Assad or We Burn the Country: How One Family's Lust for Power Destroyed Syria


Sam Dagher - 2019
    Tlass pushed for conciliation but Assad decided to crush the uprising -- an act which would catapult the country into an eight-year long war, killing almost half a million and fueling terrorism and a global refugee crisis.Assad or We Burn the Country examines Syria's tragedy through the generational saga of the Assad and Tlass families, once deeply intertwined and now estranged in Bashar's bloody quest to preserve his father's inheritance. By drawing on his own reporting experience in Damascus and exclusive interviews with Tlass, Dagher takes readers within palace walls to reveal the family behind the destruction of a country and the chaos of an entire region.Dagher shows how one of the world's most vicious police states came to be and explains how a regional conflict extended globally, engulfing the Middle East and pitting the United States and Russia against one another.

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy


Patrick Engebretson - 2011
    No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate.Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phasesWritten by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State UniversityUtilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test

Brave New War: The Next Stage of Terrorism and the End of Globalization


John Robb - 2007
    He shows how combating the shutdown of the world's oil, high-tech, and financial markets could cost us the thing we've come to value the most--worldwide economic and cultural integration--and what we must do now to safeguard against this new method of warfare.

Defensive Security Handbook: Best Practices for Securing Infrastructure


Lee Brotherston - 2017
    For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory


Michael Hale Ligh - 2014
    As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields.Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques:How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.

The Chinese Invasion Threat: Taiwan's Defense and American Strategy in Asia


Ian Easton - 2017
    From a historic spy case that saved Taiwan from communist takeover to modern day covert action programs, and from emergency alert procedures to underground coastal defense networks, this is the untold story of the most dangerous flashpoint of our times.""Easton offers a brilliant, thick description of China's invasion plans, Taiwan's plans to repel an invasion, potential invasion scenarios, and how the U.S. might respond. Throughout the incredible level of detail, and the vast number of plans, locations, weapons systems, operations and doctrines it presents, Easton's clarity of order and logical presentation keep everything firmly under control.Where would it arrive? When would it come? How would China attack Taiwan?Easton paints the way the island-nation would be attacked with a fine calligraphy brush, detailing how the landings would go, what would happen if the PRC got a foothold, and what weapons would be deployed where and how."Democratic-ruled Taiwan poses an existential threat to China's communist leaders because the island, located some 90 miles off the southeast coast "serves as a beacon of freedom for ethnically Chinese people everywhere," the book states."What Easton has done is provide a vital warning to America and its allies, China could try to invade Taiwan as early as the first half of the next decade."Easton is a Washington-based think tank Project 2049 Institute research fellow and a former National Chengchi University student.

Cyberphobia: Identity, Trust, Security and the Internet


Edward Lucas - 2015
    Stories about weaknesses in cybersecurity like the "Heartbleed" leak, or malicious software on the cash registers at your local Target have become alarmingly common. Even more alarming is the sheer number of victims associated with these crimes--the identities and personal information of millions is stolen outright as criminals drain bank accounts and max out credit cards. The availability of stolen credit card information is now so common that it can be purchased on the black market for as little as four dollars with potentially thousands at stake for the victims. Possibly even more catastrophic are hackers at a national level that have begun stealing national security, or economic and trade secrets. The world economy and geopolitics hang in the balance.In Cyberphobia, Edward Lucas unpacks this shadowy, but metastasizing problem confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the internet, it might as well be the Wild West. Standards of securing our computers and other internet-connected technology are diverse, but just like the rules of the road meant to protect both individual drivers and everyone else driving alongside them, weak cybersecurity on the computers and internet systems near us put everyone at risk. Lucas sounds a compelling and necessary alarm on behalf of cybersecurity and prescribes immediate and bold solutions to this grave threat.

The Infinite Machine: How an Army of Crypto-hackers Is Building the Next Internet with Ethereum


Camila Russo - 2020
    He convinced a crack  group of coders to join him in his quest to make a super-charged, global computer.The Infinite Machine introduces Vitalik’s ingenious idea and unfolds Ethereum’s chaotic beginnings. It then explores the brilliant innovation and reckless greed the platform—an infinitely adaptable foundation for experimentation and new applications—has unleashed and the consequences that resulted as the frenzy surrounding it grew: increased regulatory scrutiny, incipient Wall Street interest, and the founding team’s effort to get the Ethereum platform to scale so it can eventually be  accessible to the masses.Financial journalist and cryptocurrency expert Camila Russo details the wild and often hapless adventures of a team of hippy-anarchists, reluctantly led by an ambivalent visionary, and lays out how this new foundation for the internet will spur both transformation and fraud—turning some into millionaires and others into felons—and revolutionize our ideas about money.

The Doomsday Machine: Confessions of a Nuclear War Planner


Daniel Ellsberg - 2017
    Here for the first time he reveals the contents of those documents, and makes clear their shocking relevance for today.The Doomsday Machine is Ellsberg’s hair-raising insider’s account of the most dangerous arms buildup in the history of civilization, whose legacy—and proposed renewal under the Trump administration—threatens the very survival of humanity. It is scarcely possible to estimate the true dangers of our present nuclear policies without penetrating the secret realities of the nuclear strategy of the late Eisenhower and early Kennedy years, when Ellsberg had high-level access to them. No other insider has written so candidly of that long-classified history, though the policies remain fundamentally, and frighteningly, unchanged Ellsberg, in the end, offers steps we can take under the current administration to avoid nuclear catastrophe. Framed as a memoir, this gripping exposé reads like a thriller with cloak-and-dagger intrigue, placing Ellsberg back in his natural role as whistle-blower. It is a real-life Dr. Strangelove story, but an ultimately hopeful—and powerfully important—book.

Code Girls: The Untold Story of the American Women Code Breakers Who Helped Win World War II


Liza Mundy - 2017
    Army and Navy from small towns and elite colleges, more than ten thousand women served as codebreakers during World War II. While their brothers and boyfriends took up arms, these women moved to Washington and learned the meticulous work of code-breaking. Their efforts shortened the war, saved countless lives, and gave them access to careers previously denied to them. A strict vow of secrecy nearly erased their efforts from history; now, through dazzling research and interviews with surviving code girls, bestselling author Liza Mundy brings to life this riveting and vital story of American courage, service, and scientific accomplishment.

Pay Any Price: Greed, Power, and Endless War


James Risen - 2014
    Endless war corrupts absolutely.Ever since 9/11 America has fought an endless war on terror, seeking enemies everywhere and never promising peace. In Pay Any Price, James Risen reveals an extraordinary litany of the hidden costs of that war: from squandered and stolen dollars, to outrageous abuses of power, to wars on normalcy, decency, and truth. In the name of fighting terrorism, our government has done things every bit as shameful as its historic wartime abuses — and until this book, it has worked very hard to cover them up.Lincoln suspended habeas corpus. FDR authorized the internment of thousands of Japanese Americans. Presidents Bush and Obama now must face their own reckoning. Power corrupts, but it is endless war that corrupts absolutely.

The Impossible State: North Korea, Past and Future


Victor Cha - 2012
    He illuminates the repressive regime's complex economy and culture, its appalling record of human-rights abuses, and its belligerent relationship with the United States, and analyzes the regime's major security issues—from the seemingly endless war with its southern neighbor to its frightening nuclear ambitions—all in light of the destabilizing effects of Kim Jong-il's recent death.How this enigmatic nation-state—one that regularly violates its own citizens' inalienable rights and has suffered famine, global economic sanctions, a collapsed economy, and near total isolation from the rest of the world—has continued to survive has long been a question that preoccupies the West. Cha reveals a land of contradictions, one facing a pivotal and disquieting transition of power from tyrannical father to inexperienced son, and delves into the ideology that leads an oppressed, starving populace to cling so fiercely to its failed leadership.With rare personal anecdotes from the author's time in Pyongyang and his tenure as an adviser in the White House, this engagingly written, authoritative, and highly accessible history offers much-needed answers to the most pressing questions about North Korea and ultimately warns of a regime that might be closer to its end than many might think—a political collapse for which America and its allies may be woefully unprepared.

ISIS: Inside the Army of Terror


Michael Weiss - 2015
    In ISIS: Inside the Army of Terror, American journalist Michael Weiss and Syrian analyst Hassan Hassan explain how these violent extremists evolved from a nearly defeated Iraqi insurgent group into a jihadi army of international volunteers who behead Western hostages in slickly produced videos and have conquered territory equal to the size of Great Britain. Beginning with the early days of Abu Musab al-Zarqawi, the founder of ISIS’s first incarnation as “al-Qaeda in Iraq,” Weiss and Hassan explain who the key players are—from their elusive leader Abu Bakr al-Baghdadi to the former Saddam Baathists in their ranks—where they come from, how the movement has attracted both local and global support, and where their financing comes from. Political and military maneuvering by the United States, Iraq, Iran, and Syria have all fueled ISIS’s astonishing and explosive expansion. Drawing on original interviews with former US military officials and current ISIS fighters, the authors also reveal the internecine struggles within the movement itself, as well as ISIS’s bloody hatred of Shiite Muslims, which is generating another sectarian war in the region. Just like the one the US thought it had stopped in 2011 in Iraq. Past is prologue and America’s legacy in the Middle East is sowing a new generation of terror.

How Music Got Free: The End of an Industry, the Turn of the Century, and the Patient Zero of Piracy


Stephen Richard Witt - 2015
    It’s about the greatest pirate in history, the most powerful executive in the music business, a revolutionary invention and an illegal website four times the size of the iTunes Music Store. Journalist Stephen Witt traces the secret history of digital music piracy, from the German audio engineers who invented the mp3, to a North Carolina compact-disc manufacturing plant where factory worker Dell Glover leaked nearly two thousand albums over the course of a decade, to the high-rises of midtown Manhattan where music executive Doug Morris cornered the global market on rap, and, finally, into the darkest recesses of the Internet.Through these interwoven narratives, Witt has written a thrilling book that depicts the moment in history when ordinary life became forever entwined with the world online — when, suddenly, all the music ever recorded was available for free. In the page-turning tradition of writers like Michael Lewis and Lawrence Wright, Witt’s deeply-reported first book introduces the unforgettable characters—inventors, executives, factory workers, and smugglers—who revolutionized an entire artform, and reveals for the first time the secret underworld of media pirates that transformed our digital lives.An irresistible never-before-told story of greed, cunning, genius, and deceit, How Music Got Free isn’t just a story of the music industry—it’s a must-read history of the Internet itself.

The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States


National Commission on Terrorist Attacks Upon The United States - 2004
    In Lower Manhattan, on a field in Pennsylvania, and along the banks of the Potomoc, the United States suffered the single largest loss of life from an enemy attack on its soil.In November 2002 the United States Congress and President George W. Bush established by law the National Commission on Terrorist Attacks Upon the United States, also known as the 9/11 Commission. This independent, bipartisan panel was directed to examine the facts and circumstances surrounding the September 11 attacks, identify lessons learned, and provide recommendations to safeguard against future acts of terrorism. This volume is the authorized edition of the Commission's final report. This volume is the authorized edition of the Commission's final report.