George Washington: First Guardian Of American Liberty


Michael Crawley - 2016
    But where did he get his military experience? Why was picked to take command of the army? Why was he the only American president ever to be elected unanimously (twice!), and did he really chop down that cherry tree as a kid?In this book entitled George Washington: First Guardian of American Liberty by author Michael Crawley, you'll follow the course of George Washington's life, from his birth at Ferry Farm in Virginia in 1732, to his death at his Mount Vernon estate in 1799. You'll learn how his early fame as a hero of the French and Indian War, and his illustrious marriage to a wealthy widow, led to this farm boy becoming one of the most important men in Virginia, a delegate at the Continental Congress where the Founders of America gathered to decide the nation's fate. The first guardian of American liberty looks serene in his portraits, but he didn't always rise above the fray. Washington fought for what he believed in, and his political convictions shocked contemporaries like Thomas Jefferson. Do you know what kind of country George Washington wanted America to be?

The Dark Net: Inside the Digital Underworld


Jamie Bartlett - 2014
    A world that is as creative and complex as it is dangerous and disturbing. A world that is much closer than you think.The dark net is an underworld that stretches from popular social media sites to the most secretive corners of the encrypted web. It is a world that frequently appears in newspaper headlines, but one that is little understood, and rarely explored. The Dark Net is a revelatory examination of the internet today, and of its most innovative and dangerous subcultures: trolls and pornographers, drug dealers and hackers, political extremists and computer scientists, Bitcoin programmers and self-harmers, libertarians and vigilantes.Based on extensive first-hand experience, exclusive interviews and shocking documentary evidence, The Dark Net offers a startling glimpse of human nature under the conditions of freedom and anonymity, and shines a light on an enigmatic and ever-changing world.

Electricity and Magnetism


Elisha Gray - 2010
    You may find it for free on the web. Purchase of the Kindle edition includes wireless delivery.

WRONG! Retro Games, You Messed Up Our Comic Book Heroes! (Awesomely Nerdy Nitpicks 1)


Chris Baker - 2014
    This ebook documents the most egregious – and most hilarious – offenders from the moment Superman flew onto the Atari 2600 in 1978 all the way through 1992, when Konami's classic X-Men sucked in quarter after quarter in arcades. NEARLY 80 SUPERHERO GAMES Some you've played. Some you haven't. And quite a few you never even knew existed in the first place. Some high-/lowlights: Purple Dark Knight vs. Green Joker in Batman: The Video Game (NES) Proven instances of "slapping a license" on an already-developed game Games that stripped Wolverine and He-Man of their most iconic weaponry A questionable transportation method for the Man of Steel in Superman (NES) A Transformers game from the creator of Pitfall! The strangest comic book license ever to hit the Sega Genesis The most unnecessary tie-in to a superhero animated series of all time The Danger Mouse Trilogy That one lonely Thundercats game ANSWERS TO BURNING QUESTIONS YOU DIDN'T EVEN KNOW TO ASK Who is "the Princess Peach of superhero games"? Who was the first Marvel character to be featured in three games? And what's the single gaming appearance he's had since 1985? Which super-character is most consistently misrepresented in games? What common superhero gaming feature was pioneered by LJN's otherwise absolutely horrible X-Men NES game? Which hero's primary gaming nemesis is someone he still has yet to even meet in the comics? What do an NES game and a major restaurant chain agree is Wolverine's favorite food? Why is Carnage getting naked on my SNES?! GAMING PLATFORMS YOU LOVED...OR DIDN'T KNOW EXISTED Atari 2600 | Intellivision | Commodore 64 | Nintendo Entertainment System | Game Boy | Super NES | Sega Master System | Genesis | Game Gear | Lynx | ZX Spectrum | MSX | PC-DOS | MORE! YOUR FAVORITE HEROES (AND SOME YOU'VE NEVER HEARD OF) From Marvel! Spider-Man | Wolverine and the X-Men | Hulk | Captain America, Iron Man, Hawkeye, Vision, and a bunch of other Avengers | Punisher | Human Torch and the Thing from the Fantastic Four | Silver Surfer | Howard the Duck From DC! Superman | Batman | Flash | Swamp Thing From Other Comic Publishers! Conan | Flash Gordon | Judge Dredd | Ex-Mutants From Toy Lines and Cartoons! Transformers | Teenage Mutant Ninja Turtles | He-Man and the Masters of the Universe | Bartman and Radioactive Man from The Simpsons | G.I.

Social Engineering: The Art of Human Hacking


Christopher Hadnagy - 2010
    Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.Examines social engineering, the science of influencing atarget to perform a desired task or divulge informationArms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem accessReveals vital steps for preventing social engineeringthreatsSocial Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages.

IoT Inc.: How Your Company Can Use the Internet of Things to Win in the Outcome Economy


Bruce Sinclair - 2017
    They’re in our companies, in our homes, in our pockets. People love these products. But what they love more is what these products do—and for anyone running a business today, outcomes are the key. The Internet of Things (IoT) is the point of connection between products and the results they deliver—it’s where products become software. IoT Inc. explains everything you need to know to position your company within this powerful new network. And once you do, you’ll leave the competition in the dust. Founder and president of today’s leading IoT business consulting firm, Bruce Sinclair has been helping companies develop IoT strategies for a decade—far longer than the term has even existed. This essential guide provides an in-depth look into IoT—how it works and how it is transforming business; methods for seeing your own business, customers, and competitors through the lens of IoT, and a deep dive into how to develop and implement a powerful IoT strategy. IoT isn’t a new business trend. It’s the new way of business. Period. The IoT wave is heading for your industry. You can either meet it head-on, and ride it to success, or you can turn your back and let it swamp you. This is your playbook for transforming your company into a major player in the IoT Outcome economy.

McSweeney's #54: The End of Trust


Dave Eggers - 2018
    Meanwhile, we wade through an unprecedented amount of disinformation and deception. Fake news and Russian-purchased propaganda are woven into our media diets, and anonymity on the internet leaves us ever suspicious.In the face of this, rather than seek privacy where we can, we eagerly offer up our remaining details to social media, craving the surveillance and scrutiny of our peers. We're unsure of how all of this is affecting the moral development of a generation coming of age in this new culture of surveillance, but we continue on. It leads us to wonder if we've reached the end of trust, and if we even care.

Grumby


Andy Kessler - 2010
    In this comic novel a band of hacker-geeks load state-of-the-art artificial intelligence, including working eyes, ears, spy software, and a smart mouth, into a bunch of old Furby dolls, re-christened Grumbies, network them together, sell millions, become rich and famous and make enemies/allies of Mossad, the CIA, Google, Microsoft, IRS, Goldman Sachs, the guys from Google, and Steve Jobs.

Ebook: Design Thinking (Innovation Trends Series)


BBVA Innovation Center - 2015
    In this issue you will find out all there is to be known about Design Thinking, the different and creative approach to businesses everyday challenges.

Little Brother & Homeland


Cory Doctorow - 2013
    I'd recommend Little Brother over pretty much any book I've read this year." -Neil Gaiman Little Brother Marcus Yallow is seventeen years old when he skips school and finds himself caught in the aftermath of a terrorist attack on San Francisco. In the wrong place at the wrong time, Marcus and his friends are apprehended by the Department of Homeland Security and whisked away to a secret prison where they are brutally interrogated for days.When the DHS finally releases them, Marcus discovers that his city has become a police state. He knows that no one will believe him, which leaves him one option: to take down the DHS himself. Can one brilliant teenage hacker actually fight back? Maybe, but only if he's very careful...and if he chooses his friends well. Homeland A few years after the events of Little Brother, California's economy collapses and Marcus finds himself employed by a crusading politician who promises reform. Then his former nemesis, Masha, emerges with a thumbdrive containing WikiLeaks-style evidence of government wrongdoing. When Marcus witnesses Masha's kidnapping by the same agents who detained and tortured him earlier, he has to decide whether to save her or leak the archive that will cost his employer the election and put thousands at risk.Surrounded by friends who consider him a hacker hero, stalked by people who look like they're used to inflicting pain, Marcus has to act, and act fast.

How to Measure Anything in Cybersecurity Risk


Douglas W. Hubbard - 2016
    In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely.Discover the shortcomings of cybersecurity's best practices Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing--as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.

The Practice of Network Security Monitoring: Understanding Incident Detection and Response


Richard Bejtlich - 2013
    The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.

Web Hacking 101


Peter Yaworski
    With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different.Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties. With over 30 examples, the book covers topics like:HTML InjectionCross site scripting (XSS)Cross site request forgery (CSRF)Open RedirectsRemote Code Execution (RCE)Application Logicand more...Each example includes a classification of the attack, a report link, the bounty paid, easy to understand description and key takeaways. After reading this book, your eyes will be opened to the wide array of vulnerabilities that exist and you'll likely never look at a website or API the same way.

Operation Red Falcon (Kindle Single)


Ronen Bergman - 2015
    The Israelis had received top-secret intelligence from a Syrian general and informant code-named Red Falcon, recruited 23 years earlier by Mossad spy Yehuda Gil—himself known as "the man of a thousand faces." Gil had been the general's sole handler, the conduit of decades of critical intelligence. But now, on the brink of war, questions arose about who exactly was handling whom. What information was real and what was a lie? Was Gil, a man of mythic exploits in Israeli intelligence, a hero or a traitor? With exclusive access to Gil and other key figures in one of the greatest intelligence intrigues in modern history, celebrated Israeli investigative journalist Ronen Bergman unravels the incredible true story of the Yehuda Gil affair. Bergman's unprecedented reporting takes him to the heart of Israel's shadowy spy agencies, arguments at the highest levels of a government lurching toward war, and last-minute secret meetings at the CIA and the White House to avert it. At the center of it all is the mystery of Red Falcon, his spymaster handler, and the very nature of deception.

Rise of the Data Cloud


Frank Slootman - 2020