Book picks similar to
Cyber Warfare and the Laws of War by Heather Harrison Dinniss


cyber
international-law
information-security
stack-2-shelf-1

Hidden Iran: Paradox and Power in the Islamic Republic


Ray Takeyh - 2006
    The United States and Iran have long eyed each other with suspicion, all too eager to jump to conclusions and slam the door. What gets lost along the way is a sense of what is actually happening inside Iran and why it matters. With a new hard-line Iranian president making incendiary pronouncements and pressing for nuclear developments, the consequences of not understanding Iran have never been higher.Ray Takeyh, a leading expert on Iran's politics and history, has written a groundbreaking book that demystifies the Iranian regime and shows how the fault lines of Iran's domestic politics serve to explain its behavior. In "Hidden Iran," he explains why this country has so often confounded American expectations and why its outward hostility does not necessarily preclude the normalization of relations. Through a clearer understanding of the competing claims of Muslim theology, republican pragmatism, and factional competition, he offers a new paradigm for managing our relations with this rising power.

Good-bye for Always: The Triumph of the Innocents


Cecile Kaufer - 1997
    The Nazis had overrun a great deal of the continent, bent on the domination of the world and the annihilation of an entire people. The death camps, unknown to most outside Europe, claimed more than six millions Jews during that time. Some endured -- and most have breathtaking stories of survival. Why they survived when so many perished is a matter of coincidence, luck, the will to live and the courage and sacrifice of many others. The full scope of that sacrifice will never be completely chronicled, it is just too vast. "Good-bye for Always, The Triumph of the Innocents" is the story of the youngest members of the Widerman family, who moved to Paris from Poland, only to be caught up in the horror of the Nazi occupation. In 1942, Cecile and Betty Widerman began a journey into the belly of the worst beast mankind has to offer. For two years they were literally one step ahead of death, as Nazi cruelty sought to envelop them as it had millions of others. How they survived, why they survived and who nearly gave their own lives to protect them is a story of inspiration and will that is sure to live forever.

Over the Wire: A POW's Escape Story from the Second World War


Philip H. Newman - 1983
    After several failed attempts he got out over the wire and journeyed for weeks as a fugitive from northern France to Marseilles, then across the Pyrenees to Spain and Gibraltar and freedom. He was guided along the way by French civilians, resistance fighters and the organizers of the famous Pat escape line. His straightforward, honest and vivid memoir of his work as a surgeon at Dunkirk, life in the prison camps and his escape attempts gives a fascinating insight into his wartime experience. It records the ingenuity and courage of the individuals, the ordinary men and women, who risked their lives to help him on his way. It is also one of the best accounts we have of what it was like to be on the run in occupied Europe.

Bulletproof SSL and TLS: The Complete Guide to Deploying Secure Servers and Web Applications


Ivan Ristic - 2014
    Quite the contrary; mistakes are easy to make and can often fully compromise security. Bulletproof SSL and TLS is the first SSL book written with users in mind. It is the book you will want to read if you need to assess risks related to website encryption, manage keys and certificates, configure secure servers, and deploy secure web applications. Bulletproof SSL and TLS is based on several years of work researching SSL and how SSL is used in real life, implementing and supporting a comprehensive assessment tool running on the SSL Labs website (https://www.ssllabs.com), and assessing most of the public SSL servers on the Internet. The assessment tool helped many site owners identify and solve issues with their SSL deployments. The intent of this book is to provide a definitive reference for SSL deployment that is full of practical and relevant information.

The Myth of Martyrdom: What Really Drives Suicide Bombers, Rampage Shooters, and Other Self-Destructive Killers


Adam Lankford - 2013
    As it turns out, this claim originated with the terrorist leaders themselves, who insisted that they would never recruit mentally unstable people to carry out suicide attacks. As these strikes have become both increasingly common and increasingly deadly, no one has challenged this conventional wisdom. These are fearless ideological warriors, we're told, who have the same resolve and commitment to their beliefs as our own Navy SEALs, because they're willing to die for the sake of their cause.In The Myth of Martyrdom, Adam Lankford argues that these so-called experts have it all wrong. The truth is that most suicide terrorists are like any other suicidal person—longing to escape from unbearable pain, be it depression, anxiety, marital strife, or professional failure. Their "martyrdom" is essentially a cover for an underlying death wish. Drawing on an array of primary sources, including suicide notes, love letters, diary entries, and martyrdom videos, Lankford reveals the important parallels that exist between suicide bombers, airplane hijackers, cult members, and rampage shooters. The result is an astonishing account of rage and shame that will transform the way we think of terrorism forever.We can't hope to stop these deadly attacks, Lankford argues, until we understand what's really behind them. This timely and provocative book flips a decades-old argument on its head—and has huge implications for our future.

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security


Tobias Klein - 2011
    In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs—or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting.Along the way you'll learn how to:Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws Develop proof of concept code that verifies the security flaw Report bugs to vendors or third party brokersA Bug Hunter's Diary is packed with real-world examples of vulnerable code and the custom programs used to find and test bugs. Whether you're hunting bugs for fun, for profit, or to make the world a safer place, you'll learn valuable new skills by looking over the shoulder of a professional bug hunter in action.

Making Games with Python & Pygame


Al Sweigart - 2012
    Each chapter gives you the complete source code for a new game and teaches the programming concepts from these examples. The book is available under a Creative Commons license and can be downloaded in full for free from http: //inventwithpython.com/pygame This book was written to be understandable by kids as young as 10 to 12 years old, although it is great for anyone of any age who has some familiarity with Python.

Tata


Morgen Witzel - 2010
    1 Lakh/ below US$ 2500 car), is set to change our perception of India': on the threshold of becoming a truly global brand.*s oldest and most respected corporate brand. With a major international presence, in a variety of areas including steel, tea, chemicals, communications and software, Tata now stands 65th in the world brand valuation league. But what is the Tata brand all about? What are its values? How do people perceive it, in India and around the world? In this absorbing and informed book Morgen Witzel digs into the heart of the Tata enterprise, describes its origins, how Tata's reputation and image evolved, and how the group has worked to transform that image into a powerful and valuable brand. Tata: The Evolution of a Corporate Brand goes to the core of the Tata ethos to explore the unique relationship between the Tata group and the Indian people, a relationship that goes beyond the achievements of a successful business to its social contributions for its employees and the society at large. Finally it asks how that reputation will be perceived and understood as Tata moves into global markets. Whether you re an entrepreneur, a manager, a marketer, or an interested Tata loyalist this book will help you understand the durability of the brand and inspire you with the values it holds onto in the global economy.

CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition (Exam N10-007)


Mike Meyers - 1999
    The book offers clear instruction and real-world examples from training expert and bestselling author Mike Meyers along with hundreds of accurate practice questions.Fulfilling the promise of the All-in-One series, this complete reference serves both as a study tool and a valuable on-the-job reference that will serve readers beyond the exam. CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition (Exam N10-007) also includes access to free video training and interactive hands-on labs and simulations that prepare you for difficult performance-based questions. A valuable pre-assessment test enables readers to gauge their familiarity with the test’s objectives and tailor an effective course for study.-Contains complete coverage of every objective for the CompTIA Network+ Certification exam-Written by CompTIA training and certification guru Mike Meyers- Electronic content includes the Total Tester exam simulator with over 100 practice questions, over an hour of training videos, and a collection of Mike Meyers’ favorite shareware and freeware networking utilities

Practical Stoicism: Exercises for Doing the Right Thing Right Now


Grey Freeman - 2017
    Practical Stoicism is a collection of short readings written to help bridge the gap between the essential teachings of the great Stoic philosophers and the things we must do, in the here and now, to achieve the fulfillment they promised. Pick a starting point anywhere within its pages whenever you need a quick reminder of how to move your philosophy out of your head and into your life. Version 2.3.1

Eagles: Before the Band


Rik Forgo - 2019
    

Netwars: The Code


M. Sean Coleman - 2014
    A high-tech serial thriller from the dark side of the net. Episode 1.Welcome to the Deep Web. Those parts of the internet no search engine explores. The place where you can buy anything. Drugs, children, weapons. Anyone can do it. And get away free. Anthony Prince, head of PrinceSec, a firm which provides high-tech security for the government and major corporations, dies in a plane crash when crossing the English Channel. Responsible for Prince's death is a hacker named Strider. His real name is Scott Mitchell and in his day job at the National Cyber Crime Unit he uses legitimate means to get the bad guys. As Strider, his means are less legal. On the same night, PrinceSec is the target of a cyber-attack. When the NCCU is called to assess the damage, a link is found between Prince and a criminal hacker group called Black Flag. The race is on for Mitchell to protect his identity as Strider and to stop Black Flag before it's too late.

Chasing Understanding in the Jungles of Vietnam: My Year as a Black Scarf


Douglas Beed - 2017
    After two years of college he couldn't afford to continue so he was forced to relinquish his student deferment and enter the draft. He tried various strategies to get a non-combat job; nevertheless he ended up in the infantry and was assigned to Vietnam. The stories in this book depict the year Doug spent in Alpha Company where he spent days on patrols finding and killing North Vietnamese soldiers along the hundreds of miles of trails heading for the Saigon. These stories range from funny to tragic, from uplifting to extremely frustrating and from touching to horrifying. This book gives the reader a sense of life in the infantry in 1968 and 1969.

Hacking For Dummies


Kevin Beaver - 2004
    In order to counter these cyber bad guys, you must become a hacker yourself--an ethical hacker. Hacking for Dummies shows you just how vulnerable your systems are to attackers. It shows you how to find your weak spots and perform penetration and other security tests. With the information found in this handy, straightforward book, you will be able to develop a plan to keep your information safe and sound. You'll discover how to:Work ethically, respect privacy, and save your system from crashing Develop a hacking plan Treat social engineers and preserve their honesty Counter war dialing and scan infrastructures Understand the vulnerabilities of Windows, Linux, and Novell NetWare Prevent breaches in messaging systems, web applications, and databases Report your results and managing security changes Avoid deadly mistakes Get management involved with defending your systems As we enter into the digital era, protecting your systems and your company has never been more important. Don't let skepticism delay your decisions and put your security at risk. With Hacking For Dummies, you can strengthen your defenses and prevent attacks from every angle!

Augmented: Life in the Smart Lane


Brett King - 2016
    The coming Augmented Age, however, promises a level of disruption, behavioral shifts and changes that are unparalleled. While consumers today are camping outside of an Apple store waiting to be one of the first to score a new Apple Watch or iPhone, the next generation of wearables will be able to predict if we re likely to have a heart attack and recommend a course of action. We watch news of Google s self-driving cars, but don t likely realize this means progressive cities will have to ban human drives in the next decade because us humans are too risky. Following on from the Industrial or Machine Age, the Space Age and the Digital Age, the Augmented Age will be based on four key disruptive themes Artificial Intelligence, Experience Design, Smart Infrastructure, and Health Tech. Historically the previous ages brought significant disruption and changes, but on a net basis jobs were created, wealth was enhanced, and the health and security of society improved. What will the Augmented Age bring? Will robots take our jobs, and AI s subsume us as inferior intelligences, or will this usher in a new age of abundance? Augmented is a book on future history, but more than that, it is a story about how you will live your life in a world that will change more in the next 20 years than it has in the last 250 years. Are you ready to adapt? Because if history proves anything, you don't have much of a choice."