Book picks similar to
Zero Day: The Threat In Cyberspace by Robert O'Harrow Jr.
non-fiction
security
ebook
political-science
The Complete Book of the SR-71 Blackbird
Richard Graham - 2015
The Lockheed SR-71 Blackbird spy plane flew more than three-and-a-half times the speed of sound--so fast that no other aircraft could catch it. Above 80,000 feet, its pilots had to wear full-pressure flight suits similar to what was used aboard the space shuttle.Developed by the renowned Lockheed Skunk Works, the SR-71 was an awesome aircraft in every respect. It was withdrawn from use in 1998, when it was superseded by satellite technology. Twelve of the thirty-two aircraft were destroyed in accidents, but none were ever lost to enemy action.Throughout its thirty-four-year career, the SR-71 was the world's fastest and highest-flying operational manned aircraft. It set world records for altitude and speed: an absolute altitude record of 85,069 feet and an absolute speed record of 2,193.2 miles per hour.The Complete Book of the SR-71 Blackbird covers every aspect of the SR-71's development, manufacture, modification, and active service from the insider's perspective of one of its pilots and is lavishly illustrated with more than 400 photos. Former pilot and author Richard Graham also examines each of the fifty planes that came out the SR-71 program (fifteen A-12s; three YF-12s; and thirty-two SR-71s) and tells each plane's history, its unique specifications, and where each currently resides.
The Art and Science of Java
Eric S. Roberts - 2007
By following the recommendations of the Association of Computing Machinery's Java Task Force, this first edition text adopts a modern objects-first approach that introduces readers to useful hierarchies from the very beginning.KEY TOPICS: Introduction; Programming by Example; Expressions; Statement Forms; Methods; Objects and Classes; Objects and Memory; Strings and Characters; Object-Oriented Graphics; Event-Driven Programs; Arrays and ArrayLists; Searching and Sorting; Collection Classes; Looking Ahead.MARKET: A modern objects-first approach to the Java programming language that introduces readers to useful class hierarchies from the very beginning.
L.A. Secret Police. Inside the LAPD Elite Spy Network
Mike Rothmiller - 1992
Secret Police. Inside the LAPD Elite Spy Network is a New York Times and Los Angeles Times Bestseller. This incredible non-fiction book rips the lid off the LAPD and exposes the reader to its dark underbelly of corruption during the reign of Chief Daryl Gates. L.A. cops ruined lives and reputations, inflicted mindless brutality, committed murder and engaged in massive cover-ups. In Los Angeles, police corruption was much more than unmarked envelopes stuffed with cash. It was a total corruption of power. For decades LAPD engaged in massive illegal spying and lied about it. Its spying targets included politicians, movie stars, professional athletes, news reporters and anyone wielding power or those of interest to Daryl Gates. Incredibly, the spying targets included a Director of the Central Intelligence Agency, a Secretary of Defense, a current Governor and the President of the United States. It all happened in Los Angeles. Detective Rothmiller is the modern-day Frank Serpico; he exposed the tentacles of corruption which reached to the highest levels within the LAPD and Washington D.C. It wasn’t long after that an assassin attempted to take his life. It was apparent to many that powerful forces wanted him silenced. Incredibly, in this book Detective Rothmiller names names! See why this book changed the LAPD and is required reading at many universities. As former Assistant United States Attorney Marvin Rudnick said, “Rothmiller was in a position to know. He did very sensitive work.” Every book has an ending. However, the ending of this book will shock you. Within the new epilogue is a multi-page essay written especially for this updated book by Pulitzer Prize winning journalist David Cay Johnston. In it he describes his personal experience as a target of Daryl Gates illegal intelligence operations while he served as a Los Angeles Times reporter. You’ll also read the challenge posed by detective Rothmiller to the LAPD. A challenge LAPD has refused to answer. Since releasing this updated eBook, Detective Rothmiller has been interviewed dozens of times by the national media regarding current NSA domestic spying and the 2013 murderous rampage of former LAPD cop Christopher Dorner. In late 2013 Detective Rothmiller was interviewed for a major television documentary which will expose corruption and major crimes committed at the highest levels. The documentary is scheduled for release in 2016.
Consent of the Networked: The Worldwide Struggle for Internet Freedom
Rebecca MacKinnon - 2012
For every story about the web’s empowering role in events such as the Arab Spring, there are many more about the quiet corrosion of civil liberties by companies and governments using the same digital technologies we have come to depend upon. Sudden changes in Facebook’s features and privacy settings have exposed identities of protestors to police in Egypt and Iran. Apple removes politically controversial apps at the behest of governments as well as for its own commercial reasons. Dozens of Western companies sell surveillance technology to dictatorships around the world. Google struggles with censorship demands from governments in a range of countries — many of them democracies — as well as mounting public concern over the vast quantities of information it collects about its users.In Consent of the Networked, journalist and Internet policy specialist Rebecca MacKinnon argues that it is time to fight for our rights before they are sold, legislated, programmed, and engineered away. Every day, the corporate sovereigns of cyberspace make decisions that affect our physical freedom — but without our consent. Yet the traditional solution to unaccountable corporate behavior — government regulation — cannot stop the abuse of digital power on its own, and sometimes even contributes to it.A clarion call to action, Consent of the Networked shows that it is time to stop arguing over whether the Internet empowers people, and address the urgent question of how technology should be governed to support the rights and liberties of users around the world.
Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers
John MacCormick - 2012
A simple web search picks out a handful of relevant needles from the world's biggest haystack: the billions of pages on the World Wide Web. Uploading a photo to Facebook transmits millions of pieces of information over numerous error-prone network links, yet somehow a perfect copy of the photo arrives intact. Without even knowing it, we use public-key cryptography to transmit secret information like credit card numbers; and we use digital signatures to verify the identity of the websites we visit. How do our computers perform these tasks with such ease? This is the first book to answer that question in language anyone can understand, revealing the extraordinary ideas that power our PCs, laptops, and smartphones. Using vivid examples, John MacCormick explains the fundamental "tricks" behind nine types of computer algorithms, including artificial intelligence (where we learn about the "nearest neighbor trick" and "twenty questions trick"), Google's famous PageRank algorithm (which uses the "random surfer trick"), data compression, error correction, and much more. These revolutionary algorithms have changed our world: this book unlocks their secrets, and lays bare the incredible ideas that our computers use every day.
Everyone Versus Racism: A Letter to My Children
Patrick Hutchinson - 2020
At the moment, the scales are unfairly balanced and I just want things to be fair for my children, my grandchildren and future generations.’On 13 June 2020, Patrick Hutchinson, a black man, was photographed carrying a white injured man to safety during a confrontation in London between Black Lives Matter demonstrators and counter-protestors. The powerful image was shared and discussed all around the world.Everyone versus Racism is a poignant letter from Patrick to his children and grandchildren. Writing from the heart, he describes the realities of life as a black man today and why we must unite to inspire change for generations to come.
If Then: How the Simulmatics Corporation Invented the Future
Jill Lepore - 2020
Jill Lepore, best-selling author of These Truths, came across the company’s papers in MIT’s archives and set out to tell this forgotten history, the long-lost backstory to the methods, and the arrogance, of Silicon Valley.Founded in 1959 by some of the nation’s leading social scientists—“the best and the brightest, fatally brilliant, Icaruses with wings of feathers and wax, flying to the sun”—Simulmatics proposed to predict and manipulate the future by way of the computer simulation of human behavior. In summers, with their wives and children in tow, the company’s scientists met on the beach in Long Island under a geodesic, honeycombed dome, where they built a “People Machine” that aimed to model everything from buying a dishwasher to counterinsurgency to casting a vote. Deploying their “People Machine” from New York, Washington, Cambridge, and even Saigon, Simulmatics’ clients included the John F. Kennedy presidential campaign, the New York Times, the Department of Defense, and dozens of major manufacturers: Simulmatics had a hand in everything from political races to the Vietnam War to the Johnson administration’s ill-fated attempt to predict race riots. The company’s collapse was almost as rapid as its ascent, a collapse that involved failed marriages, a suspicious death, and bankruptcy. Exposed for false claims, and even accused of war crimes, it closed its doors in 1970 and all but vanished. Until Lepore came across the records of its remains.The scientists of Simulmatics believed they had invented “the A-bomb of the social sciences.” They did not predict that it would take decades to detonate, like a long-buried grenade. But, in the early years of the twenty-first century, that bomb did detonate, creating a world in which corporations collect data and model behavior and target messages about the most ordinary of decisions, leaving people all over the world, long before the global pandemic, crushed by feelings of helplessness. This history has a past; If Then is its cautionary tale.
Unfair: The New Science of Criminal Injustice
Adam Benforado - 2015
The evidence is all around us: Our system of justice is fundamentally broken. But it’s not for the reasons we tend to think, as law professor Adam Benforado argues in this eye-opening, galvanizing book. Even if the system operated exactly as it was designed to, we would still end up with wrongful convictions, trampled rights, and unequal treatment. This is because the roots of injustice lie not inside the dark hearts of racist police officers or dishonest prosecutors, but within the minds of each and every one of us. This is difficult to accept. Our nation is founded on the idea that the law is impartial, that legal cases are won or lost on the basis of evidence, careful reasoning and nuanced argument. But they may, in fact, turn on the camera angle of a defendant’s taped confession, the number of photos in a mug shot book, or a simple word choice during a cross-examination. In Unfair, Benforado shines a light on this troubling new field of research, showing, for example, that people with certain facial features receive longer sentences and that judges are far more likely to grant parole first thing in the morning. Over the last two decades, psychologists and neuroscientists have uncovered many cognitive forces that operate beyond our conscious awareness. Until we address these hidden biases head-on, Benforado argues, the social inequality we see now will only widen, as powerful players and institutions find ways to exploit the weaknesses of our legal system. Weaving together historical examples, scientific studies, and compelling court cases—from the border collie put on trial in Kentucky to the five teenagers who falsely confessed in the Central Park Jogger case—Benforado shows how our judicial processes fail to uphold our values and protect society’s weakest members. With clarity and passion, he lays out the scope of the legal system’s dysfunction and proposes a wealth of practical reforms that could prevent injustice and help us achieve true fairness and equality before the law.
Life After Google: The Fall of Big Data and the Rise of the Blockchain Economy
George Gilder - 2018
Gilder says or writes is ever delivered at anything less than the fullest philosophical decibel... Mr. Gilder sounds less like a tech guru than a poet, and his words tumble out in a romantic cascade." “Google’s algorithms assume the world’s future is nothing more than the next moment in a random process. George Gilder shows how deep this assumption goes, what motivates people to make it, and why it’s wrong: the future depends on human action.” — Peter Thiel, founder of PayPal and Palantir Technologies and author of Zero to One: Notes on Startups, or How to Build the Future The Age of Google, built on big data and machine intelligence, has been an awesome era. But it’s coming to an end. In Life after Google, George Gilder—the peerless visionary of technology and culture—explains why Silicon Valley is suffering a nervous breakdown and what to expect as the post-Google age dawns. Google’s astonishing ability to “search and sort” attracts the entire world to its search engine and countless other goodies—videos, maps, email, calendars….And everything it offers is free, or so it seems. Instead of paying directly, users submit to advertising. The system of “aggregate and advertise” works—for a while—if you control an empire of data centers, but a market without prices strangles entrepreneurship and turns the Internet into a wasteland of ads. The crisis is not just economic. Even as advances in artificial intelligence induce delusions of omnipotence and transcendence, Silicon Valley has pretty much given up on security. The Internet firewalls supposedly protecting all those passwords and personal information have proved hopelessly permeable. The crisis cannot be solved within the current computer and network architecture. The future lies with the “cryptocosm”—the new architecture of the blockchain and its derivatives. Enabling cryptocurrencies such as bitcoin and ether, NEO and Hashgraph, it will provide the Internet a secure global payments system, ending the aggregate-and-advertise Age of Google. Silicon Valley, long dominated by a few giants, faces a “great unbundling,” which will disperse computer power and commerce and transform the economy and the Internet. Life after Google is almost here. For fans of "Wealth and Poverty," "Knowledge and Power," and "The Scandal of Money."
The Road Ahead
Bill Gates - 1995
Includes a compact disc which is playable on CD-ROM and audio CD players.
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Clint Watts - 2018
In Messing with the Enemy, the cyber and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind. Watts reveals how these malefactors use your information and that of your friends and family to work for them through social media, which they use to map your social networks, scour your world affiliations, and master your fears and preferences.Thanks to the schemes engineered by social media manipulators using you and your information, business executives have coughed up millions in fraudulent wire transfers, seemingly good kids have joined the Islamic State, and staunch anti-communist Reagan Republicans have cheered the Russian government’s hacking of a Democratic presidential candidate’s e-mails. Watts knows how they do it because he’s mirrored their methods to understand their intentions, combat their actions, and coopt their efforts.Watts examines a particular social media platform—from Twitter to internet Forums to Facebook to LinkedIn—and a specific bad actor—from al Qaeda to the Islamic State to the Russian and Syrian governments—to illuminate exactly how social media tracking is used for nefarious purposes. He explains how he’s learned, through his successes and his failures, to engage with hackers, terrorists, and even the Russians—and how these interactions have generated methods of fighting back. Shocking, funny, and eye-opening, Messing with the Enemy is a deeply urgent guide for living safe and smart in a super-connected world.
Configuring Windows 7: Self-Paced Training Kit (MCTS Exam 70-680)
Ian L. McLean - 2009
This Self-Paced Training Kit is designed to help maximize your performance on 70-680, the required exam for the Microsoft Certified Technology Specialist (MCTS): Windows 7, Configuration certification.This 2-in-1 kit includes the official Microsoft study guide, plus practice tests on CD to help you assess your skills. It comes packed with the tools and features exam candidates want most—including in-depth, self-paced training based on final exam content; rigorous, objective-by-objective review; exam tips from expert, exam-certified authors; and customizable testing options. It also provides real-world scenarios, case study examples, and troubleshooting labs to give you the skills and expertise you can use on the job.Work at your own pace through the lessons and lab exercises. This official study guide covers installing, upgrading, and migrating to Windows 7; configuring network connectivity, applications, and devices; implementing backup and recovery; configuring User Account Control (UAC), mobility options, and new features such as DirectAccess and BranchCache; and managing system updates.Then assess yourself using the 200 practice questions on CD, featuring multiple customizable testing options to meet your specific needs. Choose timed or untimed testing mode, generate random tests, or focus on discrete objectives. You get detailed explanations for right and wrong answers—including pointers back to the book for further study. You also get an exam discount voucher—making this kit an exceptional value and a great career investment.
The Smart Words and Wicked Wit of Winston Churchill
Max Morris - 2017
“It does not seem to be much use being anything else.”Have you ever wanted to deliver the ultimate Churchillian wisecrack? Give sound advice to a peer on how to deal with life’s problems? Or contribute to a heated discussion on international politics? The Smart Words and Wicked Wit of Winston Churchill is the perfect pocket book to carry around in your arsenal as you laugh at Churchill’s devious brand of smarts and learn from his political and humanist outlook on life during the turmoil of the Second World War. Discover what he had to say about domestic politics, war and peace, power, struggles and strife, education, philosophy, and some of the biggest names of his time, including himself.Beautifully designed and curated, this entertaining collection compiles the wisest and wittiest Churchill quotations that speak of the politician’s enduring legacy in contemporary pop culture. Full of savvy and wisdoms, The Smart Words and Wicked Wit of Winston Churchill is sure to delight devoted fans of history and casual readers alike.
Practical Lock Picking: A Physical Penetration Tester's Training Guide
Deviant Ollam - 2010
Unlike other texts on the subject (which tend to be either massive volumes detailing every conceivable style of lock or brief "spy manuals" that only skim the surface) this book is for INFOSEC professionals that need essential, core knowledge of lockpicking and seek the ability to open most locks with relative ease. Deviant's material is presented with rich, detailed diagrams and is offered in easy-to-follow lessons which allow even beginners to acquire the knowledge very quickly. Everything from straightforward lockpicking to quick-entry techniques like shimming, bumping, and bypassing is explained and shown.Whether you're being hired to penetrate security or simply trying to harden your own defenses, this book is essential.
Detailed photos make learning as easy as picking a lock
DVD is filled with indispensible lock picking videos and color photos
Extensive appendix details tools and toolkits currently available for all your lock picking needs
The Tcp/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
Charles Kozierok - 2005
It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone understand the dozens of protocols and technologies that run the Internet, with full coverage of PPP, ARP, IP, IPv6, IP NAT, IPSec, Mobile IP, ICMP, RIP, BGP, TCP, UDP, DNS, DHCP, SNMP, FTP, SMTP, NNTP, HTTP, Telnet and much more. The author offers not only a detailed view of the TCP/IP protocol suite, but also describes networking fundamentals and the important OSI Reference Model.