On My Watch: A Memoir


Virginia Buckingham - 2020
    As the head of Boston's Logan International Airport, the launching pad for the hijacked planes that destroyed the Twin Towers, she was scapegoated by the media and political leaders for supposed airport security lapses and forced to resign. She was also sued for wrongful death by the family of a 9/11 victim, holding her personally responsible for the terrorist attack.A rising star at thirty-five--she had served as chief of staff to two consecutive Massachusetts governors before becoming the first woman to head the state's Port Authority--Buckingham's life and career was suddenly derailed. Grappling with issues of trauma, faith, leadership, and resilience, this unique memoir shares her struggle to rebuild her life and come to terms with being blamed for the unimaginable tragedy that occurred on her watch.

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software


Michael Sikorski - 2011
    When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.

Spytime: The Undoing of James Jesus Angleton


William F. Buckley Jr. - 2000
    Founder of U.S. counter-intelligence, hunter of moles and foes of America, his name has become synonymous with skulduggery and subterfuge. Angleton pursued his enemies, real and imagined, with a cool, calculating intelligence. Eventually convinced that there was a turncoat within the highest reaches of the U.S. government, Angleton turned all of his considerable skills to finding and exposing him. The result was a near-victory for U.S. Intelligence-and total defeat for himself. A brilliant re-creation of a world that included Soviet defectors, the infamous traitors Burgess, MacLean, and Philby, and American presidents from Truman to Carter, Spytime traces the making-and unmaking-of a man without a peer and, at the end, a man without a country to serve.

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws


Dafydd Stuttard - 2007
    The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.

Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare


Paul Rosenzweig - 2013
    Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more. Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is your guide to understanding the intricate nature of this pressing subject. Delivered by cybersecurity expert and professor Paul Rosenzweig, these 18 engaging lectures will open your eyes to the structure of the Internet, the unique dangers it breeds, and the ways we’re learning how to understand, manage, and reduce these dangers.In addition, Professor Rosenzweig offers sensible tips on how best to protect yourself, your network, or your business from attack or data loss.Disclaimer: The views expressed in this course are those of the professor and do not necessarily reflect the position or policy of the U.S. Department of Homeland Security, the U.S. Department of Defense, or the U.S. government. Disclaimer: Please note that this recording may include references to supplemental texts or print references that are not essential to the program and not supplied with your purchase.©2013 The Teaching Company, LLC (P)2013 The Great Courses

Two Nations Indivisible: Mexico, the United States, and the Road Ahead


Shannon K. O'Neil - 2013
    A Mexican drug cartel dismembers the body of a rival and then stitches his face onto a soccer ball. These are the sorts of grisly tales that dominate the media, infiltrate movies and TV shows, and ultimately shape Americans' perception of Mexico as a dangerous and scary place, overrun by brutal drug lords.Without a doubt, the drug war is real. In the last six years, over 60,000 people have been murdered in narco-related crimes. But, there is far more to Mexico's story than this gruesome narrative would suggest.While thugs have been grabbing the headlines, Mexico has undergone an unprecedented and under-publicized political, economic, and social transformation. In her groundbreaking book, Two Nations Indivisible, Shannon K. O'Neil argues that the United States is making a grave mistake by focusing on the politics of antagonism toward Mexico. Rather, we should wake up to the revolution of prosperity now unfolding there.The news that isn't being reported is that, over the last decade, Mexico has become a real democracy, providing its citizens a greater voice and opportunities to succeed on their own side of the border. Armed with higher levels of education, upwardly-mobile men and women have been working their way out of poverty, building the largest, most stable middle class in Mexico's history.This is the Mexico Americans need to get to know. Now more than ever, the two countries are indivisible. It is past time for the U.S. to forge a new relationship with its southern neighbor. Because in no uncertain terms, our future depends on it.