Book picks similar to
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon by Kim Zetter
non-fiction
history
technology
nonfiction
What Technology Wants
Kevin Kelly - 2010
Arguing that the processes creating the technium are akin to those of biological evolution, Kelly devotes the opening sections of his exposition to that analogy, maintaining that the technium exhibits a similar tendency toward self-organizing complexity. Having defined the technium, Kelly addresses its discontents, as expressed by the Unabomber (although Kelly admits to trepidation in taking seriously the antitechnology screeds of a murderer) and then as lived by the allegedly technophobic Amish. From his observations and discussions with some Amish people, Kelly extracts some precepts of their attitudes toward gadgets, suggesting folk in the secular world can benefit from the Amish approach of treating tools as servants of self and society rather than as out-of-control masters. Exploring ramifications of technology on human welfare and achievement, Kelly arrives at an optimistic outlook that will interest many, coming, as it does, from the former editor of Wired magazine."Gilbert Taylor, Booklist
A Mind at Play: How Claude Shannon Invented the Information Age
Jimmy Soni - 2017
He constructed a fleet of customized unicycles and a flamethrowing trumpet, outfoxed Vegas casinos, and built juggling robots. He also wrote the seminal text of the digital revolution, which has been called “the Magna Carta of the Information Age.” His discoveries would lead contemporaries to compare him to Albert Einstein and Isaac Newton. His work anticipated by decades the world we’d be living in today—and gave mathematicians and engineers the tools to bring that world to pass.In this elegantly written, exhaustively researched biography, Jimmy Soni and Rob Goodman reveal Claude Shannon’s full story for the first time. It’s the story of a small-town Michigan boy whose career stretched from the era of room-sized computers powered by gears and string to the age of Apple. It’s the story of the origins of our digital world in the tunnels of MIT and the “idea factory” of Bell Labs, in the “scientists’ war” with Nazi Germany, and in the work of Shannon’s collaborators and rivals, thinkers like Alan Turing, John von Neumann, Vannevar Bush, and Norbert Wiener.And it’s the story of Shannon’s life as an often reclusive, always playful genius. With access to Shannon’s family and friends, A Mind at Play brings this singular innovator and creative genius to life.
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Andrew Jaquith - 2007
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index
Python Crash Course: A Hands-On, Project-Based Introduction to Programming
Eric Matthes - 2015
You'll also learn how to make your programs interactive and how to test your code safely before adding it to a project. In the second half of the book, you'll put your new knowledge into practice with three substantial projects: a Space Invaders-inspired arcade game, data visualizations with Python's super-handy libraries, and a simple web app you can deploy online.As you work through Python Crash Course, you'll learn how to: Use powerful Python libraries and tools, including matplotlib, NumPy, and PygalMake 2D games that respond to keypresses and mouse clicks, and that grow more difficult as the game progressesWork with data to generate interactive visualizationsCreate and customize simple web apps and deploy them safely onlineDeal with mistakes and errors so you can solve your own programming problemsIf you've been thinking seriously about digging into programming, Python Crash Course will get you up to speed and have you writing real programs fast. Why wait any longer? Start your engines and code!
The Threat: How the FBI Protects America in the Age of Terror and Trump
Andrew G. McCabe - 2019
McCabe was fired from his position as deputy director of the FBI. President Donald Trump celebrated on Twitter: "Andrew McCabe FIRED, a great day for the hard working men and women of the FBI - A great day for Democracy."In The Threat: How the FBI Protects America in the Age of Terror and Trump, Andrew G. McCabe offers a dramatic and candid account of his career, and an impassioned defense of the FBI's agents, and of the institution's integrity and independence in protecting America and upholding our Constitution.McCabe started as a street agent in the FBI's New York field office, serving under director Louis Freeh. He became an expert in two kinds of investigations that are critical to American national security: Russian organized crime—which is inextricably linked to the Russian state—and terrorism. Under Director Robert Mueller, McCabe led the investigations of major attacks on American soil, including the Boston Marathon bombing, a plot to bomb the New York subways, and several narrowly averted bombings of aircraft. And under James Comey, McCabe was deeply involved in the controversial investigations of the Benghazi attack, the Clinton Foundation's activities, and Hillary Clinton's use of a private email server when she was secretary of state.The Threat recounts in compelling detail the time between Donald Trump's November 2016 election and McCabe's firing, set against a page-turning narrative spanning two decades when the FBI's mission shifted to a new goal: preventing terrorist attacks on Americans. But as McCabe shows, right now the greatest threat to the United States comes from within, as President Trump and his administration ignore the law, attack democratic institutions, degrade human rights, and undermine the U.S. Constitution that protects every citizen.Important, revealing, and powerfully argued, The Threat tells the true story of what the FBI is, how it works, and why it will endure as an institution of integrity that protects America.
Accelerate: Building and Scaling High-Performing Technology Organizations
Nicole Forsgren - 2018
Through four years of groundbreaking research, Dr. Nicole Forsgren, Jez Humble, and Gene Kim set out to find a way to measure software delivery performance—and what drives it—using rigorous statistical methods. This book presents both the findings and the science behind that research. Readers will discover how to measure the performance of their teams, and what capabilities they should invest in to drive higher performance.
Enlightenment Now: The Case for Reason, Science, Humanism, and Progress
Steven Pinker - 2018
Instead, follow the data: In seventy-five jaw-dropping graphs, Pinker shows that life, health, prosperity, safety, peace, knowledge, and happiness are on the rise, not just in the West, but worldwide. This progress is not the result of some cosmic force. It is a gift of the Enlightenment: the conviction that reason and science can enhance human flourishing.Far from being a naïve hope, the Enlightenment, we now know, has worked. But more than ever, it needs a vigorous defense. The Enlightenment project swims against currents of human nature–tribalism, authoritarianism, demonization, magical thinking–which demagogues are all too willing to exploit. Many commentators, committed to political, religious, or romantic ideologies, fight a rearguard action against it. The result is a corrosive fatalism and a willingness to wreck the precious institutions of liberal democracy and global cooperation.With intellectual depth and literary flair, Enlightenment Now makes the case for reason, science, and humanism: the ideals we need to confront our problems and continue our progress.
Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers
John MacCormick - 2012
A simple web search picks out a handful of relevant needles from the world's biggest haystack: the billions of pages on the World Wide Web. Uploading a photo to Facebook transmits millions of pieces of information over numerous error-prone network links, yet somehow a perfect copy of the photo arrives intact. Without even knowing it, we use public-key cryptography to transmit secret information like credit card numbers; and we use digital signatures to verify the identity of the websites we visit. How do our computers perform these tasks with such ease? This is the first book to answer that question in language anyone can understand, revealing the extraordinary ideas that power our PCs, laptops, and smartphones. Using vivid examples, John MacCormick explains the fundamental "tricks" behind nine types of computer algorithms, including artificial intelligence (where we learn about the "nearest neighbor trick" and "twenty questions trick"), Google's famous PageRank algorithm (which uses the "random surfer trick"), data compression, error correction, and much more. These revolutionary algorithms have changed our world: this book unlocks their secrets, and lays bare the incredible ideas that our computers use every day.
What the Dormouse Said: How the Sixties Counterculture Shaped the Personal Computer Industry
John Markoff - 2005
Many accounts of the birth of personal computing have been written, but this is the first close look at the drug habits of the earliest pioneers." --New York TimesMost histories of the personal computer industry focus on technology or business. John Markoff's landmark book is about the culture and consciousness behind the first PCs--the culture being counter- and the consciousness expanded, sometimes chemically. It's a brilliant evocation of Stanford, California, in the 1960s and '70s, where a group of visionaries set out to turn computers into a means for freeing minds and information. In these pages one encounters Ken Kesey and the phone hacker Cap'n Crunch, est and LSD, The Whole Earth Catalog and the Homebrew Computer Lab. What the Dormouse Said is a poignant, funny, and inspiring book by one of the smartest technology writers around.
ISIS: The State of Terror
Jessica Stern - 2015
It has captured the imagination of the global jihadist movement, attracting recruits in unprecedented numbers and wreaking bloody destruction with a sadistic glee that has alienated even the hardcore terrorists of its parent organization, al Qaeda.Jessica Stern and J.M. Berger, two of America’s leading experts on terrorism, dissect the new model for violent extremism that ISIS has leveraged into an empire of death in Iraq and Syria, and an international network that is rapidly expanding in the Middle East, North Africa and around the world.ISIS: The State of Terror traces the ideological innovations that the group deploys to recruit unprecedented numbers of Westerners, the composition of its infamous snuff videos, and the technological tools it exploits on social media to broadcast its atrocities, and its recruiting pitch to the world, including its success at attracting thousands of Western adherents. The authors examine ISIS’s predatory abuse of women and children and its use of horror to manipulate world leaders and its own adherents as it builds its twisted society. The authors offer a much-needed perspective on how world leaders should prioritize and respond to ISIS’s deliberate and insidious provocations.
Too Much and Never Enough: How My Family Created the World's Most Dangerous Man
Mary L. Trump - 2020
Trump and the toxic family that made him, Mary L. Trump, a trained clinical psychologist and Donald’s only niece, shines a bright light on the dark history of their family in order to explain how her uncle became the man who now threatens the world’s health, economic security, and social fabric.Mary Trump spent much of her childhood in her grandparents’ large, imposing house in the heart of Queens, where Donald and his four siblings grew up. She describes a nightmare of traumas, destructive relationships, and a tragic combination of neglect and abuse. She explains how specific events and general family patterns created the damaged man who currently occupies the Oval Office, including the strange and harmful relationship between Fred Trump and his two oldest sons, Fred Jr. and Donald.A first-hand witness to countless holiday meals and family interactions, Mary brings an incisive wit and unexpected humor to sometimes grim, often confounding family events. She recounts in unsparing detail everything from her uncle Donald’s place in the family spotlight and Ivana’s penchant for re-gifting to her grandmother’s frequent injuries and illnesses and the appalling way Donald, Fred Trump’s favorite son, dismissed and derided him when he began to succumb to Alzheimer’s.Numerous pundits, armchair psychologists, and journalists have sought to parse Donald J. Trump’s lethal flaws. Mary L. Trump has the education, insight, and intimate familiarity needed to reveal what makes Donald, and the rest of her clan, tick. She alone can recount this fascinating, unnerving saga, not just because of her insider’s perspective but also because she is the only Trump willing to tell the truth about one of the world’s most powerful and dysfunctional families.
Life in Code: A Personal History of Technology
Ellen Ullman - 2017
In 1997, she wroteClose to the Machine, the now classic and still definitive account of life as a coder at the birth of what would be a sweeping technological, cultural, and financial revolution.The intervening twenty years has seen, among other things, the rise of the Internet, the ubiquity of once unimaginably powerful computers, and the thorough transformation of our economy and society—as Ullman’s clique of socially awkward West Coast geeks became our new elite, elevated for and insulated by a technical mastery that few could achieve.In Life in Code, Ullman presents a series of essays that unlock and explain—and don’t necessarily celebrate—how we got to now, as only she can, with a fluency and expertise that’s unusual in someone with her humanistic worldview, and with the sharp insight and brilliant prose that are uniquely her own. Life in Code is an essential text toward our understanding of the last twenty years—and the next twenty.
Automate the Boring Stuff with Python: Practical Programming for Total Beginners
Al Sweigart - 2014
But what if you could have your computer do them for you?In "Automate the Boring Stuff with Python," you'll learn how to use Python to write programs that do in minutes what would take you hours to do by hand no prior programming experience required. Once you've mastered the basics of programming, you'll create Python programs that effortlessly perform useful and impressive feats of automation to: Search for text in a file or across multiple filesCreate, update, move, and rename files and foldersSearch the Web and download online contentUpdate and format data in Excel spreadsheets of any sizeSplit, merge, watermark, and encrypt PDFsSend reminder emails and text notificationsFill out online formsStep-by-step instructions walk you through each program, and practice projects at the end of each chapter challenge you to improve those programs and use your newfound skills to automate similar tasks.Don't spend your time doing work a well-trained monkey could do. Even if you've never written a line of code, you can make your computer do the grunt work. Learn how in "Automate the Boring Stuff with Python.""
Super Pumped: The Battle for Uber
Mike Isaac - 2019
Uber had catapulted to the top of the tech world, yet for many came to symbolize everything wrong with Silicon Valley.Award-winning New York Times technology correspondent Mike Isaac’s Super Pumped presents the dramatic rise and fall of Uber, set against an era of rapid upheaval in Silicon Valley. Backed by billions in venture capital dollars and led by a brash and ambitious founder, Uber promised to revolutionize the way we move people and goods through the world. A near instant “unicorn,” Uber seemed poised to take its place next to Amazon, Apple, and Google as a technology giant.What followed would become a corporate cautionary tale about the perils of startup culture and a vivid example of how blind worship of startup founders can go wildly wrong. Isaac recounts Uber’s pitched battles with taxi unions and drivers, the company’s toxic internal culture, and the bare-knuckle tactics it devised to overcome obstacles in its quest for dominance. With billions of dollars at stake, Isaac shows how venture capitalists asserted their power and seized control of the startup as it fought its way toward its fateful IPO.Based on hundreds of interviews with current and former Uber employees, along with previously unpublished documents, Super Pumped is a page-turning story of ambition and deception, obscene wealth, and bad behavior that explores how blistering technological and financial innovation culminated in one of the most catastrophic twelve-month periods in American corporate history.
Conspiracy: Peter Thiel, Hulk Hogan, Gawker, and the Anatomy of Intrigue
Ryan Holiday - 2018
Thiel's sexuality had been known to close friends and family, but he didn't consider himself a public figure, and believed the information was private. This post would be the casus belli for a meticulously plotted conspiracy that would end nearly a decade later with a $140 million dollar judgment against Gawker, its bankruptcy and with Nick Denton, Gawker's CEO and founder, out of a job. Only later would the world learn that Gawker's demise was not incidental--it had been masterminded by Thiel.For years, Thiel had searched endlessly for a solution to what he'd come to call the "Gawker Problem." When an unmarked envelope delivered an illegally recorded sex tape of Hogan with his best friend's wife, Gawker had seen the chance for millions of pageviews and to say the things that others were afraid to say. Thiel saw their publication of the tape as the opportunity he was looking for. He would come to pit Hogan against Gawker in a multi-year proxy war through the Florida legal system, while Gawker remained confidently convinced they would prevail as they had over so many other lawsuit--until it was too late. The verdict would stun the world and so would Peter's ultimate unmasking as the man who had set it all in motion. Why had he done this? How had no one discovered it? What would this mean--for the First Amendment? For privacy? For culture?In Holiday's masterful telling of this nearly unbelievable conspiracy, informed by interviews with all the key players, this case transcends the narrative of how one billionaire took down a media empire or the current state of the free press. It's a study in power, strategy, and one of the most wildly ambitious--and successful--secret plots in recent memory.Some will cheer Gawker's destruction and others will lament it, but after reading these pages--and seeing the access the author was given--no one will deny that there is something ruthless and brilliant about Peter Thiel's shocking attempt to shake up the world.