Book picks similar to
Social Engineering: The Art of Human Hacking by Christopher Hadnagy
psychology
non-fiction
nonfiction
security
Cyberwar: The Next Threat to National Security & What to Do About It
Richard A. Clarke - 2010
Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.
Cypherpunks: Freedom and the Future of the Internet
Julian Assange - 2012
Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us. Among the topics addressed are: Do Facebook and Google constitute "the greatest surveillance machine that ever existed," perpetually tracking our location, our contacts and our lives? Far from being victims of that surveillance, are most of us willing collaborators? Are there legitimate forms of surveillance, for instance in relation to the "Four Horsemen of the Infopocalypse" (money laundering, drugs, terrorism and pornography)? And do we have the ability, through conscious action and technological savvy, to resist this tide and secure a world where freedom is something which the Internet helps bring about?The harassment of WikiLeaks and other Internet activists, together with attempts to introduce anti-file sharing legislation such as SOPA and ACTA, indicate that the politics of the Internet have reached a crossroads. In one direction lies a future that guarantees, in the watchwords of the cypherpunks, "privacy for the weak and transparency for the powerful"; in the other lies an Internet that allows government and large corporations to discover ever more about internet users while hiding their own activities. Assange and his co-discussants unpick the complex issues surrounding this crucial choice with clarity and engaging enthusiasm.
Social: Why Our Brains Are Wired to Connect
Matthew D. Lieberman - 2013
It is believed that we must commit 10,000 hours to master a skill. According to Lieberman, each of us has spent 10,000 hours learning to make sense of people and groups by the time we are ten. Social argues that our need to reach out to and connect with others is a primary driver behind our behavior. We believe that pain and pleasure alone guide our actions. Yet, new research using fMRI – including a great deal of original research conducted by Lieberman and his UCLA lab -- shows that our brains react to social pain and pleasure in much the same way as they do to physical pain and pleasure. Fortunately, the brain has evolved sophisticated mechanisms for securing our place in the social world. We have a unique ability to read other people’s minds, to figure out their hopes, fears, and motivations, allowing us to effectively coordinate our lives with one another. And our most private sense of who we are is intimately linked to the important people and groups in our lives. This wiring often leads us to restrain our selfish impulses for the greater good. These mechanisms lead to behavior that might seem irrational, but is really just the result of our deep social wiring and necessary for our success as a species. Based on the latest cutting edge research, the findings in Social have important real-world implications. Our schools and businesses, for example, attempt to minimalize social distractions. But this is exactly the wrong thing to do to encourage engagement and learning, and literally shuts down the social brain, leaving powerful neuro-cognitive resources untapped. The insights revealed in this pioneering book suggest ways to improve learning in schools, make the workplace more productive, and improve our overall well-being.
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Nicole Perlroth - 2021
One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine).For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down.Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz - 2014
But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:Create a trojan command-and-control using GitHubDetect sandboxing and automate common malware tasks, like keylogging and screenshottingEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machineExtend the popular Burp Suite web-hacking toolAbuse Windows COM automation to perform a man-in-the-browser attackExfiltrate data from a network most sneakilyInsider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python."
The Linux Command Line
William E. Shotts Jr. - 2012
Available here:readmeaway.com/download?i=1593279523The Linux Command Line, 2nd Edition: A Complete Introduction PDF by William ShottsRead The Linux Command Line, 2nd Edition: A Complete Introduction PDF from No Starch Press,William ShottsDownload William Shotts’s PDF E-book The Linux Command Line, 2nd Edition: A Complete Introduction
The Social Animal
Elliot Aronson - 1972
Through vivid narrative, lively presentations of important research, and intriguing examples, Elliot Aronson probes the patterns and motives of human behavior, covering such diverse topics as terrorism, conformity, obedience, politics, race relations, advertising, war, interpersonal attraction, and the power of religious cults.
How to Have Impossible Conversations: A Very Practical Guide
Peter Boghossian - 2019
Whether you're online, in a classroom, an office, a town hall—or just hoping to get through a family dinner with a stubborn relative—dialogue shuts down when perspectives clash. Heated debates often lead to insults and shaming, blocking any possibility of productive discourse. Everyone seems to be on a hair trigger.In How to Have Impossible Conversations, Peter Boghossian and James Lindsay guide you through the straightforward, practical, conversational techniques necessary for every successful conversation—whether the issue is climate change, religious faith, gender identity, race, poverty, immigration, or gun control. Boghossian and Lindsay teach the subtle art of instilling doubts and opening minds. They cover everything from learning the fundamentals for good conversations to achieving expert-level techniques to deal with hardliners and extremists. This book is the manual everyone needs to foster a climate of civility, connection, and empathy."This is a self-help book on how to argue effectively, conciliate, and gently persuade. The authors admit to getting it wrong in their own past conversations. One by one, I recognize the same mistakes in me. The world would be a better place if everyone read this book." —Richard Dawkins, author of Science in the Soul and Outgrowing God
Mistakes Were Made (But Not by Me): Why We Justify Foolish Beliefs, Bad Decisions, and Hurtful Acts
Carol Tavris - 2007
When we make mistakes, we must calm the cognitive dissonance that jars our feelings of self-worth. And so we create fictions that absolve us of responsibility, restoring our belief that we are smart, moral, and right -- a belief that often keeps us on a course that is dumb, immoral, and wrong. Backed by years of research and delivered in lively, energetic prose, Mistakes Were Made (But Not by Me) offers a fascinating explanation of self-deception -- how it works, the harm it can cause, and how we can overcome it.
Solitude: In Pursuit of a Singular Life in a Crowded World
Michael Harris - 2017
Our society now embraces sharing like never before: time alone is being forced out of our lives by the constant pings of smartphones and prods of social media. But what if solitude still has something to offer us - something we have forgotten, but that we still desperately need? In Solitude, award-winning author Michael Harris examines why being alone matters now more than ever before. He reflects on the paradoxical feeling of isolation that emerges from being constantly connected - and on how learning the beauty of solitude can help us escape it. After all, it is when we are alone that we realise the greatest truths about ourselves. Being alone - really alone - could be the only antidote to the frenzy of our digital age. Rich with stories about the transformative power of solitude, and drawing on the research of the world's leading neuroscientists and behavioural psychologists, Solitude offers a timely and profound exploration of how to be alone - and why it matters for us all.
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Bruce Dang - 2014
Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.
Scarcity: Why Having Too Little Means So Much
Sendhil Mullainathan - 2013
Busy people fail to manage their time efficiently for the same reasons the poor and those maxed out on credit cards fail to manage their money. The dynamics of scarcity reveal why dieters find it hard to resist temptation, why students and busy executives mismanage their time, and why sugarcane farmers are smarter after harvest than before. Once we start thinking in terms of scarcity and the strategies it imposes, the problems of modern life come into sharper focus.Mullainathan and Shafir discuss how scarcity affects our daily lives, recounting anecdotes of their own foibles and making surprising connections that bring this research alive. Their book provides a new way of understanding why the poor stay poor and the busy stay busy, and it reveals not only how scarcity leads us astray but also how individuals and organizations can better manage scarcity for greater satisfaction and success.http://us.macmillan.com/scarcity/Send...
Pragmatic Thinking and Learning: Refactor Your Wetware
Andy Hunt - 2008
Not in an editor, IDE, or design tool. You're well educated on how to work with software and hardware, but what about wetware--our own brains? Learning new skills and new technology is critical to your career, and it's all in your head. In this book by Andy Hunt, you'll learn how our brains are wired, and how to take advantage of your brain's architecture. You'll learn new tricks and tips to learn more, faster, and retain more of what you learn. You need a pragmatic approach to thinking and learning. You need to Refactor Your Wetware. Programmers have to learn constantly; not just the stereotypical new technologies, but also the problem domain of the application, the whims of the user community, the quirks of your teammates, the shifting sands of the industry, and the evolving characteristics of the project itself as it is built. We'll journey together through bits of cognitive and neuroscience, learning and behavioral theory. You'll see some surprising aspects of how our brains work, and how you can take advantage of the system to improve your own learning and thinking skills.In this book you'll learn how to:Use the Dreyfus Model of Skill Acquisition to become more expertLeverage the architecture of the brain to strengthen different thinking modesAvoid common "known bugs" in your mindLearn more deliberately and more effectivelyManage knowledge more efficientlyPrinted in full color.
Just Listen: Discover the Secret to Getting Through to Absolutely Anyone
Mark Goulston - 2009
Just Listen does this by providing simple but powerful techniques readers can use to really get through to people. You’ll learn how to: make a powerful and positive first impression; listen effectively; make even a total stranger (potential client) feel understood; talk an angry or aggressive person away from an instinctual, unproductive reaction and toward a more rational mindset; and achieve buy-in--the linchpin of all persuasion, negotiation, and sales. Whether they're coworkers, friends, strangers, or enemies, the first make-or-break step in persuading anyone to do anything is getting them to hear you out. With this groundbreaking book, readers will be able to master the fine but critical art of effective communication.
The Art of Doing Science and Engineering: Learning to Learn
Richard Hamming - 1996
By presenting actual experiences and analyzing them as they are described, the author conveys the developmental thought processes employed and shows a style of thinking that leads to successful results is something that can be learned. Along with spectacular successes, the author also conveys how failures contributed to shaping the thought processes. Provides the reader with a style of thinking that will enhance a person's ability to function as a problem-solver of complex technical issues. Consists of a collection of stories about the author's participation in significant discoveries, relating how those discoveries came about and, most importantly, provides analysis about the thought processes and reasoning that took place as the author and his associates progressed through engineering problems.