Book picks similar to
The Art of Attack: Attacker Mindset for Security Professionals by Maxie Reynolds
cyber-security
general
computers
tech-skills
No Exit: Struggling to Survive a Modern Gold Rush
Gideon Lewis-Kraus - 2014
They're burning through cash, sales have stalled, and investors are nowhere to be found. Welcome to the reality of the new tech boom. Sure, it has produced its glittering share of billion-dollar "exits." But for the vast majority of startups life is nasty, brutish, and short on glamour. NO EXIT explores the feverish world of company founders who are desperately trying to keep their dream afloat. It’s a harrowing and hilarious look at the Silicon Valley no one sees. This is an extended version of a story that appears in the May 2014 issue of WIRED magazine.
Tor and The Dark Net: Remain Anonymous Online and Evade NSA Spying (Tor, Dark Net, Anonymous Online, NSA Spying)
James Smith - 2016
Some may know and choose to ignore the fact, but every single thing you do online is being tracked and guess what? For better or for worse it is there forever. Whether you're simply browsing websites or you are accessing confidential information that you would rather no one know about there are ways to remain anonymous. Imagine this scenario, you create an account on a forum with your name and decide to do some political freedom fighting with it. Years down the road a future employer of yours does a simple google search of your name and finds everything you've ever done. They don't hire you. This is a very simple scenario that just scratches the surface of reasons to stay anonymous but the point remains the same. Knowing when and how to remain anonymous is very important. Many people already realize this but have no clue where to start. This book has step by step instructions and techniques involving Tor, VPN's, Proxies, and more that will take you to the deepest levels of anonymity in which not even the all seeing NSA will be able to track you. Bonus download included in the book! (Step-by-step guide to setup TOR) A Preview of What You Will Learn ✔ How to Remain COMPLETELY Anonymous ✔ Exactly What Tor, VPN's, and PGP Are. ✔ How To Setup and Use Tor Correctly For Maximum Safety ✔ Key Mistakes To Avoid ✔ The Real Capabilities of The NSA ✔ Much, much more! Take back your privacy today. Scroll up and buy this book!
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
Paul Rosenzweig - 2013
Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more. Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is your guide to understanding the intricate nature of this pressing subject. Delivered by cybersecurity expert and professor Paul Rosenzweig, these 18 engaging lectures will open your eyes to the structure of the Internet, the unique dangers it breeds, and the ways we’re learning how to understand, manage, and reduce these dangers.In addition, Professor Rosenzweig offers sensible tips on how best to protect yourself, your network, or your business from attack or data loss.Disclaimer: The views expressed in this course are those of the professor and do not necessarily reflect the position or policy of the U.S. Department of Homeland Security, the U.S. Department of Defense, or the U.S. government. Disclaimer: Please note that this recording may include references to supplemental texts or print references that are not essential to the program and not supplied with your purchase.©2013 The Teaching Company, LLC (P)2013 The Great Courses
The Half-life of Facts: Why Everything We Know Has an Expiration Date
Samuel Arbesman - 2012
Smoking has gone from doctor recommended to deadly. We used to think the Earth was the center of the universe and that Pluto was a planet. For decades, we were convinced that the brontosaurus was a real dinosaur. In short, what we know about the world is constantly changing. But it turns out there’s an order to the state of knowledge, an explanation for how we know what we know. Samuel Arbesman is an expert in the field of scientometrics—literally the science of science. Knowledge in most fields evolves systematically and predictably, and this evolution unfolds in a fascinating way that can have a powerful impact on our lives. Doctors with a rough idea of when their knowledge is likely to expire can be better equipped to keep up with the latest research. Companies and governments that understand how long new discoveries take to develop can improve decisions about allocating resources. And by tracing how and when language changes, each of us can better bridge generational gaps in slang and dialect. Just as we know that a chunk of uranium can break down in a measurable amount of time—a radioactive half-life—so too any given field’s change in knowledge can be measured concretely. We can know when facts in aggregate are obsolete, the rate at which new facts are created, and even how facts spread. Arbesman takes us through a wide variety of fields, including those that change quickly, over the course of a few years, or over the span of centuries. He shows that much of what we know consists of “mesofacts”—facts that change at a middle timescale, often over a single human lifetime. Throughout, he offers intriguing examples about the face of knowledge: what English majors can learn from a statistical analysis of The Canterbury Tales, why it’s so hard to measure a mountain, and why so many parents still tell kids to eat their spinach because it’s rich in iron. The Half-life of Facts is a riveting journey into the counterintuitive fabric of knowledge. It can help us find new ways to measure the world while accepting the limits of how much we can know with certainty.
The Social Life of Information
John Seely Brown - 2000
John Seely Brown and Paul Duguid argue that the gap between digerati hype and end-user gloom is largely due to the "tunnel vision" that information-driven technologies breed. We've become so focused on where we think we ought to be--a place where technology empowers individuals and obliterates social organizations--that we often fail to see where we're really going.The Social Life of Information shows us how to look beyond our obsession with information and individuals to include the critical social networks of which these are always a part.
Total Recall: How the E-Memory Revolution Will Change Everything
C. Gordon Bell - 2009
IT WILL CHANGE WHAT IT MEANS TO BE HUMAN. IT HAS ALREADY BEGUN. What if you could remember everything? Gordon Bell and Jim Gemmell draw on their experience from their MyLifeBits project at Microsoft Research to explain the benefits to come from an earth-shaking and inevitable increase in electronic memories. In 1998 they began using Bell, a luminary in the computer world, as a test case, attempting to digitally record as much of his life as possible. Photos, letters, and memorabilia were scanned. Everything he did on his computer was captured. He wore an automatic camera, an arm-strap that logged his bio-metrics, and began recording telephone calls. This experiment, and the system they created to support it, put them at the center of a movement studying the creation and enjoyment of e-memories.Since then the three streams of technology feeding the Total Recall revolution—digital recording, digital storage, and digital search, have become gushing torrents. We are capturing so much of our lives now, be it on the date- and location-stamped photos we take with our smart phones or in the continuous records we have of our emails, instant messages, and tweets--not to mention the GPS tracking of our movements many cars and smart phones already do automatically. We are storing what we capture either out there in the “cloud” of services such as Facebook or on our very own increasingly massive and cheap hard drives. But the critical technology, and perhaps least understood, is our magical new ability to find the information we want in the mountain of data that is our past. And not just Google it, but data mine it so that, say, we can chart how much exercise we have been doing in the last four weeks in comparison with what we did four years ago. In health, education, work life, and our personal lives, the Total Recall revolution is going to change everything. As Bell and Gemmell show, it has already begun.Total Recall provides a glimpse of the near future. Imagine heart monitors woven into your clothes and tiny wearable audio and visual recorders automatically capturing what you see and hear. Imagine being able to summon up the e-memories of your great grandfather and his avatar giving you advice about whether or not to go to college, accept that job offer, or get married. The range of potential insights is truly awesome. But Bell and Gemmell also show how you can begin to take better advantage of this new technology right now. From how to navigate the serious question of privacy and serious problem of application compatibility to what kind of startups Bell is willing to invest in and which scanner he prefers, this is a book about a turning point in human knowledge as well as an immediate practical guide.Total Recall is a technological revolution that will accomplish nothing less than a transformation in the way humans think about the meaning of their lives.Watch a Video
Bitcoin Billionaires: A True Story of Genius, Betrayal, and Redemption
Ben Mezrich - 2019
While nursing their wounds in Ibiza, they accidentally run into an eccentric character who tells them about a brand-new idea: cryptocurrency. Immersing themselves in what is then an obscure and sometimes sinister world, they begin to realize “crypto” is, in their own words, "either the next big thing or total bulls--t." There’s nothing left to do but make a bet.From the Silk Road to the halls of the Securities and Exchange Commission, Bitcoin Billionaires will take us on a wild and surprising ride while illuminating a tantalizing economic future. On November 26, 2017, the Winklevoss brothers became the first bitcoin billionaires. Here’s the story of how they got there—as only Ben Mezrich could tell it.
Exploding Data: Reclaiming Our Cybersecurity in the Digital Age
Michael Chertoff - 2018
And yet, as daily events underscore, we are ever more vulnerable to cyber-attack.In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data--more widespread by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not so much the simple loss of privacy, which is almost impossible to protect, but of individual autonomy--the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a path that balances the needs of government, business, and individuals alike.
Doing Data Science
Cathy O'Neil - 2013
But how can you get started working in a wide-ranging, interdisciplinary field that’s so clouded in hype? This insightful book, based on Columbia University’s Introduction to Data Science class, tells you what you need to know.In many of these chapter-long lectures, data scientists from companies such as Google, Microsoft, and eBay share new algorithms, methods, and models by presenting case studies and the code they use. If you’re familiar with linear algebra, probability, and statistics, and have programming experience, this book is an ideal introduction to data science.Topics include:Statistical inference, exploratory data analysis, and the data science processAlgorithmsSpam filters, Naive Bayes, and data wranglingLogistic regressionFinancial modelingRecommendation engines and causalityData visualizationSocial networks and data journalismData engineering, MapReduce, Pregel, and HadoopDoing Data Science is collaboration between course instructor Rachel Schutt, Senior VP of Data Science at News Corp, and data science consultant Cathy O’Neil, a senior data scientist at Johnson Research Labs, who attended and blogged about the course.
Identity Is the New Money
David Birch - 2014
Because of technological change the two trends are converging so that all that we need for transacting will be our identities captured in the unique record of our online social contacts. Social networks and mobile phones are the key technologies. They will enable the building of an identity infrastructure that can enhance both privacy and security - there is no trade-off. The long-term consequences of these changes are impossible to predict, partly because how they take shape will depend on how companies take advantage of business opportunities to deliver transaction services. But one prediction made here is that cash will soon be redundant - and a good thing too. In its place we will see a proliferation of new digital currencies.
Red Team Field Manual
Ben Clark - 2014
The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.
Metasploit: The Penetration Tester's Guide
David Kennedy - 2011
But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.
Race Against The Machine
Erik Brynjolfsson - 2011
Drawing on research by their team at the Center for Digital Business, they show that there's been no stagnation in technology -- in fact, the digital revolution is accelerating. Recent advances are the stuff of science fiction: computers now drive cars in traffic, translate between human languages effectively, and beat the best human Jeopardy! players.As these examples show, digital technologies are rapidly encroaching on skills that used to belong to humans alone. This phenomenon is both broad and deep, and has profound economic implications. Many of these implications are positive; digital innovation increases productivity, reduces prices (sometimes to zero), and grows the overall economic pie.But digital innovation has also changed how the economic pie is distributed, and here the news is not good for the median worker. As technology races ahead, it can leave many people behind. Workers whose skills have been mastered by computers have less to offer the job market, and see their wages and prospects shrink. Entrepreneurial business models, new organizational structures and different institutions are needed to ensure that the average worker is not left behind by cutting-edge machines.In Race Against the Machine Brynjolfsson and McAfee bring together a range of statistics, examples, and arguments to show that technological progress is accelerating, and that this trend has deep consequences for skills, wages, and jobs. The book makes the case that employment prospects are grim for many today not because there's been technology has stagnated, but instead because we humans and our organizations aren't keeping up.
Red Team: How to Succeed By Thinking Like the Enemy
Micah Zenko - 2015
The concept is as old as the Devil's Advocate, the eleventh-century Vatican official charged with discrediting candidates for sainthood. Today, red teams are used widely in both the public and the private sector by those seeking to better understand the interests, intentions, and capabilities of institutional rivals. In the right circumstances, red teams can yield impressive results, giving businesses an edge over their competition, poking holes in vital intelligence estimates, and troubleshooting dangerous military missions long before boots are on the ground. But not all red teams are created equal; indeed, some cause more damage than they prevent. Drawing on a fascinating range of case studies, Red Team shows not only how to create and empower red teams, but also what to do with the information they produce. In this vivid, deeply-informed account, national security expert Micah Zenko provides the definitive book on this important strategy -- full of vital insights for decision makers of all kinds.
Bye Bye Banks?: How Retail Banks are Being Displaced, Diminished and Disintermediated by Tech Startups - and What They Can Do to Survive.
James Haycock - 2015
Now the retail banking business model looks set to be transformed too. In Bye Bye Banks? James Haycock and Shane Richmond describe these startups, and to which areas of the banking industry they are laying siege. It shows that this assault is already well underway and that many incumbents are poised to be displaced, diminished and disintermediated. It draws on extensive research and on-and-off the record interviews with senior executives in some of the biggest banks. Haycock and Richmond conclude with the recommendation that traditional banks need to reinvent themselves by launching a ‘Beta Bank’: a lean, stand-alone organisation fit for the future for which they provide a ten-point operating model. This short book is a bold, urgent and timely analysis of the forces shaping the future of financial services. Its message to industry leaders in the sector could not be more simple: adapt or prepare to be disrupted. “This work accurately and concisely captures the effects of the disruption brought to the banking industry by the digital revolution. The comments by other banking and innovation professionals about their own experiences are particularly intriguing.” - Alessandro Hatami, former Innovation Executive at Lloyds Banking Group “James Haycock is a key voice for how the banking industry should and will change.” - Tom Hopkins, Product Innovation Director, Experian Consumer Services “If you are an incumbent retail bank, read it, get on with it, make it happen.” - Lee Sankey, former Group Design Director, Barclays