Book picks similar to
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage by Clifford Stoll
non-fiction
nonfiction
history
technology
Midnight in the Garden of Good and Evil
John Berendt - 1994
This portrait of a beguiling Southern city was a best-seller (though a flop as a movie). ~ Shots rang out in Savannah's grandest mansion in the misty, early morning hours of May 2, 1981. Was it murder or self-defense? For nearly a decade, the shooting and its aftermath reverberated throughout this city of moss-hung oaks and shaded squares. John Berendt's narrative reads like a thoroughly engrossing novel, and yet it is a work of nonfiction. Berendt interweaves a first-person account of life in this isolated remnant of the Old South with the unpredictable twists and turns of a landmark murder case.The story is peopled by a gallery of remarkable characters: the well-bred society ladies of the Married Woman's Card Club; the turbulent young redneck gigolo; the hapless recluse who owns a bottle of poison so powerful it could kill every man, woman, and child in Savannah; the aging and profane Southern belle who is the "soul of pampered self-absorption"; the uproarious black drag queen; the acerbic and arrogant antiques dealer; the sweet-talking, piano-playing con artist; young blacks dancing the minuet at the black debutante ball; and Minerva, the voodoo priestess who works her magic in the graveyard at midnight. These and other Savannahians act as a Greek chorus, with Berendt revealing the alliances, hostilities, and intrigues that thrive in a town where everyone knows everyone else.
Gödel, Escher, Bach: An Eternal Golden Braid
Douglas R. Hofstadter - 1979
However, according to Hofstadter, the formal system that underlies all mental activity transcends the system that supports it. If life can grow out of the formal chemical substrate of the cell, if consciousness can emerge out of a formal system of firing neurons, then so too will computers attain human intelligence. Gödel, Escher, Bach is a wonderful exploration of fascinating ideas at the heart of cognitive science: meaning, reduction, recursion, and much more.
Super Pumped: The Battle for Uber
Mike Isaac - 2019
Uber had catapulted to the top of the tech world, yet for many came to symbolize everything wrong with Silicon Valley.Award-winning New York Times technology correspondent Mike Isaac’s Super Pumped presents the dramatic rise and fall of Uber, set against an era of rapid upheaval in Silicon Valley. Backed by billions in venture capital dollars and led by a brash and ambitious founder, Uber promised to revolutionize the way we move people and goods through the world. A near instant “unicorn,” Uber seemed poised to take its place next to Amazon, Apple, and Google as a technology giant.What followed would become a corporate cautionary tale about the perils of startup culture and a vivid example of how blind worship of startup founders can go wildly wrong. Isaac recounts Uber’s pitched battles with taxi unions and drivers, the company’s toxic internal culture, and the bare-knuckle tactics it devised to overcome obstacles in its quest for dominance. With billions of dollars at stake, Isaac shows how venture capitalists asserted their power and seized control of the startup as it fought its way toward its fateful IPO.Based on hundreds of interviews with current and former Uber employees, along with previously unpublished documents, Super Pumped is a page-turning story of ambition and deception, obscene wealth, and bad behavior that explores how blistering technological and financial innovation culminated in one of the most catastrophic twelve-month periods in American corporate history.
Life Undercover: Coming of Age in the CIA
Amaryllis Fox - 2019
Amaryllis Fox's memoir tells the story of her ten years in the most elite clandestine ops unit of the CIA, hunting the world's most dangerous terrorists in sixteen countries while marrying and giving birth to a daughter.
Threat Modeling: Designing for Security
Adam Shostack - 2014
Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Patrick Engebretson - 2011
No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate.Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phasesWritten by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State UniversityUtilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test
The Good Spy: The Life and Death of Robert Ames
Kai Bird - 2014
It marked the beginning of Hezbollah as a political force, but even more important, it eliminated America’s most influential and effective intelligence officer in the Middle East – CIA operative Robert Ames. What set Ames apart from his peers was his extraordinary ability to form deep, meaningful connections with key Arab intelligence figures. Some operatives relied on threats and subterfuge, but Ames worked by building friendships and emphasizing shared values – never more notably than with Yasir Arafat’s charismatic intelligence chief and heir apparent Ali Hassan Salameh (aka “The Red Prince”). Ames’ deepening relationship with Salameh held the potential for a lasting peace. Within a few years, though, both men were killed by assassins, and America’s relations with the Arab world began heading down a path that culminated in 9/11, the War on Terror, and the current fog of mistrust. Bird, who as a child lived in the Beirut Embassy and knew Ames as a neighbor when he was twelve years old, spent years researching The Good Spy. Not only does the book draw on hours of interviews with Ames’ widow, and quotes from hundreds of Ames’ private letters, it’s woven from interviews with scores of current and former American, Israeli, and Palestinian intelligence officers as well as other players in the Middle East “Great Game.” What emerges is a masterpiece-level narrative of the making of a CIA officer, a uniquely insightful history of twentieth-century conflict in the Middle East, and an absorbing hour-by-hour account of the Beirut Embassy bombing. Even more impressive, Bird draws on his reporter’s skills to deliver a full dossier on the bombers and expose the shocking truth of where the attack’s mastermind resides today.
Creative Selection: Inside Apple's Design Process During the Golden Age of Steve Jobs
Ken Kocienda - 2018
Creative Selection recounts the life of one of the few who worked behind the scenes, a highly-respected software engineer who worked in the final years the Steve Jobs era--the Golden Age of Apple.Ken Kocienda offers an inside look at Apple's creative process. For fifteen years, he was on the ground floor of the company as a specialist, directly responsible for experimenting with novel user interface concepts and writing powerful, easy-to-use software for products including the iPhone, the iPad, and the Safari web browser. His stories explain the symbiotic relationship between software and product development for those who have never dreamed of programming a computer, and reveal what it was like to work on the cutting edge of technology at one of the world's most admired companies.Kocienda shares moments of struggle and success, crisis and collaboration, illuminating each with lessons learned over his Apple career. He introduces the essential elements of innovation--inspiration, collaboration, craft, diligence, decisiveness, taste, and empathy--and uses these as a lens through which to understand productive work culture.An insider's tale of creativity and innovation at Apple, Creative Selection shows readers how a small group of people developed an evolutionary design model, and how they used this methodology to make groundbreaking and intuitive software which countless millions use every day.
The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America
James Bamford - 2008
Now Bamford describes the transformation of the NSA since 9/11, as the agency increasingly turns its high-tech ears on the American public.The Shadow Factory reconstructs how the NSA missed a chance to thwart the 9/11 hijackers and details how this mistake has led to a heightening of domestic surveillance. In disturbing detail, Bamford describes exactly how every American’s data is being mined and what is being done with it. Any reader who thinks America’s liberties are being protected by Congress will be shocked and appalled at what is revealed here.From the Trade Paperback edition.
A Mind at Play: How Claude Shannon Invented the Information Age
Jimmy Soni - 2017
He constructed a fleet of customized unicycles and a flamethrowing trumpet, outfoxed Vegas casinos, and built juggling robots. He also wrote the seminal text of the digital revolution, which has been called “the Magna Carta of the Information Age.” His discoveries would lead contemporaries to compare him to Albert Einstein and Isaac Newton. His work anticipated by decades the world we’d be living in today—and gave mathematicians and engineers the tools to bring that world to pass.In this elegantly written, exhaustively researched biography, Jimmy Soni and Rob Goodman reveal Claude Shannon’s full story for the first time. It’s the story of a small-town Michigan boy whose career stretched from the era of room-sized computers powered by gears and string to the age of Apple. It’s the story of the origins of our digital world in the tunnels of MIT and the “idea factory” of Bell Labs, in the “scientists’ war” with Nazi Germany, and in the work of Shannon’s collaborators and rivals, thinkers like Alan Turing, John von Neumann, Vannevar Bush, and Norbert Wiener.And it’s the story of Shannon’s life as an often reclusive, always playful genius. With access to Shannon’s family and friends, A Mind at Play brings this singular innovator and creative genius to life.
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Michael Hale Ligh - 2014
As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields.Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques:How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.
Reversing: Secrets of Reverse Engineering
Eldad Eilam - 2005
The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into disassembly-code-level reverse engineering-and explaining how to decipher assembly language
The Blue Nowhere
Jeffery Deaver - 2001
To stop him, the authorities free imprisoned former hacker Wyatt Gillette to aid the investigation. Teamed with old-school homicide detective Frank Bishop, Gillette must combine their disparate talents to catch a brilliant and merciless killer.
Gray Day: My Undercover Mission to Expose America's First Cyber Spy
Eric O'Neill - 2019
With zero training in face-to-face investigation, O'Neill found himself in a windowless, high-security office in the newly formed Information Assurance Section, tasked officially with helping the FBI secure its outdated computer system against hackers and spies--and unofficially with collecting evidence against his new boss, Robert Hanssen, an exacting and rage-prone veteran agent with a fondness for handguns. In the months that follow, O'Neill's self-esteem and young marriage unravel under the pressure of life in Room 9930, and he questions the very purpose of his mission. But as Hanssen outmaneuvers an intelligence community struggling to keep up with the new reality of cybersecurity, he also teaches O'Neill the game of spycraft. The student will just have to learn to outplay his teacher if he wants to win.A tension-packed stew of power, paranoia, and psychological manipulation, Gray Day is also a cautionary tale of how the United States allowed Russia to become dominant in cyberespionage--and how we might begin to catch up.
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
John Sammons - 2011
This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations.This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available.This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security.