Book picks similar to
Make: Technology on Your Time Volume 02: Technology on Your Time Volume 02 by Mark Frauenfelder
diy
electronics
gifts-for-others
o-reilly
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Nicole Perlroth - 2021
One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine).For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down.Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
CEH Certified Ethical Hacker Study Guide
Kimberly Graves - 2010
That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book provides full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice. Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts Includes a CD with review questions, bonus exams, and more study tools This is the ideal guide to prepare you for the new CEH certification exam. Reviews
Mediactive
Dan Gillmor - 2010
Yet you and I can take control and make media serve us -- all of us -- by being active consumers and participants. Here's how.ContentsForeword IntroductionChapter 1 Darwin’s Media Chapter 2 Becoming an Active User: Principles Chapter 3 Tools and Techniques for the Mediactive ConsumerChapter 4 Journalism’s Evolving Ecosystem Chapter 5 Principles of Trustworthy Media CreationChapter 6 Tools and Tactics for Trusted Creators Chapter 7 Owning Your Online Presence Chapter 8 Entrepreneurs Will Save Journalism, and You Could BeOne of Them Chapter 9 Laws and Norms Chapter 10 Teaching and Learning Mediactivity Chapter 11 A Path to Tomorrow Epilogue Acknowledgments
Phreaks
NOT A BOOK - 2020
Emma Gable, a blind teenager coming of age in a small industrial town in Western New York, is about as far from the seismic cultural transformations rocking campuses and city streets across America as a person can get. Emma escapes the chaos of her dysfunctional family by dialing up random numbers on the phone in her bedroom, just to see who'll answer. But when a fateful call connects her to a mysterious band of proto-hackers calling themselves "Phone Phreaks," the revolution comes home, changing Emma's life for good. Because Bell Telephone, the world's biggest corporation, is not amused that a handful of teenagers suddenly have the power to seize control of its vast and lucrative network and bend it to their will. Bringing down the Phreaks is the corporate goliath's number one priority, but for Bell Security Agent Bill Connolly, the crusade becomes personal as he struggles to outwit and outmaneuver an adversary that seems always one step ahead of him.Phreaks is the story of a fracturing family struggling to redefine itself as the world changes rapidly around it. Set at the dawn of the information age, its characters struggle with the same issues that define us today: privacy and surveillance, misuse of personal data, the ownership of ideas, our century-long obsession with the telephone, and the thirst for community that's driven us, since the dawn of time, to seek out new ways to "reach out and touch someone."Full voice cast includes: Christian Slater, Carrie Coon, Ben McKenzie, Justice Smith, Bree Klauser, Ashley Williams, Esau Pritchett, Arielle Goldman, Danny Mastrogiorgio, Alejandro Hernandez, Daniel Kim, Dave Ahdoot, Rachel Kenney, Chris Roberti, and Katie Hartman. Written by Matthew Derby Directed by Shaina Feinberg Executive Produced by Morgan Jones
The Logic of Life: The Rational Economics of an Irrational World
Tim Harford - 2008
In this deftly reasoned book, a columnist for The Financial Times and Slate argues that, despite the everyday insanity, life is logical after all, and he explores the surprisingly rational choices that shape the world.
There Are No Electrons: Electronics for Earthlings
Kenn Amdahl - 1991
Despite its title, it's not wild ranting pseudo-science to be dismissed by those with brains. Rather, Amdahl maintains that one need not understand quantum physics to grasp how electricity works in practical applications. To understand your toaster or your fax machine, it doesn't really matter whether there are electrons or not, and it's a lot easier and more fun to start with the toaster than with quarks and calculus. The book is mildly weird, often funny, always clear and easy to understand. It assumes the reader doesn't know a volt from a hole in the ground and gently leads him or her through integrated circuits, radio, oscillators and the basics of the digital revolution using examples that include green buffalo, microscopic beer parties, break-dancing chickens and naked Norwegian girls in rowboats. OK, it's more than mildly weird.The book has been reprinted numerous times since 1991 and has achieved minor cult status. Reviewed and praised in dozens of electronics and educational magazines, it is used as a text by major corporations, colleges, high schools, military schools and trade schools. It has been studied by education programs at colleges across the United States. This book was making wise cracks in the corner before anyone thought of designing books for dummies and idiots; some say it helped to inspire that industry.It may be the only "introduction to electronics books" with back cover comments by Dave Barry, Ray Bradbury, Clive Cussler, and George Garrett, as well as recomendations from Robert Hazen, Bob Mostafapour, Dr. Roger Young, Dr. Wayne Green, Scott Rundle, Brian Battles, Michelle Guido, Herb Reichert and Emil Venere. As Monitoring Times said, "Perhaps the best electronics book ever. If you'd like to learn about basic electronics but haven't been able to pull it off, get There Are No Electrons. Just trust us. Get the book."
Just for Fun: The Story of an Accidental Revolutionary
Linus Torvalds - 2001
Then he wrote a groundbreaking operating system and distributed it via the Internet -- for free. Today Torvalds is an international folk hero. And his creation LINUX is used by over 12 million people as well as by companies such as IBM.Now, in a narrative that zips along with the speed of e-mail, Torvalds gives a history of his renegade software while candidly revealing the quirky mind of a genius. The result is an engrossing portrayal of a man with a revolutionary vision, who challenges our values and may change our world.
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Andy Greenberg - 2019
Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes became ever more brazen, eventually leading to the first-ever blackouts triggered by hackers. They culminated in the summer of 2017 when malware known as NotPetya was unleashed, compromising, disrupting, and paralyzing some of the world's largest companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. NotPetya spread around the world, inflicting an unprecedented ten billions of dollars in damage--the largest, most penetrating cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in the internet's history: Sandworm. Believed to be working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored hacking force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.From WIRED senior writer Andy Greenberg comes Sandworm, the true story of the desperate hunt to identify and track those attackers. It considers the danger this force poses to our national stability and security. And as the Kremlin's role in manipulating foreign governments and sparking chaos globally comes into greater focus, Sandworm reveals the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield--where the line between digital and physical conflict begins to blur, with world-shaking implications.
Dark Mirror: Edward Snowden and the American Surveillance State
Barton Gellman - 2020
Barton Gellman’s informant called himself ‘Verax’ - the truth-teller. It was only later that Verax unmasked himself as Edward Snowden. But Gellman’s primary role in bringing Snowden’s revelations to light, for which he shared the Pulitzer Prize, is only the beginning of this gripping real-life spy story. Snowden unlocked the door: here Gellman describes what he found on the other side over the course of a years-long journey of investigation. It is also the story of his own escalating battle against unknown digital adversaries after he discovered his own name on a file in the leaked document trove and realised that he himself was under attack.Through a gripping narrative of paranoia, clandestine operations and jaw-dropping revelations, Dark Mirror delineates in full for the first time the hidden superstructure that connects government espionage with Silicon Valley. Who is spying on us and why? Here are the answers.©2020 Barton Gellman (P)2020 Penguin Audio
Making Beaded Jewelry: 11 Free Seed Bead Patterns and Projects
Prime Publishing - 2014
So grab your beading thread and needle, and get ready to stitch up a storm with some stellar seed bead jewelry patterns!Whether you use soft lace or super chunky yarn, you can’t go wrong with these super cool scarf patterns. Try a new stitch or take a chance on a new shape – you’ll love the results and will want to show off your piece to all of your friends. Have fun and get knitting!
WikiLeaks and the Age of Transparency
Micah L. Sifry - 2011
Now we are told a small, international band of renegades armed with nothing more than laptops presents the greatest threat to the U.S. regime since the close of the Cold War. WikiLeaks’ release of a massive trove of secret official documents has riled politicians from across the spectrum. Even noted free-speech advocate Floyd Abrams blames WikiLeaks founder Julian Assange for the certain defeat of federal shield-law legislation protecting journalists. Hyperbole, hysteria? Certainly. Welcome to the Age of Transparency.But political analyst and writer Micah Sifry argues that WikiLeaks is not the whole story: It is a symptom, an indicator of an ongoing generational and philosophical struggle between older, closed systems, and the new open culture of the Internet. Despite Assange’s arrest, the publication of secret documents continues. As Sifry shows, this is part of a larger movement for greater governmental and corporate transparency: “When you combine connectivity with transparency—the ability for more people to see, share and shape what is going on around them—the result is a huge increase in social energy, which is being channeled in all kinds of directions.”
Brian May's Red Special: The Story of the Home-Made Guitar that Rocked Queen and the World
Brian May - 2014
In 1963, Brian May and his father Harold started to build the Red Special, an electric guitar meant to outperform anything commercially made. "My dad and I decided to make an electric guitar. I designed an instrument from scratch, with the intention that it would have a capability beyond anything that was out there, more tunable, with a greater range of pitches and sounds, with a better tremolo, and with a capability of feeding back through the air in a 'good' way'." (Brian May). Brian used the Red Special guitar on every Queen and solo album that he recorded and at the vast majority of his live performances: the roof of Buckingham Palace, Live Aid, the closing ceremony of the London 2012 Olympics . . . and beyond. Here, Brian talks about his one-of-a-kind instrument, from its creation on. Along with original diagrams, sketches, and notes, May has included a great selection of photographs of himself with the guitar, in action from the last 40 years, and photographs of every stage of the Red Special's creation, which was fully dismantled and photographed inside and out just for this book, as well as close-ups and X-rays, and Brian will be commenting on it all. It is a unique guitar with unique sound. Any fan of Queen, Brian, or electric guitars will find this book utterly fascinating. 200 clr and b&w illus.
Mechanical Metallurgy
George E. Dieter - 1961
It covers the entire scope of mechanical metallurgy, from an understanding of the continuum description of stress and strain, through crystalline and defect mechanisms of flow and fracture, and on to a consideration of major mechanical property tests and the basic metalworking process. It has been updated throughout, SI units have been added, and end-of-chapter study questions are included.
Catching Fire: How Cooking Made Us Human
Richard W. Wrangham - 2009
But in Catching Fire, renowned primatologist Richard Wrangham presents a startling alternative: our evolutionary success is the result of cooking. In a groundbreaking theory of our origins, Wrangham shows that the shift from raw to cooked foods was the key factor in human evolution. when our ancestors adapted to using fire, humanity began.Once our hominid ancestors began cooking their food, the human digestive tract shrank and the brain grew. Time once spent chewing tough raw food could be used instead to hunt and to tend camp. Cooking became the basis for pair bonding and marriage, created the household, and even led to a sexual division of labor.Tracing the contemporary implications of our ancestors' diets, Catching Fire sheds new light on how we came to be the social, intelligent, and sexual species we are today. A pathbreaking new theory of human evolution, Catching Fire will provoke controversy and fascinate anyone interested in our ancient origins--or in our modern eating habits.--from the dustjacket
The Invention of Surgery: A History of Modern Medicine: From the Renaissance to the Implant Revolution
David Schneider - 2020
David Schneider’s The Invention of Surgery is an in-depth biography of the practice that has leapt forward over the centuries from the dangerous guesswork of ancient Greek physicians through the world-changing “implant revolution” of the twentieth century.The Invention of Surgery explains this dramatic progress and highlights the personalities of the discipline's most dynamic historical figures. It links together the lives of the pioneering scientists who first understood what causes disease, how organs become infected or cancerous, and how surgery could powerfully intercede in people’s lives, and then shows how the rise of surgery intersected with many of the greatest medical breakthroughs of the last century, including the evolution of medical education, the transformation of the hospital from a place of dying to a habitation of healing, the development of antibiotics, and the rise of transistors and polymer science.And as Schneider argues, surgery has not finished transforming; new technologies are constantly reinventing both the practice of surgery and the nature of the objects we are permanently implanting in our bodies. Schneider considers these latest developments, asking “What’s next?” and analyzing how our conception of surgery has changed alongside our evolving ideas of medicine, technology, and our bodies.
