Book picks similar to
The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen by Jonathan Littman
nonfiction
non-fiction
biography
hackers
Alan Turing: Unlocking the Enigma
David Boyle - 2014
Turing’s openness about his homosexuality at a time when it was an imprisonable offense ultimately led to his untimely lo death at the age of only forty-one. In Alan Turing: Unlocking the Enigma, David Boyle reveals the mysteries behind the man and his remarkable career. Aged just 22, Turing was elected a fellow at King's College, Cambridge on the strength of a dissertation in which he proved the central limit theorem. By the age of 33, he had been awarded the OBE by King George VI for his wartime services: Turing was instrumental in cracking the Nazi Enigma machines at the top secret code breaking establishment at Bletchley Park during the Second World War.But his achievements were to be tragically overshadowed by the paranoia of the post-War years. Hounded for his supposedly subversive views and for his sexuality, Turing was prosecuted in 1952, and forced to accept the humiliation of hormone treatment to avoid a prison sentence. Just two years later, at the age of 41 he was dead. The verdict: cyanide poisoning.Was Turing’s death accidental as his mother always claimed? Or did persistent persecution drive him to take him own life?Alan Turing: Unlocking the Enigma seeks to find the man behind the science, illuminating the life of a person who is still a shadowy presence behind his brilliant achievements.
The Snowden Files: The Inside Story of the World's Most Wanted Man
Luke Harding - 2014
The consequences have shaken the leaders of nations worldwide. This is the inside story of Snowden's deeds and the journalists who faced down pressure from the US and UK governments to break a remarkable scoop.From the day he left his glamorous girlfriend in Hawaii, carrying a hard drive full of secrets, to the weeks of secret-spilling in Hong Kong and his battle for asylum, Snowden's story reads like a globe-trotting thriller.
iWar: War and Peace in the Information Age
Bill Gertz - 2017
Covert information warfare is being waged by world powers, rogue states—such as Russia, China, Iran, and North Korea—and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States. This new type of warfare is part of the Information Age that has come to dominate our lives. In iWar, Bill Gertz describes how technology has completely revolutionized modern warfare, how the Obama administration failed to meet this challenge, and what we can and must do to catch up and triumph over this timely and important struggle.
Alfred Nobel: A Life from Beginning to End (Biographies of Inventors)
Hourly History - 2020
Code Warriors: NSA's Code Breakers and the Secret Intelligence War Against the Soviet Union
Stephen Budiansky - 2016
The National Security Agency grew out of the legendary codebreaking programs of World War II that turned the tide of Allied victory by cracking the famed Enigma machine and other seemingly impenetrable German and Japanese codes. But things became murky in the postwar years, when our intelligence community found itself targeting not battlefield enemies, but suspected spies, foreign leaders, and even American citizens. Now Stephen Budiansky--a longtime expert in cryptology--tells the fascinating story of how the NSA came to be, and of its central, often fraught and controversial role in the major events of the Cold War, from the Korean War to the Cuban Missile Crisis to Vietnam and beyond. He also guides us through the fascinating challenges faced by cryptanalysts, and how they broke some of the most complicated codes of the twentieth century. A riveting, essential history of the underbelly of the Cold War.
iCon: Steve Jobs, the Greatest Second Act in the History of Business
Jeffrey S. Young - 2005
Drawing on a wide range of sources, Jeffrey Young and William Simon provide new perspectives on the legendary creation of Apple, detail Jobs's meteoric rise, and the devastating plunge that left him not only out of Apple, but out of the computer-making business entirely. This unflinching and completely unauthorized portrait reveals both sides of Jobs's role in the remarkable rise of the Pixar animation studio, also re-creates the acrimony between Jobs and Disney's Michael Eisner, and examines Jobs's dramatic his rise from the ashes with his recapture of Apple. The authors examine the takeover and Jobs's reinvention of the company with the popular iMac and his transformation of the industry with the revolutionary iPod. iCon is must reading for anyone who wants to understand how the modern digital age has been formed, shaped, and refined by the most influential figure of the age-a master of three industries: movies, music, and computers.
Steve Jobs
Walter Isaacson - 2011
Based on more than forty interviews with Steve Jobs conducted over two years--as well as interviews with more than 100 family members, friends, adversaries, competitors, and colleagues--Walter Isaacson has written a riveting story of the roller-coaster life and searingly intense personality of a creative entrepreneur whose passion for perfection and ferocious drive revolutionized six industries: personal computers, animated movies, music, phones, tablet computing, and digital publishing. Isaacson's portrait touched millions of readers. At a time when America is seeking ways to sustain its innovative edge, Jobs stands as the ultimate icon of inventiveness and applied imagination. He knew that the best way to create value in the twenty-first century was to connect creativity with technology. He built a company where leaps of the imagination were combined with remarkable feats of engineering. Although Jobs cooperated with the author, he asked for no control over what was written. He put nothing off-limits. He encouraged the people he knew to speak honestly. He himself spoke candidly about the people he worked with and competed against. His friends, foes, and colleagues offer an unvarnished view of the passions, perfectionism, obsessions, artistry, devilry, and compulsion for control that shaped his approach to business and the innovative products that resulted. His tale is instructive and cautionary, filled with lessons about innovation, character, leadership, and values. Steve Jobs is the inspiration for the movie of the same name starring Michael Fassbender, Kate Winslet, Seth Rogen, and Jeff Daniels, directed by Danny Boyle with a screenplay by Aaron Sorkin.
Breathing Machine: A Memoir of Computers
Leigh Alexander - 2014
From the surrealism of early video games to raw connections made over primitive newsgroups, from sex bots to Sailor Moon, Alexander intimately captures a dark frontier age.Leigh Alexander writes about video games, interactive entertainment, and various other things. As longtime editor-at-large for game industry site Gamasutra, she contributes editorial, criticism, trend analysis and interviews with developers. Her monthly column in Edge magazine deals with cultural issues surrounding the business of games and the people who play them. Her column at Kotaku is weirder. In a good way, probably.Her features appear at Polygon and Boing Boing, and she likes to write about feelings and social media at Thought Catalog. She used to be NYLON Guys’ games editor, did a biweekly column at Vice’s Creators Project focused on neat trends in independent game development, and has contributed to Slate, The New Inquiry, Wired, The New Statesman, The Guardian, the Columbia Journalism Review, Paste, Rock Paper Shotgun, and numerous others.She frequently speaks at conferences with particular attention to games for social good, feminism and increased diversity in tech spaces, where she usually talks with an excess of speed. She swears it’s driven by enthusiasm. Back in the day she once led an entire conference summit on avatar-based interaction in virtual spaces.
Rails Recipes
Chad Fowler - 2006
How do you use it effectively? How do you harness the power? And, most important, how do you get high quality, real-world applications written?From the latest Ajax effects to time-saving automation tips for your development process, "Rails Recipes" will show you how the experts have already solved the problems you have.Use generators to automate repetitive coding tasks.Create sophisticated role-based authentication schemes.Add live search and live preview to your site.Run tests when anyone checks code in.How to create tagged data the right way.and many, many more...Owning "Rails Recipes" is like having the best Rails programmers sitting next to you while you code.
Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat
John P. Carlin - 2018
We've seen North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage against American companies, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us.As the former Assistant Attorney General and Chief of Staff to FBI Director Robert Mueller, John Carlin has spent 15 years on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his years-long secret battle to keep America safe, and warns us of the perils that await us as we embrace the latest digital novelties -- smart appliances, artificial intelligence, self-driving cars -- with little regard for how our enemies might compromise them. The potential targets for our enemies are multiplying: our electrical grid, our companies, our information sources, our satellites. As each sector of the economy goes digital, a new vulnerability is exposed.The Internet of Broken Things makes the urgent case that we need to start innovating more responsibly. As a fleet of web-connected cars and pacemakers rolls off the assembly lines, the potential for danger is overwhelming. We must see and correct these flaws before our enemies exploit them.
The Search: How Google and Its Rivals Rewrote the Rules of Business and Transformed Our Culture
John Battelle - 2005
In its sweeping survey of the history of Internet search technologies, its gossip about and analysis of Google, and its speculation on the larger cultural implications of a Web-connected world, it will likely receive attention from a variety of businesspeople, technology futurists, journalists, and interested observers of mid-2000s zeitgeist. This ambitious book comes with a strong pedigree. Author John Battelle was a founder of The Industry Standard and then one of the original editors of Wired, two magazines which helped shape our early perceptions of the wild world of the Internet. Battelle clearly drew from his experience and contacts in writing The Search. In addition to the sure-handed historical perspective and easy familiarity with such dot-com stalwarts as AltaVista, Lycos, and Excite, he speckles his narrative with conversational asides from a cast of fascinating characters, such Google's founders, Larry Page and Sergey Brin; Yahoo's, Jerry Yang and David Filo; key executives at Microsoft and different VC firms on the famed Sandhill road; and numerous other insiders, particularly at the company which currently sits atop the search world, Google. The Search is not exactly the corporate history of Google. At the book's outset, Battelle specifically indicates his desire to understand what he calls the cultural anthropology of search, and to analyze search engines' current role as the "database of our intentions"--the repository of humanity's curiosity, exploration, and expressed desires. Interesting though that beginning is, though, Battelle's story really picks up speed when he starts dishing inside scoop on the darling business story of the decade, Google. To Battelle's credit, though, he doesn't stop just with historical retrospective: the final part of his book focuses on the potential future directions of Google and its products' development. In what Battelle himself acknowledges might just be a "digital fantasy train", he describes the possibility that Google will become the centralizing platform for our entire lives and quotes one early employee on the weightiness of Google's potential impact: "Sometimes I feel like I am on a bridge, twenty thousand feet up in the air. If I look down I'm afraid I'll fall. I don't feel like I can think about all the implications." Some will shrug at such words; after all, similar hype has accompanied other technologies and other companies before. Many others, though, will search Battelle's story for meaning--and fast. --Peter Han
Who Controls the Internet?: Illusions of a Borderless World
Jack L. Goldsmith - 2006
It's a book about the fate of one idea--that the Internet might liberate us forever from government, borders, and even our physical selves. We learn of Google's struggles with the French government and Yahoo's capitulation to the Chinese regime; of how the European Union sets privacy standards on the Net for the entire world; and of eBay's struggles with fraud and how it slowly learned to trust the FBI. In a decade of events the original vision is uprooted, as governments time and time again assert their power to direct the future of the Internet. The destiny of the Internet over the next decades, argue Goldsmith and Wu, will reflect the interests of powerful nations and the conflicts within and between them.While acknowledging the many attractions of the earliest visions of the Internet, the authors describe the new order, and speaking to both its surprising virtues and unavoidable vices. Far from destroying the Internet, the experience of the last decade has lead to a quiet rediscovery of some of the oldest functions and justifications for territorial government. While territorial governments have unavoidable problems, it has proven hard to replace what legitimacy governments have, and harder yet to replace the system of rule of law that controls the unchecked evils of anarchy. While the Net will change some of the ways that territorial states govern, it will not diminish the oldest and most fundamental roles of government and challenges of governance.Well written and filled with fascinating examples, including colorful portraits of many key players in Internet history, this is a work that is bound to stir heated debate in the cyberspace community.
A for Anonymous: How a Mysterious Hacker Collective Transformed the World
David Kushner - 2020
Their exploits blurred the distinction between "online" and "reality," and help shape our contemporary world.
Case Closed: Lee Harvey Oswald and the Assassination of JFK
Gerald Posner - 1993
Kennedy on November 22, 1963, continues to inspire interest ranging from well-meaning speculation to bizarre conspiracy theories and controversial filmmaking. But in this landmark book, reissued with a new afterword for the 40th anniversary of the assassination, Gerald Posner examines all of the available evidence and reaches the only possible conclusion: Lee Harvey Oswald acted alone. There was no second gunman on the grassy knoll. The CIA was not involved. And although more than four million pages of documents have been released since Posner first made his case, they have served only to corroborate his findings. Case Closed remains the classic account against which all books about JFK's death must be measured.
The Tao of Network Security Monitoring: Beyond Intrusion Detection
Richard Bejtlich - 2004
This book reducesthe investigative workload of computer security incident response teams(CSIRT) by posturing organizations for incident response success.Firewalls can fail. Intrusion-detection systems can be bypassed. Networkmonitors can be overloaded. These are the alarming but true facts aboutnetwork security. In fact, too often, security administrators' tools can serve asgateways into the very networks they are defending.Now, a novel approach to network monitoring seeks to overcome theselimitations by providing dynamic information about the vulnerability of allparts of a network. Called network security monitoring (NSM), it draws on acombination of auditing, vulnerability assessment, intrusion detection andprevention, and incident response for the most comprehensive approach tonetwork security yet. By focusing on case studies and the application of opensourcetools, the author helps readers gain hands-on knowledge of how tobetter defend networks and how to mitigate damage from security incidents.