Book picks similar to
Information Warfare Principles and Operations by Edward Waltz


cyber
national-security
other-non-fiction
public-relations-and-manipulation

The Sandman Slim Series Books 1-4


Richard Kadrey - 2013
    Or, if you’re James Stark, you spend eleven years in Hell as a hitman before finally escaping, only to land back in the hell-on-earth that is Los Angeles.Now Stark’s back, and ready for revenge. And absolution, and maybe even love. But when his first stop saddles him with an abusive talking head, Stark discovers that the road to absolution and revenge is much longer than you’d expect, and both Heaven and Hell have their own ideas for his future.Resurrection sucks. Saving the world is worse.Darkly twisted, irreverent, and completely hilarious, the Sandman Slim series is the must-read.Includes: Sandman Slim, Kill the Dead, Aloha From Hell and Devil Said Bang.

Spitfire: Portrait Of A Legend


Leo McKinstry - 2007
    'Hitler knows that he will have to break us in this island or lose the war. If we can stand up to him, all Europe may be free and the life of the world will move forward into broad, sunlit uplands,' said Churchill. The future of Europe depended on Britain. A self-confident Herman Göring thought that it would be only a matter of weeks before his planes had forced Britain to surrender. The courage, resourcefulness and brilliant organisation of the RAF were to prove him wrong. By late September 1940, the RAF had proved invincible, thanks to the Vickers Supermarine Spitfire. It exceeded anything that any other air force possessed. RJ Mitchell, a shy and almost painfully modest engineer, was the genius behind the Spitfire. On the 5th March 1936, following its successful maiden flight, a legend was born.Prize-winning historian Leo McKinstry's vivid history of the Spitfire brings together a rich cast of characters and first hand testimonies. It is a tale full of drama and heroism, of glory and tragedy, with the main protagonist the remarkable plane that played a crucial role in saving Britain.

On Infantry (The Military Profession)


John A. English - 1984
    Its purpose is to provide the reader--whether infantryman or not--with hitherto unavailable insights on the role that infantry plays in the larger battle and how that has helped shape the world that we live in today. Unique aspects of the book include the treatment of technical issues in non-technical language, the extensive use of German and French sources generally unavailable to the English-speaking reader, and the shattering of some long-cherished myths. Combat motivation and combat refusal, the role played by small units (such as the squad and fire team), the role of infantry in the Blitzkrieg, and many other issues often papered over in the literature of infantry are discussed and analyzed in detail in this revised edition.

Barbarians Led by Bill Gates: Microsoft From The Inside: How The World's Richest Corporation Wields Its Power


Jennifer Edstrom - 1998
    District Judge Stanley Sporkin. Teamed with the daughter of one of Bill Gates's closest associates, thirteen-year Microsoft veteran Marlin Eller shows us what it was like at every step along Gates's route to world domination, making all that's been written before seem like a rough guess. If the Justice Department had Eller and Edstrom investigating the current-headline-making antitrust case, they would have on the record many of Microsoft's most respected developers directly contradicting the "authorized" version of events being presented in court. They would know the real scoop on how Windows was developed in the first place, shedding new light on the 1988 Apple v. Microsoft lawsuit over the alleged copying of the Mac. They would even know the real story of how Microsoft killed off Go Corporation, told for the first time by the man who did the deed, Marlin Eller himself. Revealing the smoke-and-mirror deals, the palms greased to help launch a product that didn't exist, and the boneyard of once-thriving competitors targeted by the Gates juggernaut, this book demonstrates with often hilariously damning detail the Microsoft muddle that passes for strategic direction, offset by Gates's uncanny ability to come from behind to crush whoever's on top.

CRACK99: The Takedown of a $100 Million Chinese Software Pirate


David Locke Hall - 2015
    Navy intelligence officer, David Locke Hall was a federal prosecutor when a bizarre-sounding website, CRACK99, came to his attention. It looked like Craigslist on acid, but what it sold was anything but amateurish: thousands of high-tech software products used largely by the military, and for mere pennies on the dollar. Want to purchase satellite tracking software? No problem. Aerospace and aviation simulations? No problem. Communications systems designs? No problem. Software for Marine One, the presidential helicopter? No problem. With delivery times and customer service to rival the world’s most successful e-tailers, anybody, anywhere—including rogue regimes, terrorists, and countries forbidden from doing business with the United States—had access to these goods for any purpose whatsoever.But who was behind CRACK99, and where were they? The Justice Department discouraged potentially costly, risky cases like this, preferring the low-hanging fruit that scored points from politicians and the public. But Hall and his colleagues were determined to find the culprit. They bought CRACK99's products for delivery in the United States, buying more and more to appeal to the budding entrepreneur in the man they identified as Xiang Li. After winning his confidence, they lured him to Saipan—a U.S. commonwealth territory where Hall’s own father had stormed the beaches with the marines during World War II. There they set up an audacious sting that culminated in Xiang Li's capture and imprisonment. The value of the goods offered by CRACK99? A cool $100 million.An eye-opening look at cybercrime and its chilling consequences for national security, CRACK99 reads like a caper that resonates with every amazing detail.

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide


James Michael Stewart - 2015
    This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Four unique 250 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security

Hannibal: The Military Biography of Rome's Greatest Enemy


Richard A. Gabriel - 2011
    What we know of him comes exclusively from Roman historians who had every interest in minimizing his success, exaggerating his failures, and disparaging his character. The charges leveled against Hannibal include greed, cruelty and atrocity, sexual indulgence, and even cannibalism. But even these sources were forced to grudgingly admit to Hannibal’s military genius, if only to make their eventual victory over him appear greater.Yet there is no doubt that Hannibal was the greatest Carthaginian general of the Second Punic War. When he did not defeat them outright, he fought to a standstill the best generals Rome produced, and he sustained his army in the field for sixteen long years without mutiny or desertion. Hannibal was a first-rate tactician, only a somewhat lesser strategist, and the greatest enemy Rome ever faced. When he at last met defeat at the hands of the Roman general Scipio, it was against an experienced officer who had to strengthen and reconfigure the Roman legion and invent mobile tactics in order to succeed. Even so, Scipio’s victory at Zama was against an army that was a shadow of its former self. The battle could easily have gone the other way. If it had, the history of the West would have been changed in ways that can only be imagined. Richard A. Gabriel’s brilliant new biography shows how Hannibal’s genius nearly unseated the Roman Empire.

A Century of Spies: Intelligence in the Twentieth Century


Jeffrey T. Richelson - 1995
    Unrivalled in its scope and as readable as any spy novel, A Century of Spies travels from tsarist Russia and the earliest days of the British Secret Service to the crises and uncertainties of today's post-Cold War world, offering an unsurpassed overview of the role of modern intelligence in every part of the globe. From spies and secret agents to the latest high-tech wizardry in signals and imagery surveillance, it provides fascinating, in-depth coverage of important operations of United States, British, Russian, Israeli, Chinese, German, and French intelligence services, and much more. All the key elements of modern intelligence activity are here. An expert whose books have received high marks from the intelligence and military communities, Jeffrey Richelson covers the crucial role of spy technology from the days of Marconi and the Wright Brothers to today's dazzling array of Space Age satellites, aircraft, and ground stations. He provides vivid portraits of spymasters, spies, and defectors--including Sidney Reilly, Herbert Yardley, Kim Philby, James Angleton, Markus Wolf, Reinhard Gehlen, Vitaly Yurchenko, Jonathan Pollard, and many others. Richelson paints a colorful portrait of World War I's spies and sabateurs, and illuminates the secret maneuvering that helped determine the outcome of the war on land, at sea, and on the diplomatic front; he investigates the enormous importance of intelligence operations in both the European and Pacific theaters in World War II, from the work of Allied and Nazi agents to the black magic of U.S. and British code breakers; and he gives us a complete overview of intelligence during the length of the Cold War, from superpower espionage and spy scandals to covert action and secret wars. A final chapter probes the still-evolving role of intelligence work in the new world of disorder and ethnic conflict, from the high-tech wonders of the Gulf War to the surprising involvement of the French government in industrial espionage. Comprehensive, authoritative, and addictively readable, A Century of Spies is filled with new information on a variety of subjects--from the activities of the American Black Chamber in the 1920s to intelligence collection during the Cuban missile crisis to Soviet intelligence and covert action operations. It is an essential volume for anyone interested in military history, espionage and adventure, and world affairs.

Blockchain: The Beginners Guide to Understanding the Technology Behind Bitcoin & Cryptocurrency (The Future of Money)


Artemis Caro - 2017
    As a result, many people are left with an incomplete understanding of this transformative new technology and its massive implications for the future. The goal of this book is not to plumb the depths of the mathematical wizardry used to code blockchain-based applications, but rather to serve as an introduction to the broader architecture and conceptual background behind blockchain technology. We will take a practical approach, examining how Blockchains are used in the real world. In this short, concise guide you will learn: A Brief History of Blockchain Technology Blockchain Basics: Managing Digital Transactions What is a Distributed Ledger? Blockchain Beyond Bitcoin Implications Of Blockchain: Big Data, Privacy & Personal Data Profiting from Blockchain Technologies Limitations & Challenges of Blockchain The Future of Blockchain For Centuries, people have relied on corrupt Centralized Institutions like banks and Governments to serve as intermediaries when it comes to storing and transacting financial assets. This is ALL About To Change... Make sure you take action and join the Financial Revolution by reading this book!

The Cold War: A Military History


Robert Cowley - 2005
    For nearly half a century, from the end of World War II to the early 1990s, all world events hung in the balance of a simmering dispute between two of the greatest military powers in history. Hundreds of millions of people held their collective breath as the United States and the Soviet Union, two national ideological entities, waged proxy wars to determine spheres of influence–and millions of others perished in places like Korea, Vietnam, and Angola, where this cold war flared hot. Such a consideration of the Cold War–as a military event with sociopolitical and economic overtones–is the crux of this stellar collection of twenty-six essays compiled and edited by Robert Cowley, the longtime editor of MHQ: The Quarterly Journal of Military History. Befitting such a complex and far-ranging period, the volume’s contributing writers cover myriad angles. John Prados, in “The War Scare of 1983,” shows just how close we were to escalating a war of words into a nuclear holocaust. Victor Davis Hanson offers “The Right Man,” his pungent reassessment of the bellicose air-power zealot Curtis LeMay as a man whose words were judged more critically than his actions. The secret war also gets its due in George Feiffer’s “The Berlin Tunnel,” which details the charismatic C.I.A. operative “Big Bill” Harvey’s effort to tunnel under East Berlin and tap Soviet phone lines–and the Soviets’ equally audacious reaction to the plan; while “The Truth About Overflights,” by R. Cargill Hall, sheds light on some of the Cold War’s best-kept secrets. The often overlooked human cost of fighting the Cold War finds a clear voice in “MIA” by Marilyn Elkins, the widow of a Navy airman, who details the struggle to learn the truth about her husband, Lt. Frank C. Elkins, whose A-4 Skyhawk disappeared over Vietnam in 1966. In addition there are profiles of the war’s “front lines”–Dien Bien Phu, the Cuban Missile Crisis, the Bay of Pigs–as well as of prominent military and civil leaders from both sides, including Harry S. Truman, Nikita Khrushchev, Dean Acheson, Gen. Douglas MacArthur, Richard M. Nixon, Gen. Vo Nguyen Giap, and others.Encompassing so many perspectives and events, The Cold War succeeds at an impossible task: illuminating and explaining the history of an undeclared shadow war that threatened the very existence of humankind.From the Hardcover edition.

Mastering Digital SLR Photography


David D. Busch - 2004
    This book uniquely concentrates on creative techniques for the digital SLR photographer. Photography with Digital SLR and "SLR-like" cameras isn't exactly like conventional film SLR photography; nor is it exactly like digital photography with non-SLR cameras. DSLRs have special advantages, special features, and special problems that need to be addressed and embraced. In addition, users of these cameras tend to expect more from their photography and crave the kind of information that will let them wring every ounce of creativity out of their equipment. Anyone who has a Windows PC or Macintosh and a digital SLR camera will find advanced techniques in this book. Readers will cover various aspects of DSLRs including: why DSLRs work best for creative posing for group and individual portraits, using DSLRs to capture close-up scenes on the desktop using the digital camera's special capabilities, how to get great travel photos with a DSLR, and how to archive them when far from a computer.

Half-Safe: A Story of Love, Obsession, and History's Most Insane Around-the-world Adventure


Ben Carlin - 1991
    The vehicle in question was an amphibious jeep developed by the U.S. Army, which Carlin christened Half-Safe, after a deodorant slogan. It was a mechanical mongrel that was supposed to move with equal ease across land and water but in practice wasn't much good for either one. Undaunted, Carlin and his wife Elinore set off across the Atlantic Ocean with dreams of fame and fortune, and of carving a small notch in history. What happened next is one of the most bizarre, remarkable, and forgotten adventure stories of the 20th century. In Half-Safe, author James Nestor endeavors to uncover Ben Carlin's fate and finds a gripping story of love, danger, and extraordinary perseverance that spans three oceans and five continents. Half-Safe takes us from the eye of an Atlantic Ocean hurricane to the sweltering Sahara to the impenetrable jungles of Southeast Asia—and into the mind of a man who could overcome everything but his own demons.

A Burglar's Guide to the City


Geoff Manaugh - 2015
    You'll never see the city the same way again.At the core of A Burglar's Guide to the City is an unexpected and thrilling insight: how any building transforms when seen through the eyes of someone hoping to break into it. Studying architecture the way a burglar would, Geoff Manaugh takes readers through walls, down elevator shafts, into panic rooms, up to the buried vaults of banks, and out across the rooftops of an unsuspecting city.With the help of FBI Special Agents, reformed bank robbers, private security consultants, the L.A.P.D. Air Support Division, and architects past and present, the book dissects the built environment from both sides of the law. Whether picking padlocks or climbing the walls of high-rise apartments, finding gaps in a museum's surveillance routine or discussing home invasions in ancient Rome, A Burglar's Guide to the City has the tools, the tales, and the x-ray vision you need to see architecture as nothing more than an obstacle that can be outwitted and undercut.Full of real-life heists-both spectacular and absurd-A Burglar's Guide to the City ensures readers will never enter a bank again without imagining how to loot the vault or walk down the street without planning the perfect getaway.

Bottled Lightning: Superbatteries, Electric Cars, and the New Lithium Economy


Seth Fletcher - 2011
    Chances are you've got some lithium on your person right now. But aside from powering a mobile twenty first-century lifestyle, the third element on the periodic table may also hold the key to an environmentally sustainable, oil-independent future. From electric cars to a "smart" power grid that can actually store electricity, letting us harness the powers of the sun and the wind and use them when we need them, lithium—a metal half as dense as water, created in the first minutes after the Big Bang and found primarily in some of the most uninhabitable places on earth—is the key to setting us on a path toward a low-carbon energy future. It's also shifting the geopolitical chessboard in profound ways.In Bottled Lightning, the science reporter Seth Fletcher takes us on a fascinating journey, from the salt flats of Bolivia to the labs of MIT and Stanford, from the turmoil at GM to cutting-edge lithium-ion battery start-ups, introducing us to the key players and ideas in an industry with the power to reshape the world. Lithium is the thread that ties together many key stories of our time: the environmental movement; the American auto industry, staking its revival on the electrification of cars and trucks; the struggle between first-world countries in need of natural resources and the impoverished countries where those resources are found; and the overwhelming popularity of the portable, Internet-connected gadgets that are changing the way we communicate. With nearly limitless possibilities, the promise of lithium offers new hope to a foundering American economy desperately searching for a green-tech boom to revive it.

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index