Tools and Weapons: The Promise and the Peril of the Digital Age


Brad Smith - 2019
    This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. Now, though, we have reached an inflection point: Silicon Valley has moved fast and it has broken things. A new understanding has emerged that companies that create technology must accept greater responsibility for the future. And governments will need to regulate technology by moving faster and catching up with the pace of innovation that is impacting our communities and changing the world.In Tools and Weapons, Brad Smith takes us into the cockpit of one of the world's largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no preexisting playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of AI, big tech's relationship to inequality and the challenges for democracy, far and near. While in no way a self-glorifying "Microsoft memoir," the book opens up the curtain remarkably wide onto some of the company's most crucial recent decision points, as it strives to protect the hopes technology offers against the very real threats it also presents. Every tool can be a weapon in the wrong person's hands, and companies are being challenged in entirely new ways to embrace the totality of their responsibilities. We have moved from a world in which Silicon Valley could take no prisoners to one in which tech companies and governments must work together to address the challenges and adapt to the changes technology has unleashed. There are huge ramifications to be thought through, and Brad Smith provides a marvelous and urgently necessary contribution to that effort.

The Marshall Plan: Dawn of the Cold War


Benn Steil - 2018
    Marshall set out with a plan to reconstruct Western Europe as a bulwark against communist authoritarianism. Their massive, costly, and ambitious undertaking would confront Europeans and Americans alike with a vision at odds with their history and self-conceptions. In the process, they would drive the creation of NATO, the European Union, and a Western identity that continues to shape world events.Focusing on the critical years 1947 to 1949, Benn Steil’s thrilling account brings to life the seminal episodes marking the collapse of postwar US-Soviet relations—the Prague coup, the Berlin blockade, and the division of Germany. In each case, we see and understand like never before Stalin’s determination to crush the Marshall Plan and undermine American power in Europe.Given the current echoes of the Cold War, as Putin’s Russia rattles the world order, the tenuous balance of power and uncertain global order of the late 1940s is as relevant as ever. The Marshall Plan provides thorough context into understanding today’s international landscape. Bringing to bear fascinating new material from American, Russian, German, and other European archives, Steil’s account will forever change how we see the birth of the Cold War and the Marshall Plan. A polished and masterly work of historical narrative, this is an instant classic of Cold War literature.

Stealing the Network: How to Own a Continent


Ryan Russell - 2004
    While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring* An informative and scary insight into the boundries of hacking and cyber-terrorism* Written by a team of the most accomplished cyber-security specialists in the world

World Order


Henry Kissinger - 2014
    Drawing on his experience as one of the foremost statesmen of the modern era—advising presidents, traveling the world, observing and shaping the central foreign policy events of recent decades—Kissinger now reveals his analysis of the ultimate challenge for the twenty-first century: how to build a shared international order in a world of divergent historical perspectives, violent conflict, proliferating technology, and ideological extremism.There has never been a true “world order,” Kissinger observes. For most of history, civilizations defined their own concepts of order. Each considered itself the center of the world and envisioned its distinct principles as universally relevant. China conceived of a global cultural hierarchy with the Emperor at its pinnacle. In Europe, Rome imagined itself surrounded by barbarians; when Rome fragmented, European peoples refined a concept of an equilibrium of sovereign states and sought to export it across the world. Islam, in its early centuries, considered itself the world’s sole legitimate political unit, destined to expand indefinitely until the world was brought into harmony by religious principles. The United States was born of a conviction about the universal applicability of democracy—a conviction that has guided its policies ever since.Now international affairs take place on a global basis, and these historical concepts of world order are meeting. Every region participates in questions of high policy in every other, often instantaneously. Yet there is no consensus among the major actors about the rules and limits guiding this process, or its ultimate destination. The result is mounting tension.Grounded in Kissinger’s deep study of history and his experience as National Security Advisor and Secretary of State, World Order guides readers through crucial episodes in recent world history. Kissinger offers a unique glimpse into the inner deliberations of the Nixon administration’s negotiations with Hanoi over the end of the Vietnam War, as well as Ronald Reagan’s tense debates with Soviet Premier Gorbachev in Reykjavík. He offers compelling insights into the future of U.S.–China relations and the evolution of the European Union, and examines lessons of the conflicts in Iraq and Afghanistan. Taking readers from his analysis of nuclear negotiations with Iran through the West’s response to the Arab Spring and tensions with Russia over Ukraine, World Order anchors Kissinger’s historical analysis in the decisive events of our time.Provocative and articulate, blending historical insight with geopolitical prognostication, World Order is a unique work that could come only from a lifelong policymaker and diplomat.

Threat Modeling: Designing for Security


Adam Shostack - 2014
    Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.

Hacking Exposed: Network Security Secrets & Solutions


Joel Scambray - 2003
    Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." —From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc."For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." —Patrick Heim, CISO, Kaiser Permanente"The definitive resource to understanding the hacking mindset and the defenses against it." —Vince Rossi, CEO & President, St. Bernard Software"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." —Bill Loesch, CTO, Guard ID Systems"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." —Kip Boyle, CISO, PEMCO Mutual Insurance Company"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," —Jeff Moss, Founder of the popular Black Hat Security ConferenceMeet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.New and updated material: New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits New wireless and RFID security tools, including multilayered encryption and gateways All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking Fully updated chapters on hacking the Internet user, web hacking, and securing code

Perception and Misperception in International Politics


Robert Jervis - 1976
    The New York Times called it, in an article published nearly ten years after the book's appearance, the seminal statement of principles underlying political psychology.The perspective established by Jervis remains an important counterpoint to structural explanations of international politics, and from it has developed a large literature on the psychology of leaders and the problems of decision making under conditions of incomplete information, stress, and cognitive bias.Jervis begins by describing the process of perception (for example, how decision makers learn from history) and then explores common forms of misperception (such as overestimating one's influence). Finally, he tests his ideas through a number of important events in international relations from nineteenth- and twentieth-century European history.In a contemporary application of Jervis's ideas, some argue that Saddam Hussein invaded Kuwait in 1990 in part because he misread the signals of American leaders with regard to the independence of Kuwait. Also, leaders of the United States and Iraq in the run-up to the most recent Gulf War might have been operating under cognitive biases that made them value certain kinds of information more than others, whether or not the information was true. Jervis proved that, once a leader believed something, that perception would influence the way the leader perceived all other relevant information.

The Quiet Americans: Four CIA Spies at the Dawn of the Cold War—A Tragedy in Three Acts


Scott Anderson - 2020
    But it was clear - to some - that the Soviet Union was already executing a plan to expand and foment revolution around the world. The American government's strategy in response relied on the secret efforts of a newly-formed CIA.The Quiet Americans chronicles the exploits of four spies - Michael Burke, a charming former football star fallen on hard times, Frank Wisner, the scion of a wealthy Southern family, Peter Sichel, a sophisticated German Jew who escaped the Nazis, and Edward Lansdale, a brilliant ad executive. The four ran covert operations across the globe, trying to outwit the ruthless KGB in Berlin, parachuting commandos into Eastern Europe, plotting coups, and directing wars against Communist insurgents in Asia.But time and again their efforts went awry, thwarted by a combination of stupidity and ideological rigidity at the highest levels of the government - and more profoundly, the decision to abandon American ideals. By the mid-1950s, the Soviet Union had a stranglehold on Eastern Europe, the U.S. had begun its disastrous intervention in Vietnam, and America, the beacon of democracy, was overthrowing democratically-elected governments and earning the hatred of much of the world. All of this culminated in an act of betrayal and cowardice that would lock the Cold War into place for decades to come.Anderson brings to the telling of this story all the narrative brio, deep research, skeptical eye, and lively prose that made Lawrence in Arabia a major international bestseller. The intertwined lives of these men began in a common purpose of defending freedom, but the ravages of the Cold War led them to different fates. Two would quit the CIA in despair, stricken by the moral compromises they had to make; one became the archetype of the duplicitous and destructive American spy; and one would be so heartbroken he would take his own life.The Quiet Americans is the story of these four men. It is also the story of how the United States, at the very pinnacle of its power, managed to snatch defeat from the jaws of victory.

Essence of Decision: Explaining the Cuban Missile Crisis


Graham T. Allison - 1971
    Not simply revised, but completely re-written, the Second Edition of this classic text is a fresh reinterpretation of the theories and events surrounding the Cuban Missle Crisis, incorporating all new information from the Kennedy tapes and recently declassified Soviet files. Essence of Decision Second Edition, is a vivid look at decision-making under pressure and is the only single volume work that attempts to answer the enduring question: how should citizens understand the actions of their government?

The Afghanistan Papers: A Secret History of the War


Craig Whitlock - 2021
    At first, the goals were straightforward and clear: defeat al-Qaeda and prevent a repeat of 9/11. Yet soon after the United States and its allies removed the Taliban from power, the mission veered off course and US officials lost sight of their original objectives. Distracted by the war in Iraq, the US military become mired in an unwinnable guerrilla conflict in a country it did not understand. But no president wanted to admit failure, especially in a war that began as a just cause. Instead, the Bush, Obama, and Trump administrations sent more and more troops to Afghanistan and repeatedly said they were making progress, even though they knew there was no realistic prospect for an outright victory. Just as the Pentagon Papers changed the public’s understanding of Vietnam, The Afghanistan Papers contains “fast-paced and vivid” (The New York Times Book Review) revelation after revelation from people who played a direct role in the war from leaders in the White House and the Pentagon to soldiers and aid workers on the front lines. In unvarnished language, they admit that the US government’s strategies were a mess, that the nation-building project was a colossal failure, and that drugs and corruption gained a stranglehold over their allies in the Afghan government. All told, the account is based on interviews with more than 1,000 people who knew that the US government was presenting a distorted, and sometimes entirely fabricated, version of the facts on the ground. Documents unearthed by The Washington Post reveal that President Bush didn’t know the name of his Afghanistan war commander—and didn’t want to meet with him. Secretary of Defense Donald Rumsfeld admitted that he had “no visibility into who the bad guys are.” His successor, Robert Gates, said: “We didn’t know jack shit about al-Qaeda.” The Afghanistan Papers is a “searing indictment of the deceit, blunders, and hubris of senior military and civilian officials” (Tom Bowman, NRP Pentagon Correspondent) that will supercharge a long-overdue reckoning over what went wrong and forever change the way the conflict is remembered.

The Future of Violence: Robots and Germs, Hackers and Drones: Confronting A New Age of Threat


Benjamin Wittes - 2014
    government has harnessed the power of cutting-edge technology to awesome effect. But what happens when ordinary people have the same tools at their fingertips? Advances in cybertechnology, biotechnology, and robotics mean that more people than ever before have access to potentially dangerous technologies—from drones to computer networks and biological agents—which could be used to attack states and private citizens alike.In The Future of Violence, law and security experts Benjamin Wittes and Gabriella Blum detail the myriad possibilities, challenges, and enormous risks present in the modern world, and argue that if our national governments can no longer adequately protect us from harm, they will lose their legitimacy. Consequently, governments, companies, and citizens must rethink their security efforts to protect lives and liberty. In this brave new world where many little brothers are as menacing as any Big Brother, safeguarding our liberty and privacy may require strong domestic and international surveillance and regulatory controls. Maintaining security in this world where anyone can attack anyone requires a global perspective, with more multinational forces and greater action to protect (and protect against) weaker states who do not yet have the capability to police their own people. Drawing on political thinkers from Thomas Hobbes to the Founders and beyond, Wittes and Blum show that, despite recent protestations to the contrary, security and liberty are mutually supportive, and that we must embrace one to ensure the other. The Future of Violence is at once an introduction to our emerging world—one in which students can print guns with 3-D printers and scientists’ manipulations of viruses can be recreated and unleashed by ordinary people—and an authoritative blueprint for how government must adapt in order to survive and protect us.

War in 140 Characters: How Social Media Is Reshaping Conflict in the Twenty-First Century


David Patrikarakos - 2017
    Whether you are a president or a terrorist, if you don't understand how to deploy the power of social media effectively you may win the odd battle but you will lose a twenty-first century war. Here, journalist David Patrikarakos draws on unprecedented access to key players to provide a new narrative for modern warfare. He travels thousands of miles across continents to meet a de-radicalized female member of ISIS recruited via Skype, a liberal Russian in Siberia who takes a job manufacturing "Ukrainian" news, and many others to explore the way social media has transformed the way we fight, win, and consume wars-and what this means for the world going forward.

The Second Nuclear Age: Strategy, Danger, and the New Power Politics


Paul Bracken - 2012
    It’s not just the threat of Iran getting the bomb or North Korea doing something rash; the whole complexion of global power politics is changing because of the reemergence of nuclear weapons as a vital element of statecraft and power politics. In short, we have entered the second nuclear age.In this provocative and agenda-setting book, Paul Bracken of Yale University argues that we need to pay renewed attention to nuclear weapons and how their presence will transform the way crises develop and escalate. He draws on his years of experience analyzing defense strategy to make the case that the United States needs to start thinking seriously about these issues once again, especially as new countries acquire nuclear capabilities. He walks us through war-game scenarios that are all too realistic, to show how nuclear weapons are changing the calculus of power politics, and he offers an incisive tour of the Middle East, South Asia, and East Asia to underscore how the United States must not allow itself to be unprepared for managing such crises.Frank in its tone and farsighted in its analysis, The Second Nuclear Age is the essential guide to the new rules of international politics.

The Future of War: A History


Lawrence Freedman - 2016
    At the time, it was dismissed by the British generals and admirals of the day not because the idea of submarines was technically unfeasible, but because no one could imagine that any nation would be so depraved as to sink civilian merchant ships. The future of war more often than not surprises us less because of some fantastic technical or engineering dimension but because of some human, political, or moral threshold that we had never imagined wanting to cross.As Lawrence Freedman shows, the future of war has a past and a present. Ideas of war, strategies for warfare and its practice, and organizing principles of war all have rich and varied origins which have shaped the minds of those who conceive the next war. Freedman shows how war can be studied systematically and empirically to provide a firm foundation for enlightened policy.The Future of War—which covers civil wars to as yet unknown nuclear conflicts, proxy wars (real) to the Cold War (not), fashionably small wars to the War to End All Wars (it didn’t)—is filled with insight and fascinating nuggets of military history and culture from one of the most brilliant military and strategic historians of his generation.

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide


James Michael Stewart - 2015
    This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Four unique 250 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security