Book picks similar to
CRACK99: The Takedown of a $100 Million Chinese Software Pirate by David Locke Hall
non-fiction
true-crime
nonfiction
history
Googled: The End of the World as We Know It
Ken Auletta - 2009
This is a ride on the Google wave, and the fullest account of how it formed and crashed into traditional media businesses. With unprecedented access to Google's founders and executives, as well as to those in media who are struggling to keep their heads above water, Ken Auletta reveals how the industry is being disrupted and redefined.Auletta goes inside Google's closed-door meetings, introducing Google's notoriously private founders, Larry Page and Sergey Brin, as well as those who work with - and against - them. In Googled, the reader discovers the 'secret sauce' of the company's success and why the worlds of 'new' and 'old' media often communicate as if residents of different planets. It may send chills down traditionalists' spines, but it's a crucial roadmap to the future of media business: the Google story may well be the canary in the coal mine.Googled is candid, objective and authoritative. Crucially, it's not just a history or reportage: it's ahead of the curve and unlike any other Google books, which tend to have been near-histories, somewhat starstruck, now out of date or which fail to look at the full synthesis of business and technology.
Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance
Julia Angwin - 2014
We are being watched.We see online ads from websites we've visited, long after we've moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what's in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines.In Dragnet Nation, award-winning investigative journalist Julia Angwin reports from the front lines of America's surveillance economy, offering a revelatory and unsettling look at how the government, private companies, and even criminals use technology to indiscriminately sweep up vast amounts of our personal data. In a world where we can be watched in our own homes, where we can no longer keep secrets, and where we can be impersonated, financially manipulated, or even placed in a police lineup, Angwin argues that the greatest long-term danger is that we start to internalize the surveillance and censor our words and thoughts, until we lose the very freedom that makes us unique individuals. Appalled at such a prospect, Angwin conducts a series of experiments to try to protect herself, ranging from quitting Google to carrying a "burner" phone, showing how difficult it is for an average citizen to resist the dragnets' reach.Her book is a cautionary tale for all of us, with profound implications for our values, our society, and our very selves.
Stealing the Network: How to Own a Shadow
Johnny Long - 2007
Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. . The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles . The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth . Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries
Wizard: The Life and Times of Nikola Tesla: Biography of a Genius
Marc J. Seifer - 1996
Based on original material and previously unavailable documents, this acclaimed book is the definitive biography of the man considered by many to be the founding father of modern electrical technology. Among Tesla's creations were the channeling of alternating current, fluorescent and neon lighting, wireless telegraphy, and the giant turbines that harnessed the power of Niagara Falls.
How Music Got Free: The End of an Industry, the Turn of the Century, and the Patient Zero of Piracy
Stephen Richard Witt - 2015
It’s about the greatest pirate in history, the most powerful executive in the music business, a revolutionary invention and an illegal website four times the size of the iTunes Music Store. Journalist Stephen Witt traces the secret history of digital music piracy, from the German audio engineers who invented the mp3, to a North Carolina compact-disc manufacturing plant where factory worker Dell Glover leaked nearly two thousand albums over the course of a decade, to the high-rises of midtown Manhattan where music executive Doug Morris cornered the global market on rap, and, finally, into the darkest recesses of the Internet.Through these interwoven narratives, Witt has written a thrilling book that depicts the moment in history when ordinary life became forever entwined with the world online — when, suddenly, all the music ever recorded was available for free. In the page-turning tradition of writers like Michael Lewis and Lawrence Wright, Witt’s deeply-reported first book introduces the unforgettable characters—inventors, executives, factory workers, and smugglers—who revolutionized an entire artform, and reveals for the first time the secret underworld of media pirates that transformed our digital lives.An irresistible never-before-told story of greed, cunning, genius, and deceit, How Music Got Free isn’t just a story of the music industry—it’s a must-read history of the Internet itself.
Fentanyl, Inc.: How Rogue Chemists Are Creating the Deadliest Wave of the Opioid Epidemic
Ben Westhoff - 2019
is the first deep-dive investigation of a hazardous and illicit industry that has created a worldwide epidemic, ravaging communities and overwhelming and confounding government agencies that are challenged to combat it. "A whole new crop of chemicals is radically changing the recreational drug landscape," writes Ben Westhoff. "These are known as Novel Psychoactive Substances (NPS) and they include replacements for known drugs like heroin, cocaine, ecstasy, and marijuana. They are synthetic, made in a laboratory, and are much more potent than traditional drugs"--and all-too-often tragically lethal. Drugs like fentanyl, K2, and Spice--and those with arcane acronyms like 25i-NBOMe-- were all originally conceived in legitimate laboratories for proper scientific and medicinal purposes. Their formulas were then hijacked and manufactured by rogue chemists, largely in China, who change their molecular structures to stay ahead of the law, making the drugs' effects impossible to predict. Westhoff has infiltrated this shadowy world, becoming the first journalist to report from inside an illicit Chinese fentanyls lab and providing startling and original reporting on how China's vast chemical industry operates, and how the Chinese government subsidizes it. He tracks down the little-known scientists who invented these drugs and inadvertently killed thousands, as well as a mysterious drug baron who turned the law upside down in his home country of New Zealand. Poignantly, Westhoff chronicles the lives of addicted users and dealers, families of victims, law enforcement officers, and underground drug awareness organizers in the U.S. and Europe. Together they represent the shocking and riveting full anatomy of a calamity we are just beginning to understand. From its depths, as Westhoff relates, are emerging new strategies that may provide essential long-term solutions to the drug crisis that has affected so many.
Accessory to War: The Unspoken Alliance Between Astrophysics and the Military
Neil deGrasse Tyson - 2018
Spanning early celestial navigation to satellite-enabled warfare, Accessory to War is a richly researched and provocative examination of the intersection of science, technology, industry, and power that will introduce Tyson’s millions of fans to yet another dimension of how the universe has shaped our lives and our world.
Cypherpunks: Freedom and the Future of the Internet
Julian Assange - 2012
Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us. Among the topics addressed are: Do Facebook and Google constitute "the greatest surveillance machine that ever existed," perpetually tracking our location, our contacts and our lives? Far from being victims of that surveillance, are most of us willing collaborators? Are there legitimate forms of surveillance, for instance in relation to the "Four Horsemen of the Infopocalypse" (money laundering, drugs, terrorism and pornography)? And do we have the ability, through conscious action and technological savvy, to resist this tide and secure a world where freedom is something which the Internet helps bring about?The harassment of WikiLeaks and other Internet activists, together with attempts to introduce anti-file sharing legislation such as SOPA and ACTA, indicate that the politics of the Internet have reached a crossroads. In one direction lies a future that guarantees, in the watchwords of the cypherpunks, "privacy for the weak and transparency for the powerful"; in the other lies an Internet that allows government and large corporations to discover ever more about internet users while hiding their own activities. Assange and his co-discussants unpick the complex issues surrounding this crucial choice with clarity and engaging enthusiasm.
Social Engineering: The Art of Human Hacking
Christopher Hadnagy - 2010
Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.Examines social engineering, the science of influencing atarget to perform a desired task or divulge informationArms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem accessReveals vital steps for preventing social engineeringthreatsSocial Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages.
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Michal Zalewski - 2005
Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.
I'm Feeling Lucky: The Confessions of Google Employee Number 59
Douglas Edwards - 2011
No academic analysis or bystander’s account can capture it. Now Doug Edwards, Employee Number 59, offers the first inside view of Google, giving readers a chance to fully experience the bizarre mix of camaraderie and competition at this phenomenal company. Edwards, Google’s first director of marketing and brand management, describes it as it happened. We see the first, pioneering steps of Larry Page and Sergey Brin, the company’s young, idiosyncratic partners; the evolution of the company’s famously nonhierarchical structure (where every employee finds a problem to tackle or a feature to create and works independently); the development of brand identity; the races to develop and implement each new feature; and the many ideas that never came to pass. Above all, Edwards—a former journalist who knows how to write—captures the “Google Experience,” the rollercoaster ride of being part of a company creating itself in a whole new universe. I’m Feeling Lucky captures for the first time the unique, self-invented, yet profoundly important culture of the world’s most transformative corporation.
Rise of the Machines: A Cybernetic History
Thomas Rid - 2016
Rise of the Machines reclaims the spectacular story of cybernetics, one of the twentieth century’s pivotal ideas.Springing from the mind of mathematician Norbert Wiener amid the devastation of World War II, the cybernetic vision underpinned a host of seductive myths about the future of machines. Cybernetics triggered blissful cults and military gizmos, the Whole Earth Catalog and the air force’s foray into virtual space, as well as crypto-anarchists fighting for internet freedom.In Rise of the Machines, Thomas Rid draws on unpublished sources—including interviews with hippies, anarchists, sleuths, and spies—to offer an unparalleled perspective into our anxious embrace of technology.
The Death Of Expertise: The Campaign Against Established Knowledge and Why it Matters
Thomas M. Nichols - 2017
While this has had the positive effect of equalizing access to knowledge, it also has lowered the bar on what depth of knowledge is required to consider oneself an "expert." A cult of anti-expertise sentiment has coincided with anti-intellectualism, resulting in massively viral yet poorly informed debates ranging from the anti-vaccination movement to attacks on GMOs. This surge in intellectual egalitarianism has altered the landscape of debates-all voices are equal, and "fact" is a subjective term. Browsing WebMD puts one on equal footing with doctors, and Wikipedia allows all to be foreign policy experts, scientists, and more. As Tom Nichols shows in The Death of Expertise, there are a number of reasons why this has occurred-ranging from easy access to Internet search engines to a customer satisfaction model within higher education. The product of these interrelated trends, Nichols argues, is a pervasive distrust of expertise among the public coinciding with an unfounded belief among non-experts that their opinions should have equal standing with those of the experts. The experts are not always right, of course, and Nichols discusses expert failure. The crucial point is that bad decisions by experts can and have been effectively challenged by other well-informed experts. The issue now is that the democratization of information dissemination has created an army of ill-informed citizens who denounce expertise.When challenged, non-experts resort to the false argument that the experts are often wrong. Though it may be true, but the solution is not to jettison expertise as an ideal; it is to improve our expertise. Nichols is certainly not opposed to information democratization, but rather the enlightenment people believe they achieve after superficial internet research. He shows in vivid detail the ways in which this impulse is coursing through our culture and body politic, but the larger goal is to explain the benefits that expertise and rigorous learning regimes bestow upon all societies.
The Mobile Wave: How Mobile Intelligence Will Change Everything
Michael Saylor - 2012
Saylor, CEO of MicroStrategy, brings The Mobile Wave, a ground-breaking analysis of the impact of mobile intelligence--the fifth wave of computer technology. The Mobile Wave argues that the changes brought by mobile computing are so big and widespread that it's impossible for us to see it all, even though we are all immersed in it. Saylor explains that the current generation of mobile smart phones and tablet computers has set the stage to become the universal computing platform for the world. In the hands of billions of people and accessible anywhere and anytime, mobile computers are poised to become an appendage of the human being and an essential tool for modern life. With the perspective of a historian, the precision of a technologist, and the pragmatism of a CEO, Saylor provides a panoramic view of the future mobile world. He describes how: A Harvard education will be available to anyone with the touch of a screen.Cash will become virtual software and crime proof. Cars, homes, fruit, animals, and more will be tagged so they can tell you about themselves. Buying an item will be as easy as pointing our mobile device to scan and pay.Land and capital will become more of a liability than an asset.Social mobile media will push all businesses to think and act like software companies.Employment will shift as more service-oriented jobs are automated by mobile software.Products, businesses, industries, economies, and even society will be altered forever as the Mobile wave washes over us and changes the landscape. With so much change, The Mobile Wave is a guidebook for individuals, business leaders, and public figures who must navigate the new terrain as mobile intelligence changes everything.
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
Bill Blunden - 2009
Adopting an approach that favors full disclosure, The Rootkit Arsenal presents the most accessible, timely, and complete coverage of rootkit technology. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented.The spectrum of topics covered includes how to:* Hook kernel structures on multi-processor systems* Use a kernel debugger to reverse system internals* Inject call gates to create a back door into Ring-0* Use detour patches to sidestep group policy* Modify privilege levels on Vista by altering kernel objects* Utilize bootkit technology* Defeat live incident response and post-mortem forensics* Implement code armoring to protect your deliverables* Establish covert channels using the WSK and NDIS 6.0