How the Internet Happened: From Netscape to the iPhone


Brian McCullough - 2018
    In How the Internet Happened, he chronicles the whole fascinating story for the first time, beginning in a dusty Illinois basement in 1993, when a group of college kids set off a once-in-an-epoch revolution with what would become the first “dotcom.”Depicting the lives of now-famous innovators like Netscape’s Marc Andreessen and Facebook’s Mark Zuckerberg, McCullough also reveals surprising quirks and unknown tales as he tracks both the technology and the culture around the internet’s rise. Cinematic in detail and unprecedented in scope, the result both enlightens and informs as it draws back the curtain on the new rhythm of disruption and innovation the internet fostered, and helps to redefine an era that changed every part of our lives.

Life Undercover: Coming of Age in the CIA


Amaryllis Fox - 2019
    Amaryllis Fox's memoir tells the story of her ten years in the most elite clandestine ops unit of the CIA, hunting the world's most dangerous terrorists in sixteen countries while marrying and giving birth to a daughter.

Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web


Tim Berners-Lee - 1999
    Named one of the greatest minds of the 20th century by Time, Tim Berners-Lee is responsible for one of that century's most important advancements: the world wide web.  Now, this low-profile genius - who never personally profited from his invention - offers a compelling portrait of his invention.  He reveals the Web's origins and the creation of the now ubiquitous http and www acronyms and shares his views on such critical issues as censorship, privacy, the increasing power of software companies, and the need to find the ideal balance between commercial and social forces.  He offers insights into the true nature of the Web, showing readers how to use it to its fullest advantage.  And he presents his own plan for the Web's future, calling for the active support and participation of programmers, computer manufacturers, and social organizations to manage and maintain this valuable resource so that it can remain a powerful force for social change and an outlet for individual creativity.

The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power


Shoshana Zuboff - 2018
    The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth.Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification."The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit--at the expense of democracy, freedom, and our human future.With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future--if we let it.Table of contentsINTRODUCTION1. Home or exile in the digital futureI. THE FOUNDATIONS OF SURVEILLANCE CAPITALISM2. August 9, 2011: Setting the stage for Surveillance Capitalism3. The discovery of behavioral surplus4. The moat around the castle5. The elaboration of Surveillance Capitalism: Kidnap, corner, compete6. Hijacked: The division of learning in societyII. THE ADVANCE OF SURVEILLANCE CAPITALISM7. The reality business8. Rendition: From experience to data9. Rendition from the depths10. Make them dance11. The right to the future tenseIII. INSTRUMENTARIAN POWER FOR A THIRD MODERNITY12. Two species of power13. Big Other and the rise of instrumentarian power14. A utopia of certainty15, The instrumentarian collective16. Of life in the hive17. The right to sanctuaryCONCLUSION18. A coup from aboveAcknowledgementsAbout the authorDetailed table of contentsNotesIndex

The Triple Agent: The al-Qaeda Mole who Infiltrated the CIA


Joby Warrick - 2011
      In December 2009, a group of the CIA’s top terrorist hunters gathered at a secret base in Khost, Afghanistan, to greet a rising superspy: Humam Khalil al-Balawi, a Jordanian double-agent who infiltrated the upper ranks of al-Qaeda. For months, he had sent shocking revelations from inside the terrorist network and now promised to help the CIA assassinate Osama bin Laden’s top deputy. Instead, as he stepped from his car, he detonated a thirty-pound bomb strapped to his chest, instantly killing seven CIA operatives, the agency’s worst loss of life in decades.   In The Triple Agent, Pulitzer Prize–winning reporter Joby Warrick takes us deep inside the CIA’s secret war against al-Qaeda, a war that pits robotic planes and laser-guided missiles against a cunning enemy intent on unleashing carnage in American cities. Flitting precariously between the two sides was Balawi, a young man with extraordinary gifts who managed to win the confidence of hardened terrorists as well as veteran spymasters. With his breathtaking accounts from inside al-Qaeda’s lair, Balawi appeared poised to become America’s greatest double-agent in half a century—but he was not at all what he seemed. Combining the powerful momentum of Black Hawk Down with the institutional insight of Jane Mayer’s The Dark Side, Warrick takes the readers on a harrowing journey from the slums of Amman to the inner chambers of the White House in an untold true story of miscalculation, deception, and revenge.

Bottle of Lies: The Inside Story of the Generic Drug Boom


Katherine Eban - 2019
    Drawing on exclusive accounts from whistleblowers and regulators, as well as thousands of pages of confidential FDA documents, Eban reveals an industry where fraud is rampant, companies routinely falsify data, and executives circumvent almost every principle of safe manufacturing to minimize cost and maximize profit, confident in their ability to fool inspectors. Meanwhile, patients unwittingly consume medicine with unpredictable and dangerous effects.The story of generic drugs is truly global. It connects middle America to China, India, sub-Saharan Africa and Brazil, and represents the ultimate litmus test of globalization: what are the risks of moving drug manufacturing offshore, and are they worth the savings? A decade-long investigation with international sweep, high-stakes brinkmanship and big money at its core, Bottle of Lies reveals how the world’s greatest public-health innovation has become one of its most astonishing swindles.

Army of None: Autonomous Weapons and the Future of War


Paul Scharre - 2018
    Today around the globe, at least thirty nations have weapons that can search for and destroy enemy targets all on their own. Paul Scharre, a leading expert in next-generation warfare, describes these and other high tech weapons systems—from Israel’s Harpy drone to the American submarine-hunting robot ship Sea Hunter—and examines the legal and ethical issues surrounding their use. “A smart primer to what’s to come in warfare” (Bruce Schneier), Army of None engages military history, global policy, and cutting-edge science to explore the implications of giving weapons the freedom to make life and death decisions. A former soldier himself, Scharre argues that we must embrace technology where it can make war more precise and humane, but when the choice is life or death, there is no replacement for the human heart.

Empire of Pain: The Secret History of the Sackler Dynasty


Patrick Radden KeefePatrick Radden Keefe - 2021
    The Sackler name adorns the walls of many storied institutions: Harvard, the Metropolitan Museum of Art, Oxford, the Louvre. They are one of the richest families in the world, known for their lavish donations to the arts and sciences. The source of the family fortune was vague, however, until it emerged that the Sacklers were responsible for making and marketing OxyContin, a blockbuster painkiller that was a catalyst for the opioid crisis.Empire of Pain is a masterpiece of narrative reporting and writing, exhaustively documented and ferociously compelling.

Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World


Don Tapscott - 2016
    But it is much more than that, too. It is a public ledger to which everyone has access, but which no single person controls. It allows for companies and individuals to collaborate with an unprecedented degree of trust and transparency. It is cryptographically secure, but fundamentally open. And soon it will be everywhere.In Blockchain Revolution, Don and Alex Tapscott reveal how this game-changing technology will shape the future of the world economy, dramatically improving everything from healthcare records to online voting, and from insurance claims to artist royalty payments. Brilliantly researched and highly accessible, this is the essential text on the next major paradigm shift. Read it, or be left behind.

Reversing: Secrets of Reverse Engineering


Eldad Eilam - 2005
    The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into disassembly-code-level reverse engineering-and explaining how to decipher assembly language

Argo: How the CIA & Hollywood Pulled Off the Most Audacious Rescue in History


Antonio J. Méndez - 2012
    Beaneath this crisis another shocking story was known by only a select few: six Americans escaped the embassy and hid within a city roiling with suspicion and fear. A top-level CIA officer named Antonio Mendez devised an ingenious yet incredibly risky plan to rescue them before they were detected. Disguising himself as a Hollywood producer, and supported by a cast of expert forgers, deep-cover CIA operatives, foreign agents, and Hollywood special-effects artists, Mendez traveled to Tehran under the guise of scouting locations for a fake science fiction film called "Argo." While pretending to find the ideal film backdrops, Mendez and a colleague succeeded in contacting the escapees and eventually smuggled them out of Iran.After more than three decades, Antonio Mendez finally details the extraordinarily complex and dangerous operation he led. A riveting story of secret identities, international intrigue, and good old-fashioned American ingenuity, Argo is the pulse-pounding account of the history-making collusion between Hollywood and high-stakes espionage.

Site Reliability Engineering: How Google Runs Production Systems


Betsy Beyer - 2016
    So, why does conventional wisdom insist that software engineers focus primarily on the design and development of large-scale computing systems?In this collection of essays and articles, key members of Google's Site Reliability Team explain how and why their commitment to the entire lifecycle has enabled the company to successfully build, deploy, monitor, and maintain some of the largest software systems in the world. You'll learn the principles and practices that enable Google engineers to make systems more scalable, reliable, and efficient--lessons directly applicable to your organization.This book is divided into four sections: Introduction--Learn what site reliability engineering is and why it differs from conventional IT industry practicesPrinciples--Examine the patterns, behaviors, and areas of concern that influence the work of a site reliability engineer (SRE)Practices--Understand the theory and practice of an SRE's day-to-day work: building and operating large distributed computing systemsManagement--Explore Google's best practices for training, communication, and meetings that your organization can use

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security


Tobias Klein - 2011
    In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs—or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting.Along the way you'll learn how to:Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws Develop proof of concept code that verifies the security flaw Report bugs to vendors or third party brokersA Bug Hunter's Diary is packed with real-world examples of vulnerable code and the custom programs used to find and test bugs. Whether you're hunting bugs for fun, for profit, or to make the world a safer place, you'll learn valuable new skills by looking over the shoulder of a professional bug hunter in action.

The Billion Dollar Spy: A True Story of Cold War Espionage and Betrayal


David E. Hoffman - 2015
    A man on the curb handed him an envelope whose contents stunned U.S. intelligence: details of top-secret Soviet research and developments in military technology that were totally unknown to the United States. In the years that followed, the man, Adolf Tolkachev, an engineer in a Soviet military design bureau, used his high-level access to hand over tens of thousands of pages of technical secrets. His revelations allowed America to reshape its weapons systems to defeat Soviet radar on the ground and in the air, giving the United States near total superiority in the skies over Europe.One of the most valuable spies to work for the United States in the four decades of global confrontation with the Soviet Union, Tolkachev took enormous personal risks—but so did the Americans. The CIA had long struggled to recruit and run agents in Moscow, and Tolkachev was a singular breakthrough. Using spy cameras and secret codes as well as face-to-face meetings in parks and on street corners, Tolkachev and his handlers succeeded for years in eluding the feared KGB in its own backyard, until the day came when a shocking betrayal put them all at risk.Drawing on previously secret documents obtained from the CIA and on interviews with participants, David Hoffman has created an unprecedented and poignant portrait of Tolkachev, a man motivated by the depredations of the Soviet state to master the craft of spying against his own country. Stirring, unpredictable, and at times unbearably tense, The Billion Dollar Spy is a brilliant feat of reporting that unfolds like an espionage thriller.

The Google Story: Inside the Hottest Business, Media and Technology Success of Our Time


David A. Vise - 2005
    The Google Story takes you deep inside the company's wild ride from an idea that struggled for funding in 1998 to a firm that rakes in billions in profits, making Brin and Page the wealthiest young men in America. Based on scrupulous research and extraordinary access to Google, this fast-moving narrative reveals how an unorthodox management style and culture of innovation enabled a search engine to shake up Madison Avenue and Wall Street, scoop up YouTube, and battle Microsoft at every turn. Not afraid of controversy, Google is expanding in Communist China and quietly working on a searchable genetic database, initiatives that test the founders' guiding mantra: DON'T BE EVIL.