Book picks similar to
Exploring Internet by Sai Satish
sai
exploring-internet
tech
google
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
Parmy Olson - 2012
WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec. In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.
A People's History of Computing in the United States
Joy Lisi Rankin - 2018
But throughout the 1960s and 1970s a diverse group of teachers and students working together on academic computing systems conducted many of the activities we now recognize as personal and social computing. Their networks were centered in New Hampshire, Minnesota, and Illinois, but they connected far-flung users. Joy Rankin draws on detailed records to explore how users exchanged messages, programmed music and poems, fostered communities, and developed computer games like The Oregon Trail. These unsung pioneers helped shape our digital world, just as much as the inventors, garage hobbyists, and eccentric billionaires of Palo Alto.By imagining computing as an interactive commons, the early denizens of the digital realm seeded today's debate about whether the internet should be a public utility and laid the groundwork for the concept of net neutrality. Rankin offers a radical precedent for a more democratic digital culture, and new models for the next generation of activists, educators, coders, and makers.
Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family
Theresa M. Payton - 2014
The devices we use to get just-in-time coupons, directions when we're lost, and maintain connections with loved ones no matter how far away they are, also invade our privacy in ways we might not even be aware of. Our devices send and collect data about us whenever we use them, but that data is not safeguarded the way we assume it would be. Privacy is complex and personal. Many of us do not know the full extent to which data is collected, stored, aggregated, and used. As recent revelations indicate, we are subject to a level of data collection and surveillance never before imaginable. While some of these methods may, in fact, protect us and provide us with information and services we deem to be helpful and desired, others can turn out to be insidious and over-arching. Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware. Payton and Claypoole skillfully introduce readers to the many ways we are 'watched, ' and how to adjust our behaviors and activities to recapture our privacy. The authors suggest the tools, behavior changes, and political actions we can take to regain data and identity security. Anyone who uses digital devices will want to read this book for its clear and no-nonsense approach to the world of big data and what it means for all of us.
Sevenfold Sword: Omnibus One
Jonathan Moeller - 2019
Ridmark Arban is the Shield Knight, the defender of the realm of Andomhaim. The realm is at peace after a long and terrible war, but dark powers threaten other lands. And when a mad elven wizard comes to the High King's court, Ridmark finds himself fighting not only for his own life, but for the lives of his family. For the quest of the Seven Swords has begun. And the quest will kill anyone foolish enough to seek its secret...
Move Fast and Break Things: How Facebook, Google, and Amazon Cornered Culture and Undermined Democracy
Jonathan Taplin - 2017
Since 2001, newspaper and music revenues have fallen by 70%, book publishing, film and television profits have also fallen dramatically. Revenues at Google in this same period grew from $400 million to $74.5 billion. Google's YouTube today controls 60% of the streaming audio business and pays only 11% of the streaming audio revenues. More creative content is being consumed than ever before, but less revenue is flowing to creators and owners of the content.With the reallocation of money to monopoly platforms comes a shift in power. Google, Facebook, and Amazon now enjoy political power on par with Big Oil and Big Pharma, which in part explains how such a tremendous shift in revenues from artists to platforms could have been achieved and why it has gone unchallenged for so long.The stakes in this story go far beyond the livelihood of any one musician or journalist. As Taplin observes, the fact that more and more Americans receive their news, music and other forms of entertainment from a small group of companies poses a real threat to democracy. Move Fast and Break Things offers a vital, forward-thinking prescription for how artists can reclaim their audiences using knowledge of the past and a determination to work together. Using his own half-century career as a music and film producer and early pioneer of streaming video online, Taplin offers new ways to think about the design of the World Wide Web and specifically the way we live with the firms that dominate it.Table of contentsIntroduction1. The Great Disruption2. Levon's Story3. Tech's Counterculture Roots4. The Libertarian Counterinsurgency5. Digital Destruction6. Monopoly in the Digital Age7. Google's Regulatory Capture8. The Social Media Revolution9. Pirates of the Internet10. Libertarian and the 1 Percent11. What It Means to Be Human12. The Digital RenaissanceAfterword
Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage
Gordon Corera - 2015
The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Gordon Corera has gathered compelling stories from heads of state, hackers and spies of all stripes.Cyberspies is a ground-breaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier - 2000
Identity Theft. Corporate Espionage. National secrets compromised. Can anyone promise security in our digital world?The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.This edition updated with new information about post-9/11 security.
Accidental Empires
Robert X. Cringely - 1992
Accidental Empires is the trenchant, vastly readable history of that industry, focusing as much on the astoundingly odd personalities at its core—Steve Jobs, Bill Gates, Mitch Kapor, etc. and the hacker culture they spawned as it does on the remarkable technology they created. Cringely reveals the manias and foibles of these men (they are always men) with deadpan hilarity and cogently demonstrates how their neuroses have shaped the computer business. But Cringely gives us much more than high-tech voyeurism and insider gossip. From the birth of the transistor to the mid-life crisis of the computer industry, he spins a sweeping, uniquely American saga of creativity and ego that is at once uproarious, shocking and inspiring.
Tools and Weapons: The Promise and the Peril of the Digital Age
Brad Smith - 2019
This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. Now, though, we have reached an inflection point: Silicon Valley has moved fast and it has broken things. A new understanding has emerged that companies that create technology must accept greater responsibility for the future. And governments will need to regulate technology by moving faster and catching up with the pace of innovation that is impacting our communities and changing the world.In Tools and Weapons, Brad Smith takes us into the cockpit of one of the world's largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no preexisting playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of AI, big tech's relationship to inequality and the challenges for democracy, far and near. While in no way a self-glorifying "Microsoft memoir," the book opens up the curtain remarkably wide onto some of the company's most crucial recent decision points, as it strives to protect the hopes technology offers against the very real threats it also presents. Every tool can be a weapon in the wrong person's hands, and companies are being challenged in entirely new ways to embrace the totality of their responsibilities. We have moved from a world in which Silicon Valley could take no prisoners to one in which tech companies and governments must work together to address the challenges and adapt to the changes technology has unleashed. There are huge ramifications to be thought through, and Brad Smith provides a marvelous and urgently necessary contribution to that effort.
ProBlogger: Secrets for Blogging Your Way to a Six-Figure Income
Darren Rowse - 2008
Whether you're just starting out or have been blogging for years, these two professional bloggers show you how to turn your passion for blogging into extra revenue. This practical guide to creating and marketing a blog with the potential for generating a six-figure income shows you how to choose subject matter that works for you, handle technical issues, and evaluate your blog's success so that you can use your blog to generate income indirectly.
The Launch Pad: Inside Y Combinator, Silicon Valley's Most Exclusive School for Startups
Randall E. Stross - 2012
Their brand-new two- or three-person start-ups are given a seemingly impossible challenge: to turn a raw idea into a viable business, fast. Each YC session culminates in a demo day, when investors and venture capitalists flock to hear pitches from the new graduates. Any one of them might turn out to be the next Dropbox (class of 2007, now valued at $5 billion) or Airbnb (2009, $1.3 billion). Randall Stross is the first journalist to have fly-on-the-wall access to Y Combinator. He tells the full story of how Paul Graham started this ultra exclusive institution, how it chooses among hundreds of aspiring Mark Zuckerbergs, and how it teaches them to go from concept to profitability in record time.
The Twitter Book
Tim O'Reilly - 2009
It includes information on the latest third party applications, strategies and tactics for using Twitter's 140-character messages as a serious--and effective--way to boost your business, as well as how to turn Twitter into your personal newspaper, tracking breaking news and learning what matters to you and your friends.Co-written by Tim O'Reilly and Sarah Milstein, widely followed and highly respected twitterers, the practical information in The Twitter Book is presented in an innovative, visually rich format that's packed with clear explanations and examples of best practices that show Twitter in action, as demonstrated by the work of over 60 twitterers.This book will help you:Use Twitter to connect with colleagues, customers, family, and friends Stand out on Twitter Avoid common Twitter gaffes and pitfalls Build a critical professional communications channel with Twitter--and use the best third-party tools that help you manage it. If you want to know how to use Twitter like a pro, The Twitter Book will quickly get you up to speed.About the authors: Tim O Reilly (@timoreilly), founder and CEO of O Reilly Media, has hundreds of thousands of followers on Twitter. Sarah Milstein (@SarahM) frequently writes, speaks and teaches about Twitter; she was the 21st user of Twitter.
The Extreme Searcher's Internet Handbook: A Guide for the Serious Searcher
Randolph Hock - 2004
From emerging search tools Ask.com and Windows Live to standbys Google and Yahoo!, the major search engines and their myriad of services are thoroughly discussed. Recent additions to the Internet realm—RSS feeds, podcasts, alert services, wikis, and blogs—are explained, as well as tried-and-true search tools, including web directories, newsgroups, and image resources. For those with little to moderate searching experience, friendly, easy-to-follow guidelines to the world of Web research are provided, while experienced searchers will discover new perspectives on content and techniques.