. Alien’s adventures were only just beginning. After a stint at the storied, secretive Los Alamos National Laboratory, Alien was recruited by a top cybersecurity firm where she deployed her cache of virtual weapons—and the trespassing and social engineering talents she had developed while “hacking” at MIT. The company tested its clients’ security by every means possible—not just coding, but donning disguises and sneaking past guards and secretaries into the C‑suite. Alien now runs a boutique hacking outfit that caters to some of the world’s biggest and most vulnerable institutions—banks, retailers, government agencies. Her work combines devilish charm, old‑school deception, and next generation spycraft. In Breaking and Entering, cybersecurity finally gets the rich, character‑driven, fast-paced treatment it deserves.

"When the Sirens Were Silent" How the Warning System Failed a Community


Mike Smith - 2012
    That acclaimed book, as one reviewer put it, "made meteorologists the most unlikely heroes of recent literature." But, what if the warning system failed to provide a clear, timely notice of a major storm? Tragically, that scenario played out in Joplin, Missouri, on May 22, 2011. As a wedding, a high school graduation, and shopping trips were in progress, an invisible monster storm was developing west of the city. When it arrived, many were caught unaware. One hundred sixty-one perished and one thousand were injured. "When the Sirens Were Silent" is the gripping story of the Joplin tornado. It recounts that horrible day with a goal of insuring this does not happen again. The book gives you the tools you need to keep yourself and your family safe. Included are clever lift-out copies of the latest tornado safety rules for homes, schools, and offices.

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography


Simon Singh - 1999
    From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous


Gabriella Coleman - 2014
    She ended up becoming so closely connected to Anonymous that the tricky story of her inside–outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.The narrative brims with details unearthed from within a notoriously mysterious subculture, whose semi-legendary tricksters—such as Topiary, tflow, Anachaos, and Sabu—emerge as complex, diverse, politically and culturally sophisticated people. Propelled by years of chats and encounters with a multitude of hackers, including imprisoned activist Jeremy Hammond and the double agent who helped put him away, Hector Monsegur, Hacker, Hoaxer, Whistleblower, Spy is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age, including the history of “trolling,” the ethics and metaphysics of hacking, and the origins and manifold meanings of “the lulz.”

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon


Kim Zetter - 2014
    The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.

Re:cyclists: 200 Years on Two Wheels


Michael Hutchinson - 2017
    The calls to ban it were more or less instant.Re:cyclists is the tale of what happened next, of how we have spent two centuries wheeling our way about town and country on bikes--or on two-wheeled things that vaguely resembled what we now call bikes. Michael Hutchinson picks his way through those 200 years, discovering how cycling became a kinky vaudeville act for Parisians, how it became an American business empire, and how it went on to find a unique home in the British Isles. He considers the penny-farthing riders exploring the abandoned and lonely coaching roads during the railway era, and the Victorian high-society cyclists of the 1890s bicycle craze--a time when no aristocratic house party was without bicycles and when the Prince of Wales used to give himself an illicit thrill on a weekday afternoon by watching the women's riding-school in the Royal Albert Hall.Re:cyclists looks at how cycling became the sport, the pastime and the social life of millions of ordinary people, how it grew and how it suffered through the 1960s and '70s, and how at the dawn of the twenty-first century it rose again, much changed but still ultimately just someone careering along on two wheels.

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide


James Michael Stewart - 2015
    This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Four unique 250 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security

My Patients and Me: Fifty Years of General Practice


Jane Little - 2017
    She knew instantly that her decision to work in general practice was the ‘biggest and worst mistake of her life’. Fortunately, however, this did not deter her from continuing in general practice, and this fascinating memoir (spanning half a century) is testament to her resilience and professionalism, as well as her pragmatic and charismatic personality. She shares real stories about real people in this intriguing book. Some stories are truly heart-breaking and will have you reaching for the tissues (such as the times when she has lost patients, and encountered and supported abused children and rape victims). But it isn’t all serious. There are lots of light-hearted and heart-warming moments too, such as the stories about Jessie-dog – her bodyguard when she made home visits, and the time when she helped a large (and desperately in need) family to get rehoused, and her time as a country GP. She also recalls with honesty and candidness, the prejudice and unimaginable pressure she had to contend with, as a young female GP in the 1960s. As well as a plethora of fascinating stories, experiences and case studies, this book also gives us, as 21st Century readers, a glimpse into the rapid changes in general practice and the NHS in general. Whether you’re in general practice, or you’re a medical professional, or you have a penchant for all kinds of autobiographies/memoirs, you will find this a thought-provoking and captivating book that’s impossible to put down. Take a peek at the ‘Look Inside’ feature now and be prepared to be instantly intrigued.

Worm: The First Digital World War


Mark Bowden - 2011
    Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm: the story of the first digital world war.

Night Shift: Short Stories from the Life of an ER Doc


Mark Plaster - 2014
    Mark Plaster takes readers beyond the ambulance bay doors into the stranger-than-fiction world of the Emergency Department. By turns heart-warming and gut-wrenching, "Night Shift" chronicles the ebb and flow of human life, in all of its unvarnished glory, as it passes through the doors of the ED.

It Will All Make Sense When You're Dead: Messages From Our Loved Ones in the Spirit World


Priscilla A. Keresey - 2011
    After a brief tale of her own introduction to the paranormal, the author shares funny, poignant, and insightful words straight from the spirit people themselves. Together, the living and the dead seek forgiveness, solve family mysteries, find closure, settle scores, and come together for birthdays, anniversaries, and graduations. Quoting directly from her readings and séances, Priscilla reports the spirit perspective on mental illness, suicide, religion, and even the afterlife itself. For those readers interested in developing their own spirit communication skills, the last section of the book offers meditations and exercises used by the author herself, both personally and with her students. "It Will All Make Sense When You’re Dead" is chock-full of simple and entertaining wisdom, showing us how to live for today, with light hearts and kindness.

How You Play the Game: A Philosopher Plays Minecraft (Kindle Single)


Charlie Huenemann - 2015
    At a glance, it bears few similarities to any place we know and inhabit. But upon closer examination, the differences between this complex virtual reality and our own might not be as vast as we think. In “How You Play the Game,” author and philosopher Charlie Huenemann looks philosophically at the game of Minecraft (“What is the point of this game? How does one win? Well, this depends on what you want to do”) and grapples with the ethical conundrums, existential crises and moral responsibilities of the virtual realm. From the Overworld to the Ender Dragon, Huenemann offers an entertaining, insightful and often hilarious examination of Minecraft and the strange worlds—both virtual and not—surrounding it.Charlie Huenemann is a Professor of Philosophy at Utah State University. He writes for 3quarksdaily, and has published several books on the history of philosophy.Cover design by Adil Dara.

Mastering VMware vSphere 4


Scott Lowe - 2009
    Coverage Includes: Shows administrators how to use VMware to realize significant savings in hardware costs while still providing adequate "servers" for their users Demonstrates how to partition a physical server into several virtual machines, reducing the overall server footprint within the operations center Explains how VMware subsumes a network to centralize and simplify its management, thus alleviating the effects of "virtual server sprawl" Now that virtualization is a key cost-saving strategy, Mastering VMware vSphere 4 is the strategic guide you need to maximize the opportunities.

Hidden In Plain Sight 10: How To Program A Quantum Computer


Andrew H. Thomas - 2018
     This book contains an introduction to quantum mechanics, with complete instructions and videos showing you how to program a real quantum computer, provided by IBM.

Android Hacker's Handbook


Joshua J. Drake - 2013
    Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.