Book picks similar to
Zero Day: The Threat In Cyberspace by Robert O'Harrow Jr.
non-fiction
ebook
security
cyberwar
Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace
Ejovi Nuwere - 2002
Raised by his grandmother, his extended family included two uncles who served as role models: one a career criminal, the other a college student with a PC he loaned to his nephew. By the time he was 13, Ejovi had become a computer expert -- a gifted hacker with a talent that propelled him to the top of a dangerous underground world in which he ranked as one of its most elite practitioners. And at 21, he has become a top security specialist for one of the world's largest financial firms.Interweaving details of his life growing up on the bullet-ridden streets of Bed-Sty with fascinating hacker lore and a glimpse of the inner workings of sensitive corporate computer systems, Hacker Cracker is a Horatio Alger tale for our times: a thrilling, frightening, and ultimately uplifting story of survival and success.
All-New Fire 7 User Guide: Newbie to Expert in 2 Hours: The Essential Guide to Amazon's Incredible $49.99 Tablet
Tom Edwards - 2015
From the Number 1 Best Selling authors in Computers and Technology, this clear and concise guide will show you how to get the very best from the incredible new $49.99 Amazon Fire 7 Inch Tablet. Step by step instructions will take you from newbie to expert in just two hours! About the Authors: Tom and Jenna Edwards are the Amazon Tech authors behind the Number 1 Best-selling e-books 250+ Best Kindle Fire HD Apps for the New Kindle Fire Owner and Kindle Fire TV User Guide: Newbie to Expert in 1 Hour!
CISSP All-in-One Exam Guide
Shon Harris - 2001
Revised and updated using feedback from Instructors and students, learn security operations in the areas of telecommunications, cryptography, management practices, and more. Plan for continuity and disaster recovery. Update your knowledge of laws, investigations, and ethics. Plus, run the CD-ROM and practice with more than 500 all new simulated exam questions. Browse the all new electronic book for studying on the go. Let security consultant and author Shon Harris lead you to successful completion of the CISSP.
McSweeney's #54: The End of Trust
Dave Eggers - 2018
Meanwhile, we wade through an unprecedented amount of disinformation and deception. Fake news and Russian-purchased propaganda are woven into our media diets, and anonymity on the internet leaves us ever suspicious.In the face of this, rather than seek privacy where we can, we eagerly offer up our remaining details to social media, craving the surveillance and scrutiny of our peers. We're unsure of how all of this is affecting the moral development of a generation coming of age in this new culture of surveillance, but we continue on. It leads us to wonder if we've reached the end of trust, and if we even care.
The Secret Sentry: The Untold History of the National Security Agency
Matthew M. Aid - 2009
In February 2006, while researching this book, Matthew Aid uncovered a massive and secret document reclassification program—a revelation that made the front page of the New York Times. This was only one of the discoveries Aid has made during two decades of research in formerly top-secret documents. In The Secret Sentry, Aid provides the first-ever full history of America's largest security apparatus, the National Security Agency. This comprehensive account traces the growth of the agency from 1945 to the present through critical moments in its history, from the cold war up to its ongoing involvement in Afghanistan and Iraq. Aid explores the agency's involvement in the Iraqi weapons intelligence disaster, where evidence that NSA officials called "ambiguous" was used as proof of Iraqi WMD capacity, and details the intense debate within the NSA over its unprecedented role, pressed by the Bush-Cheney administration, in spying on U.S. citizens. Today, the NSA has become the most important source of intelligence for the U.S. government, providing 60 percent of the president's daily intelligence briefing. While James Bamford's New York Times bestseller The Shadow Factory covered the NSA since 9/11, The Secret Sentry contains new information about every period since World War II . It provides a shadow history of global affairs, from the creation of I srael to the War on Terror.
The Suicide Battalion
James L. McWilliams - 1978
An essential book for readers of Peter Hart, Tim Cook and Nick Lloyd.The men of the 46th Canadian Infantry Battalion were some of the most effective shock troops of the Allied forces in the Great War. They drove back German forces wherever they met and refused ever to surrender. Such tactics struck fear in their enemies, yet, it came at a tremendous cost. Of the 5374 officers and men who passed through the unit, a total of 4917, or 91 per cent, were either killed or wounded.J.L. McWilliams and R. James Steel chart the history of this battalion from when it was formed on 7th November 1914 through all of its major battles, including the Somme, Vimy Ridge, Hill 70, Passchendaele, Amiens, the Hundred Days Offensive and breaking through the Hindenburg Line, to when it was finally disbanded at the end of the war. Rather than focus simply on the grand strategies of generals, McWilliams and Steel use numerous personal accounts, both written at the time and afterwards, to depict what life was like for the regular soldier of the 46th Battalion during these treacherous years spent in muddy trenches in France and Belgium.
The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen
Jonathan Littman - 1997
Busted as a teenager for hacking into Pac Bell phone networks, Kevin Poulsen would find his punishment was a job with a Silicon Valley defense contractor. By day he seemed to have gone straight, toiling on systems for computer-aided war. But by night he burglarized telephone switching offices, adopting the personae and aliases of his favorite comic-book anti heroes - the Watchmen. When authorities found a locker crammed with swiped telecommunications equipment, Poulsen became a fugitive from the FBI, living the life of a cyberpunk in a neon Hollywood underground. Soon he made the front pages of the New York Times and became the first hacker charged with espionage. Littman takes us behind the headlines and into the world of Poulsen and his rogues' gallery of cyberthieves. Drawing on hundreds of hours of interviews with Poulsen, his confederates, and the authorities, he spins a thrilling chase story on the electronic frontier. The nation's phone network was Poulsen's playground. On Los Angeles's lucrative radio giveaways, Poulsen worked his magic, winning Porsches and tens of thousands of dollars. He secretly switched on the numbers of defunct Yellow Pages escort ads and took his cut of the profits. And he could wiretap or electronically stalk whomever he pleased, his childhood love or movie stars. The FBI seemed no match for Poulsen. But as Unsolved Mysteries prepared a broadcast on the hacker's crimes, LAPD vice stumbled onto his trail, and an undercover operation began on Sunset Strip.
NOT A BOOK: What the (Bleep) Just Happened?: The Happy Warrior's Guide to the Great American Comeback
NOT A BOOK - 2012
In this funny, fast-paced, razor-sharp, well-reasoned, and supremely savvy critique of the state of our union under the disastrous reign of Barack Obama, bestselling author, Fox News contributor, syndicated columnist, and popular radio host Monica Crowley asks (and answers) the pressing question: What the @$%& has happened to America? “The Happy Warrior’s Guide to the Great American Comeback,” What the (Bleep) Just Happened? doesn’t simply bemoan the trashing of the American economy and the intentional firebombing of America’s international prestige, it offers inspiration and a positive message to conservatives and concerned Americans everywhere that the way to fight back and win is with principle, conviction…and a wicked sense of humor.
Writing A Novel with Ulysses III
David Hewson - 2014
Best-selling novelist David Hewson, author of the ever-popular Writing A Novel with Scrivener, offers a professional insight into how to use this unique app for writing fiction. This ebook covers all the aspects of Ulysses a writer needs to master in order to produce a finished book, from initial planning through to completed ebook, Word file or PDFs for publication, reading and revision. You will learn how to use Ulysses to structure a book into parts and scenes, ways to manage research and ideas and how to develop a novel from a bare outline through to first draft and revisions. Hewson also describes how Ulysses stores work uniquely in its own library, enabling you to work on the same draft manuscript across different machines while on the move. For budding screenwriters there is a section on how to use Ulysses to produce scripts to professional formats that can be edited later in movie apps such as Final Draft. And this release will also include a free upgrade to an updated edition covering the next release of Ulysses and the forthcoming iPad app. David Hewson (www.davidhewson.com) is the author of more than 25 novels published around the world. He adapted the award-winning TV series The Killing into acclaimed novel and recently launched a new crime series set in Amsterdam with The House of Dolls which has been optioned for Dutch TV.
NR Narayana Murthy: A Biography
Ritu Singh - 2013
He is the founder of Infosys, a global software consulting company which he started with six other professionals and a seed capital of Rs. 10,000 in 1981. Not only did NRNM lead it to become a top ranking Information Technology company in the world, he also showed that it is possible to do business ethically and achieve success without bending any laws or making compromises.This book takes you through the fascinating journey of a seventeen year old who had to sacrifice his entry into the prestigious Indian Institute of Technology because his father did not have money to pay his fees, and who ultimately came up in life to head a global Information Technology company. NRN Murthy had no money, no family backing, but just a quiet gritty determination, and faith in what he believed was the future of business. The one constant factor throughout his life journey has been the adherence to the values he imbibed from his family, which he has personally and professionally lived by-hard work, fairness, decency, honesty, transparency, striving for excellence and belief in meritocracy. It is on the bedrock of these values that Infosys continues to stand firm and prosper despite the fact that NRN stepped down as CEO in 2002.Iconic leader, living legend, one of the greatest entrepreneurs of all time-NRN is all this and more. A man who set new standards of business growth and corporate governance. Written by Ritu Singh, the author of President Pratibha Patil, this book will surely inspire all the readers.
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Patrick Engebretson - 2011
No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate.Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phasesWritten by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State UniversityUtilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test
The LogStash Book
James Turnbull - 2013
We're going to do that by introducing you to Example.com, where you're going to start a new job as one of its SysAdmins. The first project you'll be in charge of is developing its new log management solution. We'll teach you how to:* Install and deploy LogStash.* Ship events from a LogStash Shipper to a central LogStash server.* Filter incoming events using a variety of techniques.* Output those events to a selection of useful destinations.* Use LogStash's Web interface and alternative interfaces like Kibana.* Scale out your LogStash implementation as your environment grows.* Quickly and easily extend LogStash to deliver additional functionality you might need.By the end of the book you should have a functional and effective log management solution that you can deploy into your own environment.
Hacking Exposed: Network Security Secrets & Solutions
Joel Scambray - 2003
Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc."For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." Patrick Heim, CISO, Kaiser Permanente"The definitive resource to understanding the hacking mindset and the defenses against it." Vince Rossi, CEO & President, St. Bernard Software"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." Bill Loesch, CTO, Guard ID Systems"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." Kip Boyle, CISO, PEMCO Mutual Insurance Company"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," Jeff Moss, Founder of the popular Black Hat Security ConferenceMeet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.New and updated material:
New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking
Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits
The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits
New wireless and RFID security tools, including multilayered encryption and gateways
All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices
Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage
VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking
Fully updated chapters on hacking the Internet user, web hacking, and securing code
Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family
Theresa M. Payton - 2014
The devices we use to get just-in-time coupons, directions when we're lost, and maintain connections with loved ones no matter how far away they are, also invade our privacy in ways we might not even be aware of. Our devices send and collect data about us whenever we use them, but that data is not safeguarded the way we assume it would be. Privacy is complex and personal. Many of us do not know the full extent to which data is collected, stored, aggregated, and used. As recent revelations indicate, we are subject to a level of data collection and surveillance never before imaginable. While some of these methods may, in fact, protect us and provide us with information and services we deem to be helpful and desired, others can turn out to be insidious and over-arching. Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware. Payton and Claypoole skillfully introduce readers to the many ways we are 'watched, ' and how to adjust our behaviors and activities to recapture our privacy. The authors suggest the tools, behavior changes, and political actions we can take to regain data and identity security. Anyone who uses digital devices will want to read this book for its clear and no-nonsense approach to the world of big data and what it means for all of us.
Steve Jobs
Walter Isaacson - 2011
Based on more than forty interviews with Steve Jobs conducted over two years--as well as interviews with more than 100 family members, friends, adversaries, competitors, and colleagues--Walter Isaacson has written a riveting story of the roller-coaster life and searingly intense personality of a creative entrepreneur whose passion for perfection and ferocious drive revolutionized six industries: personal computers, animated movies, music, phones, tablet computing, and digital publishing. Isaacson's portrait touched millions of readers. At a time when America is seeking ways to sustain its innovative edge, Jobs stands as the ultimate icon of inventiveness and applied imagination. He knew that the best way to create value in the twenty-first century was to connect creativity with technology. He built a company where leaps of the imagination were combined with remarkable feats of engineering. Although Jobs cooperated with the author, he asked for no control over what was written. He put nothing off-limits. He encouraged the people he knew to speak honestly. He himself spoke candidly about the people he worked with and competed against. His friends, foes, and colleagues offer an unvarnished view of the passions, perfectionism, obsessions, artistry, devilry, and compulsion for control that shaped his approach to business and the innovative products that resulted. His tale is instructive and cautionary, filled with lessons about innovation, character, leadership, and values. Steve Jobs is the inspiration for the movie of the same name starring Michael Fassbender, Kate Winslet, Seth Rogen, and Jeff Daniels, directed by Danny Boyle with a screenplay by Aaron Sorkin.