Book picks similar to
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon by Kim Zetter
non-fiction
history
technology
nonfiction
George Washington's Secret Six: The Spy Ring That Saved the American Revolution
Brian Kilmeade - 2013
The Culper spies represent all the patriotic Americans who give so much for their country but, because of the nature of their work, will not or cannot take a bow or even talk about their missions. Brian Kilmeade When General George Washington beat a hasty retreat from New York City in August 1776, many thought the American Revolution might soon be over. Instead, Washington rallied thanks in large part to a little-known, top-secret group called the Culper Spy Ring.Washington realized that he could not beat the British with military might, so he recruited a sophisticated and deeply secretive intelligence network to infiltrate New York. So carefully guarded were the members identities that one spy s name was not uncovered until the twentieth century, and one remains unknown today. But by now, historians have discovered enough information about the ring s activities to piece together evidence that these six individuals turned the tide of the war.Drawing on extensive research, Brian Kilmeade and Don Yaeger have painted compelling portraits of George Washington s secret six:Robert Townsend, the reserved Quaker merchant and reporter who headed the Culper Ring, keeping his identity secret even from Washington; Austin Roe, the tavern keeper who risked his employment and his life in order to protect the mission; Caleb Brewster, the brash young longshoreman who loved baiting the British and agreed to ferry messages between Connecticut and New York; Abraham Woodhull, the curmudgeonly (and surprisingly nervous) Long Island bachelor with business and family excuses for traveling to Manhattan; James Rivington, the owner of a posh coffeehouse and print shop where high-ranking British officers gossiped about secret operations; Agent 355, a woman whose identity remains unknown but who seems to have used her wit and charm to coax officers to share vital secrets.In" George Washington s Secret Six," Townsend and his fellow spies finally receive their due, taking their place among the pantheon of heroes of the American Revolution."
Hacking Darwin: Genetic Engineering and the Future of Humanity
Jamie Metzl - 2019
After 3.8 billion years humankind is about to start evolving by new rules...From leading geopolitical expert and technology futurist Jamie Metzl comes a groundbreaking exploration of the many ways genetic-engineering is shaking the core foundations of our lives -- sex, war, love, and death.At the dawn of the genetics revolution, our DNA is becoming as readable, writable, and hackable as our information technology. But as humanity starts retooling our own genetic code, the choices we make today will be the difference between realizing breathtaking advances in human well-being and descending into a dangerous and potentially deadly genetic arms race.Enter the laboratories where scientists are turning science fiction into reality. Look towards a future where our deepest beliefs, morals, religions, and politics are challenged like never before and the very essence of what it means to be human is at play. When we can engineer our future children, massively extend our lifespans, build life from scratch, and recreate the plant and animal world, should we?
The Complete Software Developer's Career Guide: How to Learn Programming Languages Quickly, Ace Your Programming Interview, and Land Your Software Developer Dream Job
John Z. Sonmez - 2017
As John invested in these skills his career took off, and he became a highly paid, highly sought-after developer and consultant. Today John helps more than 1.4 million programmers every year to increase their income by developing this unique blend of skills.
"If you're a developer, green or a veteran, you owe it to yourself to read The Complete Software Developers Career Guide." - Jason Down, Platform Developer, Ontario, Canada
What You Will Learn in This Book How to systematically find and fill the gaps in your technical knowledge so you can face any new challenge with confidence Should you take contract work - or hold out for a salaried position? Which will earn you more, what the tradeoffs are, and how your personality should sway your choice Should you learn JavaScript, C#, Python, C++? How to decide which programming language you should master first Ever notice how every job ever posted requires "3-5 years of experience," which you don't have? Simple solution for this frustrating chicken-and-egg problem that allows you to build legitimate job experience while you learn to code Is earning a computer science degree a necessity - or a total waste of time? How to get a college degree with maximum credibility and minimum debt Coding bootcampssome are great, some are complete scams. How to tell the difference so you don't find yourself cheated out of $10,000 Interviewer tells you, "Dress code is casual around here - the development team wears flipflops." What should you wear? How do you deal with a boss who's a micromanager. Plus how helping your manager with his goals can make you the MVP of your team The technical skills that every professional developer must have - but no one teaches you (most developers are missing some critical pieces, they don't teach this stuff in college, you're expected to just "know" this) An inside look at the recruiting industry. What that "friendly" recruiter really wants from you, how they get paid, and how to avoid getting pigeonholed into a job you'll hate Who Should Read This Book Entry-Level Developers This book will show you how to ensure you have the technical skills your future boss is looking for, create a resume that leaps off a hiring manager's desk, and escape the "no work experience" trap. Mid-Career Developers You'll see how to find and fill in gaps in your technical knowledge, position yourself as the one team member your boss can't live without, and turn those dreaded annual reviews into chance to make an iron-clad case for your salary bump. Senior Developers This book will show you how to become a specialist who can command above-market wages, how building a name for yourself can make opportunities come to you, and how to decide whether consulting or entrepreneurship are paths you should pursue.
Energy: A Human History
Richard Rhodes - 2018
Ultimately, the history of these challenges tells the story of humanity itself. Through an unforgettable cast of characters, Pulitzer Prize-winning author Richard Rhodes explains how wood gave way to coal and coal made room for oil, as we now turn to natural gas, nuclear power, and renewable energy. Rhodes looks back on five centuries of progress, through such influential figures as Queen Elizabeth I, King James I, Benjamin Franklin, Herman Melville, John D. Rockefeller, and Henry Ford. In Energy, Rhodes highlights the successes and failures that led to each breakthrough in energy production; from animal and waterpower to the steam engine, from internal-combustion to the electric motor. He addresses how we learned from such challenges, mastered their transitions, and capitalized on their opportunities. Rhodes also looks at the current energy landscape, with a focus on how wind energy is competing for dominance with cast supplies of coal and natural gas. He also addresses the specter of global warming, and a population hurtling towards ten billion by 2100. Human beings have confronted the problem of how to draw life from raw material since the beginning of time. Each invention, each discovery, each adaptation brought further challenges, and through such transformations, we arrived at where we are today. In Rhodes’s singular style, Energy details how this knowledge of our history can inform our way tomorrow.
All the Shah's Men: An American Coup and the Roots of Middle East Terror
Stephen Kinzer - 2003
The victim was Mohammad Mossadegh, the democratically elected prime minister of Iran. Although the coup seemed a success at first, today it serves as a chilling lesson about the dangers of foreign intervention.In this book, veteran New York Times correspondent Stephen Kinzer gives the first full account of this fateful operation. His account is centered around an hour-by-hour reconstruction of the events of August 1953, and concludes with an assessment of the coup's "haunting and terrible legacy."Operation Ajax, as the plot was code-named, reshaped the history of Iran, the Middle East, and the world. It restored Mohammad Reza Shah to the Peacock Throne, allowing him to impose a tyranny that ultimately sparked the Islamic Revolution of 1979. The Islamic Revolution, in turn, inspired fundamentalists throughout the Muslim world, including the Taliban and terrorists who thrived under its protection."It is not far-fetched," Kinzer asserts in this book, "to draw a line from Operation Ajax through the Shah's repressive regime and the Islamic Revolution to the fireballs that engulfed the World Trade Center in New York."Drawing on research in the United States and Iran, and using material from a long-secret CIA report, Kinzer explains the background of the coup and tells how it was carried out. It is a cloak-and-dagger story of spies, saboteurs, and secret agents. There are accounts of bribes, staged riots, suitcases full of cash, and midnight meetings between the Shah and CIA agent Kermit Roosevelt, who was smuggled in and out of the royal palace under a blanket in the back seat of a car. Roosevelt,the grandson of President Theodore Roosevelt, was a real-life James Bond in an era when CIA agents operated mainly by their wits. After his first coup attempt failed, he organized a second attempt that succeeded three days later.The colorful cast of characters includes the terrified young Shah, who fled his country at the first sign of trouble; General H. Norman Schwarzkopf, father of the Gulf War commander and the radio voice of "Gang Busters," who flew to Tehran on a secret mission that helped set the coup in motion; and the fiery Prime Minister Mossadegh, who outraged the West by nationalizing the immensely profitable Anglo-Iranian Oil Company. The British, outraged by the seizure of their oil company, persuaded President Dwight Eisenhower that Mossadegh was leading Iran toward Communism. Eisenhower and Prime Minister Winston Churchill of Great Britain became the coup's main sponsors.Brimming with insights into Middle Eastern history and American foreign policy, this book is an eye-opening look at an event whose unintended consequences - Islamic revolution and violent anti-Americanism--have shaped the modern world. As the United States assumes an ever-widening role in the Middle East, it is essential reading.
Directorate S: The C.I.A. and America's Secret Wars in Afghanistan and Pakistan
Steve Coll - 2018
While the US was trying to quell extremists, a highly secretive and compartmentalized wing of I.S.I., known as "Directorate S," was covertly training, arming, and seeking to legitimize the Taliban, in order to enlarge Pakistan's sphere of influence. After 9/11, when fifty-nine countries, led by the U. S., deployed troops or provided aid to Afghanistan in an effort to flush out the Taliban and Al Qaeda, the U.S. was set on an invisible slow-motion collision course with Pakistan.Today we know that the war in Afghanistan would falter badly because of military hubris at the highest levels of the Pentagon, the drain on resources and provocation in the Muslim world caused by the U.S.-led invasion of Iraq, and corruption. But more than anything, as Coll makes painfully clear, the war in Afghanistan was doomed because of the failure of the United States to apprehend the motivations and intentions of I.S.I.'s "Directorate S". This was a swirling and shadowy struggle of historic proportions, which endured over a decade and across both the Bush and Obama administrations, involving multiple secret intelligence agencies, a litany of incongruous strategies and tactics, and dozens of players, including some of the most prominent military and political figures. A sprawling American tragedy, the war was an open clash of arms but also a covert melee of ideas, secrets, and subterranean violence. Coll excavates this grand battle, which took place away from the gaze of the American public. With unsurpassed expertise, original research, and attention to detail, he brings to life a narrative at once vast and intricate, local and global, propulsive and painstaking. This is the definitive explanation of how America came to be so badly ensnared in an elaborate, factional, and seemingly interminable conflict in South Asia. Nothing less than a forensic examination of the personal and political forces that shape world history, Directorate S is a complete masterpiece of both investigative and narrative journalism.
Threat Modeling: Designing for Security
Adam Shostack - 2014
Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
The Alchemy of Air: A Jewish Genius, a Doomed Tycoon, and the Scientific Discovery That Fed the World but Fueled the Rise of Hitler
Thomas Hager - 2008
Mass starvation, long predicted for the fast-growing population, was about to become a reality. A call went out to the world’s scientists to find a solution. This is the story of the two enormously gifted, fatally flawed men who found it: the brilliant, self-important Fritz Haber and the reclusive, alcoholic Carl Bosch. Together they discovered a way to make bread out of air, built city-sized factories, controlled world markets, and saved millions of lives. Their invention continues to feed us today; without it, more than two billion people would starve.But their epochal triumph came at a price we are still paying. The Haber-Bosch process was also used to make the gunpowder and high explosives that killed millions during the two world wars. Both men were vilified during their lives; both, disillusioned and disgraced, died tragically. Today we face the other unintended consequences of their discovery—massive nitrogen pollution and a growing pandemic of obesity.The Alchemy of Air is the extraordinary, previously untold story of two master scientists who saved the world only to lose everything and of the unforseen results of a discovery that continues to shape our lives in the most fundamental and dramatic of ways.
Bitcoin Billionaires: A True Story of Genius, Betrayal, and Redemption
Ben Mezrich - 2019
While nursing their wounds in Ibiza, they accidentally run into an eccentric character who tells them about a brand-new idea: cryptocurrency. Immersing themselves in what is then an obscure and sometimes sinister world, they begin to realize “crypto” is, in their own words, "either the next big thing or total bulls--t." There’s nothing left to do but make a bet.From the Silk Road to the halls of the Securities and Exchange Commission, Bitcoin Billionaires will take us on a wild and surprising ride while illuminating a tantalizing economic future. On November 26, 2017, the Winklevoss brothers became the first bitcoin billionaires. Here’s the story of how they got there—as only Ben Mezrich could tell it.
The Internet of Money
Andreas M. Antonopoulos - 2016
Acclaimed information-security expert and author of Mastering Bitcoin, Andreas M. Antonopoulos examines and contextualizes the significance of bitcoin through a series of essays spanning the exhilarating maturation of this technology. Bitcoin, a technological breakthrough quietly introduced to the world in 2008, is transforming much more than finance. Bitcoin is disrupting antiquated industries to bring financial independence to billions worldwide. In this book, Andreas explains why bitcoin is a financial and technological evolution with potential far exceeding the label “digital currency.” Andreas goes beyond exploring the technical functioning of the bitcoin network by illuminating bitcoin’s philosophical, social, and historical implications. As the internet has essentially transformed how people around the world interact and has permanently impacted our lives in ways we never could have imagined, bitcoin -- the internet of money -- is fundamentally changing our approach to solving social, political, and economic problems through decentralized technology.
Free as in Freedom: Richard Stallman's Crusade for Free Software
Sam Williams - 2002
It examines Stallman's unique personality and how that personality has been at turns a driving force and a drawback in terms of the movement's overall success.Free as in Freedom examines one man's 20-year attempt to codify and communicate the ethics of 1970s era "hacking" culture in such a way that later generations might easily share and build upon the knowledge of their computing forebears. The book documents Stallman's personal evolution from teenage misfit to prescient adult hacker to political leader and examines how that evolution has shaped the free software movement. Like Alan Greenspan in the financial sector, Richard Stallman has assumed the role of tribal elder within the hacking community, a community that bills itself as anarchic and averse to central leadership or authority. How did this paradox come about? Free as in Freedom provides an answer. It also looks at how the latest twists and turns in the software marketplace have diminished Stallman's leadership role in some areas while augmenting it in others.Finally, Free as in Freedom examines both Stallman and the free software movement from historical viewpoint. Will future generations see Stallman as a genius or crackpot? The answer to that question depends partly on which side of the free software debate the reader currently stands and partly upon the reader's own outlook for the future. 100 years from now, when terms such as "computer," "operating system" and perhaps even "software" itself seem hopelessly quaint, will Richard Stallman's particular vision of freedom still resonate, or will it have taken its place alongside other utopian concepts on the 'ash-heap of history?'
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Patrick Engebretson - 2011
No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate.Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phasesWritten by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State UniversityUtilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
Richard Bejtlich - 2013
The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.
Forensics: What Bugs, Burns, Prints, DNA and More Tell Us About Crime
Val McDermid - 2014
To the right listener, they tell us all about themselves: where they came from, how they lived, how they died - and who killed them. Forensic scientists can unlock the mysteries of the past and help justice to be done using the messages left by a corpse, a crime scene or the faintest of human traces. Forensics uncovers the secrets of forensic medicine, drawing on interviews with top-level professionals, ground-breaking research and Val McDermid's own experience to lay bare the secrets of this fascinating science. And, along the way, she wonders at how maggots collected from a corpse can help determine time of death, how a DNA trace a millionth the size of a grain of salt can be used to convict a killer and how a team of young Argentine scientists led by a maverick American anthropologist uncovered the victims of a genocide.In her crime novels, Val McDermid has been solving complex crimes and confronting unimaginable evil for years. Now, she's looking at the people who do it for real, and real crime scenes. It's a journey that will take her to war zones, fire scenes and autopsy suites, and bring her into contact with extraordinary bravery and wickedness, as she traces the history of forensics from its earliest beginnings to the cutting-edge science of the modern day.
I'm Feeling Lucky: The Confessions of Google Employee Number 59
Douglas Edwards - 2011
No academic analysis or bystander’s account can capture it. Now Doug Edwards, Employee Number 59, offers the first inside view of Google, giving readers a chance to fully experience the bizarre mix of camaraderie and competition at this phenomenal company. Edwards, Google’s first director of marketing and brand management, describes it as it happened. We see the first, pioneering steps of Larry Page and Sergey Brin, the company’s young, idiosyncratic partners; the evolution of the company’s famously nonhierarchical structure (where every employee finds a problem to tackle or a feature to create and works independently); the development of brand identity; the races to develop and implement each new feature; and the many ideas that never came to pass. Above all, Edwards—a former journalist who knows how to write—captures the “Google Experience,” the rollercoaster ride of being part of a company creating itself in a whole new universe. I’m Feeling Lucky captures for the first time the unique, self-invented, yet profoundly important culture of the world’s most transformative corporation.