Code Warriors: NSA's Code Breakers and the Secret Intelligence War Against the Soviet Union


Stephen Budiansky - 2016
    The National Security Agency grew out of the legendary codebreaking programs of World War II that turned the tide of Allied victory by cracking the famed Enigma machine and other seemingly impenetrable German and Japanese codes. But things became murky in the postwar years, when our intelligence community found itself targeting not battlefield enemies, but suspected spies, foreign leaders, and even American citizens. Now Stephen Budiansky--a longtime expert in cryptology--tells the fascinating story of how the NSA came to be, and of its central, often fraught and controversial role in the major events of the Cold War, from the Korean War to the Cuban Missile Crisis to Vietnam and beyond. He also guides us through the fascinating challenges faced by cryptanalysts, and how they broke some of the most complicated codes of the twentieth century. A riveting, essential history of the underbelly of the Cold War.

Police, Lies and Alibis: The True Story of a Front Line Officer


John Donoghue - 2013
    It is the follow-up book to Police, Crime & 999, a book which still remains hugely popular today, with over 250 5-star Amazon reviews, and which garnered positive feedback from a number of national publications:‘Everything is included in this warts-and-all account. Very funny’ The Sun‘A treasure trove of a book – a wonderfully informative and addictive read, full of belly laughs’ The Non-Fiction Book ClubWARNING: Contains Humour & Traces of Nuts

Invisible Women: Data Bias in a World Designed for Men


Caroline Criado Pérez - 2019
    From economic development, to healthcare, to education and public policy, we rely on numbers to allocate resources and make crucial decisions. But because so much data fails to take into account gender, because it treats men as the default and women as atypical, bias and discrimination are baked into our systems. And women pay tremendous costs for this bias, in time, money, and often with their lives.Celebrated feminist advocate Caroline Criado Perez investigates the shocking root cause of gender inequality and research in Invisible Women​, diving into women’s lives at home, the workplace, the public square, the doctor’s office, and more. Built on hundreds of studies in the US, the UK, and around the world, and written with energy, wit, and sparkling intelligence, this is a groundbreaking, unforgettable exposé that will change the way you look at the world.

Mobsters, Gangs, Crooks and Other Creeps:Volume 1 - New York City


Joe Bruno - 2011
    Although Italian-American criminals are covered, this is not just another Italian mafia book. The book covers the Jewish gangsters as well (who truly were the pioneers of organized crime) and the Irish gangs, who were one of the first ethnic groups to run the New York City rackets. Joe even presents a few "lady gangsters" too.Most of all, “ Mobsters, Gangs, Crooks and Other Creeps-Volume 1- New York City" is easy to read. The short-chapter format is a stroke of genius. It is interesting, informative, entertaining, and to the point. You won't be bored reading it. Joe Bruno has hit the mark in presenting Old New York the way it really was. Rough and bloody! Mathew J. Mari - Criminal Attorney

Deep Fakes and the Infocalypse: What You Urgently Need To Know


Nina Schick - 2020
    When combined with powerful voice AI, the results are utterly convincing.So-called 'Deep Fakes' are not only a real threat for democracy but they take the manipulation of voters to new levels. They will also affect ordinary people. This crisis of misinformation we are facing has been dubbed the 'Infocalypse'.Using her expertise from working in the field, Nina Schick reveals shocking examples of Deep Fakery and explains the dangerous political consequences of the Infocalypse, both in terms of national security and what it means for public trust in politics. She also unveils what it means for us as individuals, how Deep Fakes will be used to intimidate and to silence, for revenge and fraud, and how unprepared governments and tech companies are.As a political advisor to select technology firms, Schick tells us what we need to do to prepare and protect ourselves. Too often we build the cool technology and ignore what bad guys can do with it before we start playing catch-up. But when it comes to Deep Fakes, we urgently need to be on the front foot.

Humble Pi: A Comedy of Maths Errors


Matt Parker - 2019
    Most of the time this math works quietly behind the scenes . . . until it doesn't. All sorts of seemingly innocuous mathematical mistakes can have significant consequences.Math is easy to ignore until a misplaced decimal point upends the stock market, a unit conversion error causes a plane to crash, or someone divides by zero and stalls a battleship in the middle of the ocean.Exploring and explaining a litany of glitches, near misses, and mathematical mishaps involving the internet, big data, elections, street signs, lotteries, the Roman Empire, and an Olympic team, Matt Parker uncovers the bizarre ways math trips us up, and what this reveals about its essential place in our world. Getting it wrong has never been more fun.

Darknet: A Beginner's Guide to Staying Anonymous


Lance Henderson - 2012
    This book covers it all! Encrypting your private files, securing your PC, masking your online footsteps, and all while giving you peace of mind with TOTAL 100% ANONYMITY. Don't waste months scouring the internet for info. Just read this! You'll be hooked in five minutes. It's all here: CIA techniques, how the NSA catches Tor users, Truecrypt and the FBI, nuking tracking cookies, private browsing, preventing identity theft. I will show you: -How to Be Anonymous Online -Step by Step Guides for Tor, Freenet, I2P, VPNs, Usenet and more -Browser Fingerprinting -Anti-Hacking and Counter-Forensic Techniques -Photo & Video Metadata -How to Encrypt Files (I make this super simple) -How to Defeat NSA Spying -How to Browse the Deep Web -How to Protect Your Identity -How to Hide Anything! You've probably read How to Be Invisible by J. J. Luna and Incognito Toolkit by Rob Robideau, and while they are fine books, you need this companion piece to take it to the next level!

Gangland Britain


Tony Thompson - 1995
    It is an insight into their initiation ceremonies, their methods, their money-raising tactics; a timely portrayal of Britain's worst criminal problem.

Transcending Depression: Quest Without a Compass


Larry Godwin - 2020
    I've been there and have struggled with suicidal thoughts and plans. I can share with you what I did to not only survive, but to tolerate depression, live with it, and function acceptably most of the time, interspersed with periods of contentment, happiness, and joy. My strategies may well work for you. My goal is to save lives. The primary motivation for presenting my history is to encourage others who grapple with either chronic depression or occasional bouts. I hope my journey resonates with some, validates feelings, and sparks the thoughts "I'm not alone" and "I will feel better." This book can also help family members and friends of the mentally ill, and their caregivers, find compassion and enable them to understand the struggle. Transcending Depression differs from many other books on the topic in that it is not grounded in clinical experience, scientific research, or empirical evidence, which may make it more approachable than some. It's not a how-to book, not a model for depressed people to follow, not a toolbox. On the contrary, it shows rather than tells the reader what he or she might do to feel better. Appendices include my Depression Survival Guide, which offers 36 suggestions to bring relief, and Chess in the Labyrinth, a metaphor that compares defeating depression to winning a chess game.

The UNIX-Haters Handbook


Simson Garfinkel - 1994
    It is a humorous book--pure entertainment--that maintains that UNIX is a computer virus with a user interface. It features letters from the thousands posted on the Internet's "UNIX-Haters" mailing list. It is not a computer handbook, tutorial, or reference. It is a self-help book that will let readers know they are not alone.

A State of Emergency


Richard Chambers - 2021
    The electrifying behind-the-scenes account of a year that brought Ireland to the brink and back - the inside story of Ireland’s struggle to contain Covid-19.Based on a wealth of original research and over a hundred interviews with cabinet members, public health officials, frontline workers, and ordinary people on whom the crisis exacted a personal toll, A State of Emergency is the incendiary untold story of Ireland’s response to the biggest public health emergency of the past century.Ranging from the halls of Government Buildings, where conflict between the new Cabinet and its public health advisors threatened to derail the official response, to the frontlines of the containment effort itself, where doctors, nurses, and the communities they served found themselves pushed to breaking point, A State of Emergency is a landmark work of journalism and a riveting insider account of the struggle to bring Ireland back from the brink.

File System Forensic Analysis


Brian Carrier - 2005
    Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.

OS X 10.10 Yosemite: The Ars Technica Review


John Siracusa - 2014
    Siracusa's overview, wrap-up, and critique of everything new in OS X 10.10 Yosemite.

Homo Deus: A History of Tomorrow


Yuval Noah Harari - 2015
    This may seem hard to accept, but, as Harari explains in his trademark style—thorough, yet riveting—famine, plague and war have been transformed from incomprehensible and uncontrollable forces of nature into manageable challenges. For the first time ever, more people die from eating too much than from eating too little; more people die from old age than from infectious diseases; and more people commit suicide than are killed by soldiers, terrorists and criminals put together. The average American is a thousand times more likely to die from binging at McDonalds than from being blown up by Al Qaeda.What then will replace famine, plague, and war at the top of the human agenda? As the self-made gods of planet earth, what destinies will we set ourselves, and which quests will we undertake? Homo Deus explores the projects, dreams and nightmares that will shape the twenty-first century—from overcoming death to creating artificial life. It asks the fundamental questions: Where do we go from here? And how will we protect this fragile world from our own destructive powers? This is the next stage of evolution. This is Homo Deus.With the same insight and clarity that made Sapiens an international hit and a New York Times bestseller, Harari maps out our future.

The Four: The Hidden DNA of Amazon, Apple, Facebook, and Google


Scott Galloway - 2017
    Just about everyone thinks they know how they got there. Just about everyone is wrong. For all that's been written about the Four over the last two decades, no one has captured their power and staggering success as insightfully as Scott Galloway.Instead of buying the myths these compa-nies broadcast, Galloway asks fundamental questions. How did the Four infiltrate our lives so completely that they're almost impossible to avoid (or boycott)? Why does the stock market forgive them for sins that would destroy other firms? And as they race to become the world's first trillion-dollar company, can anyone chal-lenge them?In the same irreverent style that has made him one of the world's most celebrated business professors, Galloway deconstructs the strategies of the Four that lurk beneath their shiny veneers. He shows how they manipulate the fundamental emotional needs that have driven us since our ancestors lived in caves, at a speed and scope others can't match. And he reveals how you can apply the lessons of their ascent to your own business or career.Whether you want to compete with them, do business with them, or simply live in the world they dominate, you need to understand the Four.