Blind Man's Bluff: The Untold Story of American Submarine Espionage


Sherry Sontag - 1998
    Now, after six years of research, those missions are told in Blind Man's Bluff, a magnificent achievement in investigative reporting. It reads like a spy thriller -- except everything in it is true. This is an epic of adventure, ingenuity, courage, and disaster beneath the sea, a story filled with unforgettable characters who engineered daring missions to tap the enemy's underwater communications cables and to shadow Soviet submarines. It is a story of heroes and spies, of bravery and tragedy.

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography


Simon Singh - 1999
    From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.

47 Percent: Uncovering the Romney Video That Rocked the 2012 Election


David Corn - 2012
    In 47 Percent, Corn recounts how the 47 percent video fit into the ongoing narrative of the 2012 election and greatly changed the course of the campaign. This instant, on-the-news book also features an astute review of the first debate between President Barack Obama and Governor Mitt Romney and assesses the strengths and weaknesses of each candidate as they head into the final stretch of this historical election.

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground


Kevin Poulsen - 2011
    Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As the black-hat 'Iceman', he'd seen the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, and in their dysfunction was the ultimate challenge: he would stage a coup and steal their ill-gotten gains from right under their noses.Through the story of Max Butler's remarkable rise, KINGPIN lays bare the workings of a silent crime wave affecting millions worldwide. It exposes vast online-fraud supermarkets stocked with credit card numbers, counterfeit cheques, hacked bank accounts and fake passports. Thanks to Kevin Poulsen's remarkable access to both cops and criminals, we step inside the quiet,desperate battle that law enforcement fights against these scammers. And learn that the boy next door may not be all he seems.

The LogStash Book


James Turnbull - 2013
    We're going to do that by introducing you to Example.com, where you're going to start a new job as one of its SysAdmins. The first project you'll be in charge of is developing its new log management solution. We'll teach you how to:* Install and deploy LogStash.* Ship events from a LogStash Shipper to a central LogStash server.* Filter incoming events using a variety of techniques.* Output those events to a selection of useful destinations.* Use LogStash's Web interface and alternative interfaces like Kibana.* Scale out your LogStash implementation as your environment grows.* Quickly and easily extend LogStash to deliver additional functionality you might need.By the end of the book you should have a functional and effective log management solution that you can deploy into your own environment.

Prabhakaran: The Story of his struggle for Eelam


Chellamuthu Kuppusamy - 2013
    This book provides an account of the life of LTTE chief Prabhakaran, who led an armed struggle against the Sri Lankan state to create Eelam, a separate nation for the Sri Lankan Tamils.The book begins from Prabhakaran’s childhood days in the aftermath of India’s and Sri Lanka’s independence from Britain. The Sri Lankan Tamils were following Gandhi’s non-violent methods to fight for their rights as citizens of Sri Lanka. Prabhakaran, an ardent fan of Bhagat Singh and Subhash Chandra Bose, felt that non-violence would not work against a Sinhala dominated government and began experimenting with violent acts against the Government to send a message. His initial success became the nucleus for the formation of LTTE, which became the quintessential guerrilla organization fighting the State.The book details various incidents of Prabhakaran’s life including terror attacks, assassination of politicians, heads of States and militant leaders; India’s role in the Sri Lankan ethnic conflict; Indian Peace Keeping Force in Sri Lanka; the Eelam wars, negotiations, betrayals and elections; through to his killing in May 2009.

Stealing the Network: How to Own a Shadow


Johnny Long - 2007
    Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. . The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles . The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth . Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries

Turn Left at Istanbul: ESCAPING SHIRLEY - The ultimate, mad, sixties road trip


Richard Savin - 2019
    In the London office my new boss Victor tells me I shall be working in a regional office - and he wants me to drive there. I am to deliver Victor's shiny Jaguar: his pride and joy. The office is in Calcutta. This all sounds like fun to me. A month long holiday. How bad can that be I think and decide to invite my friend Douglas to come along for the ride. This will be a road trip to die for I tell him. Victor's P.A. Shirley is the all seeing eye. Nothing gets past here. I have to report in on my progress at key points on the route. Shirley is going to be watching me. 'If you so much as scratch it you're dead.' I laugh, what could possibly go wrong....? well just about everything. We were OK up till Trieste; then a goat got in the car - after that it was downhill all the way to Calcutta.

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State


Glenn Greenwald - 2014
    That source turned out to be the twenty-nine-year-old NSA contractor Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security and information privacy.Now Greenwald fits all the pieces together, recounting his high-intensity eleven-day trip to Hong Kong, examining the broader implications of the surveillance detailed in his reporting for The Guardian, and revealing fresh information on the NSA's unprecedented abuse of power with documents from the Snowden archive. Fearless and incisive, No Place to Hide has already sparked outrage around the globe and been hailed by voices across the political spectrum as an essential contribution to our understanding of the U.S. surveillance state.

The Art and Science of Java


Eric S. Roberts - 2007
    By following the recommendations of the Association of Computing Machinery's Java Task Force, this first edition text adopts a modern objects-first approach that introduces readers to useful hierarchies from the very beginning.KEY TOPICS: Introduction; Programming by Example; Expressions; Statement Forms; Methods; Objects and Classes; Objects and Memory; Strings and Characters; Object-Oriented Graphics; Event-Driven Programs; Arrays and ArrayLists; Searching and Sorting; Collection Classes; Looking Ahead.MARKET: A modern objects-first approach to the Java programming language that introduces readers to useful class hierarchies from the very beginning.

Snake Oil: How Fracking's False Promise of Plenty Imperils Our Future


Richard Heinberg - 2013
    This is the first book to look at fracking from both economic and environmental perspectives."

Zero Trust Networks: Building Secure Systems in Untrusted Networks


Evan Gilman - 2017
    Hosts behind the firewall have no defenses of their own, so when a host in the trusted zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile.Authors Evan Gilman and Doug Barth show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.Understand how the zero trust model embeds security within the system's operation, rather than layering it on topExamine the fundamental concepts at play in a zero trust network, including network agents and trust enginesUse existing technology to establish trust among the actors in a networkLearn how to migrate from a perimeter-based network to a zero trust network in productionExplore case studies of zero trust on the client side (Google) and on the server (PagerDuty)

Stealing the Network: How to Own a Continent


Ryan Russell - 2004
    While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring* An informative and scary insight into the boundries of hacking and cyber-terrorism* Written by a team of the most accomplished cyber-security specialists in the world

Undercover - Ajit Doval in Theory and Practice


The Caravan Magazine - 2017
    His designation grants him sweeping powers over the Indian security and intelligence apparatuses, and a say in foreign relations that he has exercised vigorously, particularly when it comes to the country’s neighbours. His outlook combines strident Hindu nationalism with habits learnt over his decades in the Intelligence Bureau. The results have been far from extraordinary—yet large sections of the media continue to laud him. Doval’s public persona as a super-spy and statesman may be too good to be true. The Caravan -India's finest magazine of politics, culture and business. Since its relaunch in 2010, The Caravan has earned a reputation as one of South Asia's most sophisticated publications, a showcase of the region's finest writers, with a distinctive blend of masterful reporting, unique criticism and stunning photo essays.

The Girl in the Pink Shoes


Jessica Harrington - 2021