The Blood of Kings


Douglas Seacat - 2016
    Dominating the field of battle are rare individuals who have mastered both arcane and martial combat and who boldly lead mighty armies in the ongoing struggle to claim victory over these ancient lands.Three men who would be king threaten to sunder a kingdom, provoking a war that will drown its lands in blood. Amid the backdrop of a new Cygnaran civil war, the fate of the kingdom depends on the outcome of a covert struggle between two powerful warcasters—the gun mage Allister Caine and the mercenary warlord Asheth Magnus. Caine faces a moral quandary as he seeks to kill the bastard son of Cygnar's former king, knowing he must end an innocent life to preserve the peace. But Magnus is equally determined to see the bastard crowned as king—and is willing to kill anyone who gets in his way. Regardless of who emerges the victor, the blood of kings must be spilled to end an otherwise interminable war.

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage


Clifford Stoll - 1989
    citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" -- a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases -- a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.

Quantum Mechanics: The Theoretical Minimum


Leonard Susskind - 2014
    Now, physicist Leonard Susskind has teamed up with data engineer Art Friedman to present the theory and associated mathematics of the strange world of quantum mechanics.In this follow-up to The Theoretical Minimum, Susskind and Friedman provide a lively introduction to this famously difficult field, which attempts to understand the behavior of sub-atomic objects through mathematical abstractions. Unlike other popularizations that shy away from quantum mechanics’ weirdness, Quantum Mechanics embraces the utter strangeness of quantum logic. The authors offer crystal-clear explanations of the principles of quantum states, uncertainty and time dependence, entanglement, and particle and wave states, among other topics, and each chapter includes exercises to ensure mastery of each area. Like The Theoretical Minimum, this volume runs parallel to Susskind’s eponymous Stanford University-hosted continuing education course.An approachable yet rigorous introduction to a famously difficult topic, Quantum Mechanics provides a tool kit for amateur scientists to learn physics at their own pace.

First Platoon: A Story of Modern War in the Age of Identity Dominance


Annie Jacobsen - 2021
    The initial part of the story might sound familiar at first: It is about a platoon of mostly nineteen-year-old boys sent to Afghanistan, and an experience that ends abruptly in catastrophe. Their part of the story folds into the next: inexorably linked to those soldiers and never comprehensively reported before is the U.S. Department of Defense's quest to build the world's most powerful biometrics database, with the power to identify, monitor, catalogue, and police people all over the world.First Platoon is an American saga that illuminates a transformation of society made possible by this new technology. Part war story, part legal drama, it is about identity in the age of identification. About humanity--physical bravery, trauma, PTSD, a yearning to do right and good--in the age of biometrics, which reduce people to iris scans, fingerprint scans, voice patterning, detection by odor, gait, and more. And about the power of point-of-view in a burgeoning surveillance state.Based on hundreds of formerly classified documents, FOIA requests, and exclusive interviews, First Platoon is an investigative expos� by a master chronicler of government secrets. First Platoon reveals a post-9/11 Pentagon whose identification machines have grown more capable than the humans who must make sense of them. A Pentagon so powerful it can cover up its own internal mistakes in pursuit of endless wars. And a people at its mercy, in its last moments before a fundamental change so complete it might be impossible to take back.

Skunk Works: A Personal Memoir of My Years at Lockheed


Ben R. Rich - 1994
    As recounted by Ben Rich, the operation's brilliant boss for nearly two decades, the chronicle of Lockheed's legendary Skunk Works is a drama of cold war confrontations and Gulf War air combat, of extraordinary feats of engineering & achievement against fantastic odds. Here are up-close portraits of the maverick band of scientists & engineers who made the Skunk Works so renowned. Filled with telling personal anecdotes & high adventure, with narratives from the CIA & from Air Force pilots who flew the many classified, risky missions, this book is a portrait of the most spectacular aviation triumphs of the 20th century.

How America Lost Its Secrets: Edward Snowden, the Man and the Theft


Edward Jay Epstein - 2017
    After details of American government surveillance were published in 2013, Edward Snowden, formerly a subcontracted IT analyst for the NSA, became the center of an international controversy: Was he a hero, traitor, whistle-blower, spy? Was his theft legitimized by the nature of the information he exposed? When is it necessary for governmental transparency to give way to subterfuge? Edward Jay Epstein brings a lifetime of journalistic and investigative acumen to bear on these and other questions, delving into both how our secrets were taken and the man who took them. He makes clear that by outsourcing parts of our security apparatus, the government has made classified information far more vulnerable; how Snowden sought employment precisely where he could most easily gain access to the most sensitive classified material; and how, though he claims to have acted to serve his country, Snowden is treated as a prized intelligence asset in Moscow, his new home."

Dark Mirror: Edward Snowden and the American Surveillance State


Barton Gellman - 2020
    Barton Gellman’s informant called himself ‘Verax’ - the truth-teller. It was only later that Verax unmasked himself as Edward Snowden. But Gellman’s primary role in bringing Snowden’s revelations to light, for which he shared the Pulitzer Prize, is only the beginning of this gripping real-life spy story. Snowden unlocked the door: here Gellman describes what he found on the other side over the course of a years-long journey of investigation. It is also the story of his own escalating battle against unknown digital adversaries after he discovered his own name on a file in the leaked document trove and realised that he himself was under attack.Through a gripping narrative of paranoia, clandestine operations and jaw-dropping revelations, Dark Mirror delineates in full for the first time the hidden superstructure that connects government espionage with Silicon Valley. Who is spying on us and why? Here are the answers.©2020 Barton Gellman (P)2020 Penguin Audio

The Extraordinary Book of Useless Information: The Most Fascinating Facts That Don’t Really Matter


Don Voorhees - 2013
    There are more incredibly pointless and delightfully entertaining things to discover in this new entry in the #1 New York Times bestselling series.You probably never knew…• Ronald Reagan is the only president who has been divorced.• It is estimated that half of the world’s spider species have yet to be discovered.• November 15 is National Clean Out Your Refrigerator Day.And did you really ever have to know…• The whiskers on a harbor seal are known as “vibrissae”?• Modern scholars believe Isaac Newton may have had Asperger’s syndrome?• In the 1920s, Hollywood made twice as many films a year as it does today?

Rock Climbing Technique: The Practical Guide to Movement Mastery


John Kettle - 2018
    It doesn’t need to be a balancing act between losing fitness and getting injured overtraining. Climbing is fundamentally a skill-based sport, and this guide will change the way you look at moving on rock.Whatever your ability, learning to master smooth, relaxed and powerful movement means maximising your enjoyment and performance of the sport. This is the definitive practical guide to improving your rock climbing technique, and making you a more efficient climber. Fully illustrated with over 35 skills exercises supported by online videos, this book allows you to plan out your path to excellent technique with drills and exercises suited to all levels of ability.Written by the UK's leading climbing movement specialist, it’s packed with the knowledge and expertise gained over two decades as a professional climbing coach. Essential reading for all climbers from intermediate to elite in sport climbing, bouldering and traditional climbing.

How to Disappear: Erase your Digital Footprint, Leave False Trails, and Vanish without A Trace


Frank M. Ahearn - 2010
    How to Disappear is the authoritative and comprehensive guide for people who seek to protect their privacy as well as for anyone who’s ever entertained the fantasy of disappearing—whether actually dropping out of sight or by eliminating the traceable evidence of their existence.

Web Hacking 101


Peter Yaworski
    With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different.Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties. With over 30 examples, the book covers topics like:HTML InjectionCross site scripting (XSS)Cross site request forgery (CSRF)Open RedirectsRemote Code Execution (RCE)Application Logicand more...Each example includes a classification of the attack, a report link, the bounty paid, easy to understand description and key takeaways. After reading this book, your eyes will be opened to the wide array of vulnerabilities that exist and you'll likely never look at a website or API the same way.

The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen


Jonathan Littman - 1997
    Busted as a teenager for hacking into Pac Bell phone networks, Kevin Poulsen would find his punishment was a job with a Silicon Valley defense contractor. By day he seemed to have gone straight, toiling on systems for computer-aided war. But by night he burglarized telephone switching offices, adopting the personae and aliases of his favorite comic-book anti heroes - the Watchmen. When authorities found a locker crammed with swiped telecommunications equipment, Poulsen became a fugitive from the FBI, living the life of a cyberpunk in a neon Hollywood underground. Soon he made the front pages of the New York Times and became the first hacker charged with espionage. Littman takes us behind the headlines and into the world of Poulsen and his rogues' gallery of cyberthieves. Drawing on hundreds of hours of interviews with Poulsen, his confederates, and the authorities, he spins a thrilling chase story on the electronic frontier. The nation's phone network was Poulsen's playground. On Los Angeles's lucrative radio giveaways, Poulsen worked his magic, winning Porsches and tens of thousands of dollars. He secretly switched on the numbers of defunct Yellow Pages escort ads and took his cut of the profits. And he could wiretap or electronically stalk whomever he pleased, his childhood love or movie stars. The FBI seemed no match for Poulsen. But as Unsolved Mysteries prepared a broadcast on the hacker's crimes, LAPD vice stumbled onto his trail, and an undercover operation began on Sunset Strip.

The Hacker Diaries: Confessions of Teenage Hackers


Dan Verton - 2001
    He was a normal kid...On February 7, 2000, Yahoo.com was the first victim of the biggest distributed denial-of-service attack ever to hit the Internet. On May 8th, Buy.com was battling a massive denial-of-service attack. Later that afternoon, eBay.com also reported significant outages of service, as did Amazon.com. Then CNN's global online news operation started to grind to a crawl. By the following day, Datek and E-Trade entered crisis mode...all thanks to an ordinary fourteen-year-old kid.Friends and neighbors were shocked to learn that the skinny, dark-haired, boy next door who loved playing basketball--almost as much as he loved computers--would cause millions of dollars worth of damage on the Internet and capture the attention of the online world--and the federal government. He was known online as Mafiaboy and, to the FBI, as the most notorious teenage hacker of all time. He did it all from his bedroom PC. And he's not alone.Computer hacking and Web site defacement has become a national pastime for America's teenagers, and according to the stories you'll read about in The Hacker Diaries--it is only the beginning. But who exactly are these kids and what motivates a hacker to strike? Why do average teenagers get involved in hacking in the first place? This compelling and revealing book sets out to answer these questions--and some of the answers will surprise you. Through fascinating interviews with FBI agents, criminal psychologists, law-enforcement officials--as well as current and former hackers--you'll get a glimpse inside the mind of today's teenage hacker. Learn how they think, find out what it was like for them growing up, and understand the internal and external pressures that pushed them deeper and deeper into the hacker underground. Every hacker has a life and story of his or her own. One teenager's insatiable curiosity as to how the family's VCR worked was enough to trigger a career of cracking into computer systems. This is a remarkable story of technological wizardry, creativity, dedication, youthful angst, frustration and disconnection from society, boredom, anger, and jail time. Teenage hackers are not all indifferent punks. They're just like every other kid and some of them probably live in your neighborhood. They're there. All you have to do is look.

The Science Book: Big Ideas Simply Explained


Rob Scott Colson - 2014
     The Science Book covers every area of science--astronomy, biology, chemistry, geology, math, and physics, and brings the greatest scientific ideas to life with fascinating text, quirky graphics, and pithy quotes.

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World


Bruce Schneier - 2015
    Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.