Book picks similar to
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage by Clifford Stoll
non-fiction
nonfiction
history
technology
The Pigeon Tunnel: Stories from My Life
John le Carré - 2016
First comes the imagining, then the search for reality. Then back to the imagining, and to the desk where I'm sitting now." From his years serving in British Intelligence during the Cold War, to a career as a writer that took him from war-torn Cambodia to Beirut on the cusp of the 1982 Israeli invasion to Russia before and after the collapse of the Berlin Wall, le Carré has always written from the heart of modern times. In this, his first memoir, le Carré is as funny as he is incisive, reading into the events he witnesses the same moral ambiguity with which he imbues his novels. Whether he's writing about the parrot at a Beirut hotel that could perfectly mimic machine gun fire or the opening bars of Beethoven's Fifth, visiting Rwanda's museums of the unburied dead in the aftermath of the genocide, celebrating New Year's Eve 1982 with Yasser Arafat and his high command, interviewing a German woman terrorist in her desert prison in the Negev, listening to the wisdoms of the great physicist, dissident, and Nobel Prize winner Andrei Sakharov, meeting with two former heads of the KGB, watching Alec Guinness prepare for his role as George Smiley in the legendary BBC TV adaptations, or describing the female aid worker who inspired the main character in The Constant Gardener, le Carré endows each happening with vividness and humor, now making us laugh out loud, now inviting us to think anew about events and people we believed we understood.Best of all, le Carré gives us a glimpse of a writer's journey over more than six decades, and his own hunt for the human spark that has given so much life and heart to his fictional characters.
The Shallows: What the Internet Is Doing to Our Brains
Nicholas Carr - 2010
He also crystallized one of the most important debates of our time: As we enjoy the Net’s bounties, are we sacrificing our ability to read and think deeply?Now, Carr expands his argument into the most compelling exploration of the Internet’s intellectual and cultural consequences yet published. As he describes how human thought has been shaped through the centuries by “tools of the mind”—from the alphabet to maps, to the printing press, the clock, and the computer—Carr interweaves a fascinating account of recent discoveries in neuroscience by such pioneers as Michael Merzenich and Eric Kandel. Our brains, the historical and scientific evidence reveals, change in response to our experiences. The technologies we use to find, store, and share information can literally reroute our neural pathways.Building on the insights of thinkers from Plato to McLuhan, Carr makes a convincing case that every information technology carries an intellectual ethic—a set of assumptions about the nature of knowledge and intelligence. He explains how the printed book served to focus our attention, promoting deep and creative thought. In stark contrast, the Internet encourages the rapid, distracted sampling of small bits of information from many sources. Its ethic is that of the industrialist, an ethic of speed and efficiency, of optimized production and consumption—and now the Net is remaking us in its own image. We are becoming ever more adept at scanning and skimming, but what we are losing is our capacity for concentration, contemplation, and reflection.Part intellectual history, part popular science, and part cultural criticism, The Shallows sparkles with memorable vignettes—Friedrich Nietzsche wrestling with a typewriter, Sigmund Freud dissecting the brains of sea creatures, Nathaniel Hawthorne contemplating the thunderous approach of a steam locomotive—even as it plumbs profound questions about the state of our modern psyche. This is a book that will forever alter the way we think about media and our minds.
The Monster of Florence
Douglas Preston - 2008
Then he discovered that the olive grove in front of their 14th century farmhouse had been the scene of the most infamous double-murders in Italian history, committed by a serial killer known as the Monster of Florence. Preston, intrigued, meets Italian investigative journalist Mario Spezi to learn more.This is the true story of their search for—and identification of—the man they believe committed the crimes, and their chilling interview with him. And then, in a strange twist of fate, Preston and Spezi themselves become targets of the police investigation. Preston has his phone tapped, is interrogated, and told to leave the country. Spezi fares worse: he is thrown into Italy's grim Capanne prison, accused of being the Monster of Florence himself. Like one of Preston's thrillers, The Monster of Florence, tells a remarkable and harrowing story involving murder, mutilation, and suicide—and at the center of it, Preston and Spezi, caught in a bizarre prosecutorial vendetta.
Blue Team Field Manual (BTFM)
Alan J. White - 2017
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow and commands to use when preparing for, working through and recovering from a Cyber Security Incident.
Sweet Tooth
Ian McEwan - 2012
Cambridge student Serena Frome's beauty and intelligence make her the ideal recruit for MI5. The year is 1972. The Cold War is far from over. England's legendary intelligence agency is determined to manipulate the cultural conversation by funding writers whose politics align with those of the government. The operation is code named "Sweet Tooth." Serena, a compulsive reader of novels, is the perfect candidate to infiltrate the literary circle of a promising young writer named Tom Haley. At first, she loves his stories. Then she begins to love the man. How long can she conceal her undercover life? To answer that question, Serena must abandon the first rule of espionage: trust no one. Once again, Ian McEwan's mastery dazzles us in this superbly deft and witty story of betrayal and intrigue, love and the invented self.
To Save Everything, Click Here: The Folly of Technological Solutionism
Evgeny Morozov - 2013
But how will these be affected once we delegate much of the responsibility for them to technology? The temptation of the digital age is to fix everything—from crime to corruption to pollution to obesity—by digitally quantifying, tracking, or gamifiying behavior. But when we change the motivations for our moral, ethical, and civic behavior, we may also change the very nature of that behavior itself. Technology, Evgeny Morozov proposes, can be a force for improvement—but only if we abandon the idea that it is necessarily revolutionary and instead genuinely interrogate what we are doing with it and what it is doing to us.From urging us to abandon monolithic ideas of “the Internet” to showing how to design more humane and democratic technological solutions, To Save Everything, Click Here is a dazzling tour of our technological future, and a searching investigation into the digital version of an enduring struggle: between man and his machines.
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Andrew Jaquith - 2007
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index
The Hacker Playbook 2: Practical Guide To Penetration Testing
Peter Kim - 2015
The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
Richard Bejtlich - 2013
The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.
The Filter Bubble: What the Internet is Hiding From You
Eli Pariser - 2011
Instead of giving you the most broadly popular result, Google now tries to predict what you are most likely to click on. According to MoveOn.org board president Eli Pariser, Google's change in policy is symptomatic of the most significant shift to take place on the Web in recent years - the rise of personalization. In this groundbreaking investigation of the new hidden Web, Pariser uncovers how this growing trend threatens to control how we consume and share information as a society-and reveals what we can do about it.Though the phenomenon has gone largely undetected until now, personalized filters are sweeping the Web, creating individual universes of information for each of us. Facebook - the primary news source for an increasing number of Americans - prioritizes the links it believes will appeal to you so that if you are a liberal, you can expect to see only progressive links. Even an old-media bastion like "The Washington Post" devotes the top of its home page to a news feed with the links your Facebook friends are sharing. Behind the scenes a burgeoning industry of data companies is tracking your personal information to sell to advertisers, from your political leanings to the color you painted your living room to the hiking boots you just browsed on Zappos.In a personalized world, we will increasingly be typed and fed only news that is pleasant, familiar, and confirms our beliefs - and because these filters are invisible, we won't know what is being hidden from us. Our past interests will determine what we are exposed to in the future, leaving less room for the unexpected encounters that spark creativity, innovation, and the democratic exchange of ideas.While we all worry that the Internet is eroding privacy or shrinking our attention spans, Pariser uncovers a more pernicious and far-reaching trend on the Internet and shows how we can - and must - change course. With vivid detail and remarkable scope, The Filter Bubble reveals how personalization undermines the Internet's original purpose as an open platform for the spread of ideas and could leave us all in an isolated, echoing world.
Building Microservices: Designing Fine-Grained Systems
Sam Newman - 2014
But developing these systems brings its own set of headaches. With lots of examples and practical advice, this book takes a holistic view of the topics that system architects and administrators must consider when building, managing, and evolving microservice architectures.Microservice technologies are moving quickly. Author Sam Newman provides you with a firm grounding in the concepts while diving into current solutions for modeling, integrating, testing, deploying, and monitoring your own autonomous services. You'll follow a fictional company throughout the book to learn how building a microservice architecture affects a single domain.Discover how microservices allow you to align your system design with your organization's goalsLearn options for integrating a service with the rest of your systemTake an incremental approach when splitting monolithic codebasesDeploy individual microservices through continuous integrationExamine the complexities of testing and monitoring distributed servicesManage security with user-to-service and service-to-service modelsUnderstand the challenges of scaling microservice architectures
The Spy Who Couldn't Spell: A Dyslexic Traitor, an Unbreakable Code, and the FBI's Hunt for America's Stolen Secrets
Yudhijit Bhattacharjee - 2016
Before Edward Snowden’s infamous data breach, the largest theft of government secrets was committed by an ingenious traitor whose intricate espionage scheme and complex system of coded messages were made even more baffling by his dyslexia. His name is Brian Regan, but he came to be known as The Spy Who Couldn’t Spell. In December of 2000, FBI Special Agent Steven Carr of the bureau’s Washington, D.C., office received a package from FBI New York: a series of coded letters from an anonymous sender to the Libyan consulate, offering to sell classified United States intelligence. The offer, and the threat, were all too real. A self-proclaimed CIA analyst with top secret clearance had information about U.S. reconnaissance satellites, air defense systems, weapons depots, munitions factories, and underground bunkers throughout the Middle East. Rooting out the traitor would not be easy, but certain clues suggested a government agent with a military background, a family, and a dire need for money. Leading a diligent team of investigators and code breakers, Carr spent years hunting down a dangerous spy and his cache of stolen secrets. In this fast-paced true-life spy thriller, Yudhijit Bhattacharjee reveals how the FBI unraveled Regan’s strange web of codes to build a case against a man who nearly collapsed America's military security.
Learn Windows PowerShell 3 in a Month of Lunches
Don Jones - 2011
Just set aside one hour a day—lunchtime would be perfect—for a month, and you'll be automating Windows tasks faster than you ever thought possible. You'll start with the basics—what is PowerShell and what can you do with it. Then, you'll move systematically through the techniques and features you'll use to make your job easier and your day shorter. This totally revised second edition covers new PowerShell 3 features designed for Windows 8 and Windows Server 2012.Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.What's InsideLearn PowerShell from the beginning—no experience required! Covers PowerShell 3, Windows 8, and Windows Server 2012 Each lesson should take you one hour or lessAbout the TechnologyPowerShell is both a language and an administrative shell with which you can control and automate nearly every aspect of Windows. It accepts and executes commands immediately, and you can write scripts to manage most Windows servers like Exchange, IIS, and SharePoint.Experience with Windows administration is helpful. No programming experience is assumed.Table of ContentsBefore you begin Meet PowerShell Using the help system Running commands Working with providers The pipeline: connecting commands Adding commands Objects: data by another name The pipeline, deeper Formatting—and why it's done on the right Filtering and comparisons A practical interlude Remote control: one to one, and one to many Using Windows Management Instrumentation Multitasking with background jobs Working with many objects, one at a time Security alert! Variables: a place to store your stuff Input and output Sessions: remote control with less work You call this scripting? Improving your parameterized script Advanced remoting configuration Using regular expressions to parse text files Additional random tips, tricks, and techniques Using someone else's script Never the end PowerShell cheat sheet
The Last Days of Night
Graham Moore - 2016
Gas lamps still flicker in the city streets, but the miracle of electric light is in its infancy. The person who controls the means to turn night into day will make history--and a vast fortune. A young untested lawyer named Paul Cravath, fresh out of Columbia Law School, takes a case that seems impossible to win. Paul's client, George Westinghouse, has been sued by Thomas Edison over a billion-dollar question: Who invented the light bulb and holds the right to power the country? The case affords Paul entry to the heady world of high society--the glittering parties in Gramercy Park mansions, and the more insidious dealings done behind closed doors. The task facing him is beyond daunting. Edison is a wily, dangerous opponent with vast resources at his disposal--private spies, newspapers in his pocket, and the backing of J. P. Morgan himself. Yet this unknown lawyer shares with his famous adversary a compulsion to win at all costs. How will he do it?In obsessive pursuit of victory, Paul crosses paths with Nikola Tesla, an eccentric, brilliant inventor who may hold the key to defeating Edison, and with Agnes Huntington, a beautiful opera singer who proves to be a flawless performer on stage and off. As Paul takes greater and greater risks, he'll find that everyone in his path is playing their own game, and no one is quite who they seem.
The Ice Man: Confessions of a Mafia Contract Killer
Philip Carlo - 2006
. . if I kill Mommy, if something happens and she dies, I’ll have to kill you all . . . I can’t leave any witnesses.”“Yes, Daddy. I know, Daddy,” she said.As strange and horrible a thing as this was to tell a child, Richard was trying to let Merrick know in advance—out of consideration—what might happen. He wanted her to understand that he was doing such a thing out of . . . love. Only out of love.He loved Barbara too much. He loved the children too much.That was the problem. The only way he could deal with their loss, if he inadvertently killed Barbara, was to kill them. That was how Richard had dealt with all his problems since he was a child. “But you, Merrick . . . You’ll be the hardest to kill. You understand that?”“Yes. Daddy,” she said, and she did understand this. She knew she was his favorite, and she coveted that. ---from The Ice Man