The Glass Cage: How Our Computers Are Changing Us


Nicholas Carr - 2014
    Even as they bring ease to our lives, these programs are stealing something essential from us.Drawing on psychological and neurological studies that underscore how tightly people’s happiness and satisfaction are tied to performing hard work in the real world, Carr reveals something we already suspect: shifting our attention to computer screens can leave us disengaged and discontented.From nineteenth-century textile mills to the cockpits of modern jets, from the frozen hunting grounds of Inuit tribes to the sterile landscapes of GPS maps, The Glass Cage explores the impact of automation from a deeply human perspective, examining the personal as well as the economic consequences of our growing dependence on computers.With a characteristic blend of history and philosophy, poetry and science, Carr takes us on a journey from the work and early theory of Adam Smith and Alfred North Whitehead to the latest research into human attention, memory, and happiness, culminating in a moving meditation on how we can use technology to expand the human experience.

An Ugly Truth: Inside Facebook's Battle for Domination


Sheera Frenkel - 2021
     Once one of Silicon Valley’s greatest success stories, Facebook has been under constant fire for the past five years, roiled by controversies and crises. It turns out that while the tech giant was connecting the world, they were also mishandling users’ data, spreading fake news, and amplifying dangerous, polarizing hate speech. The company, many said, had simply lost its way. But the truth is far more complex. Leadership decisions enabled, and then attempted to deflect attention from, the crises. Time after time, Facebook’s engineers were instructed to create tools that encouraged people to spend as much time on the platform as possible, even as those same tools boosted inflammatory rhetoric, conspiracy theories, and partisan filter bubbles. And while consumers and lawmakers focused their outrage on privacy breaches and misinformation, Facebook solidified its role as the world’s most voracious data-mining machine, posting record profits, and shoring up its dominance via aggressive lobbying efforts. Drawing on their unrivaled sources, Sheera Frenkel and Cecilia Kang take readers inside the complex court politics, alliances and rivalries within the company to shine a light on the fatal cracks in the architecture of the tech behemoth. Their explosive, exclusive reporting led them to a shocking conclusion: The missteps of the last five years were not an anomaly but an inevitability—this is how Facebook was built to perform. In a period of great upheaval, growth has remained the one constant under the leadership of Mark Zuckerberg and Sheryl Sandberg. Both have been held up as archetypes of uniquely 21st century executives—he the tech “boy genius” turned billionaire, she the ultimate woman in business, an inspiration to millions through her books and speeches. But sealed off in tight circles of advisers and hobbled by their own ambition and hubris, each has stood by as their technology is coopted by hate-mongers, criminals and corrupt political regimes across the globe, with devastating consequences. In An Ugly Truth, they are at last held accountable.

Hacker's Delight


Henry S. Warren Jr. - 2002
    Aiming to tell the dark secrets of computer arithmetic, this title is suitable for library developers, compiler writers, and lovers of elegant hacks.

Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw - By the Man Who Did It


Tsutomu Shimomura - 1996
    Reprint. NYT.

Newton's Telecom Dictionary


Harry Newton - 1991
    It includes many new standards, new technologies and new vendor-specific terms.

Future War: Preparing for the New Global Battlefield


Robert H. Latiff - 2017
     A leading expert on the place of technology in war and intelligence, Robert H. Latiff, now teaching at the University of Notre Dame, has spent a career in the military researching and developing new combat technologies, observing the cost of our unquestioning embrace of innovation. At its best, advanced technology acts faster than ever to save the lives of soldiers; at its worst, the deployment of insufficiently considered new technology can have devastating unintended or long-term consequences. The question of whether we can is followed, all too infrequently, by the question of whether we should. In Future War, Latiff maps out the changing ways of war and the weapons technologies we will use to fight them, seeking to describe the ramifications of those changes and what it will mean in the future to be a soldier. He also recognizes that the fortunes of a nation are inextricably linked with its national defense, and how its citizens understand the importance of when, how, and according to what rules we fight. What will war mean to the average American? Are our leaders sufficiently sensitized to the implications of the new ways of fighting? How are the attitudes of individuals and civilian institutions shaped by the wars we fight and the means we use to fight them? And, of key importance: How will soldiers themselves think about war and their roles within it? The evolving, complex world of conflict and technology demands that we pay more attention to the issues that will confront us, before it is too late to control them. Decrying what he describes as a "broken" relationship between the military and the public it serves, Latiff issues a bold wake-up call to military planners and weapons technologists, decision makers, and the nation as a whole as we prepare for a very different future.

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World


Marcus J. Carey - 2019
    Tribe of Hackers wants to change that. We asked for industry, career, and personal advice from 70 cybersecurity luminaries who are ready to break down barriers and shatter ceilings. It's about time.This book can be a catalyst for change for anyone, from beginners trying to enter the industry, to practitioners looking to start their own firms. What tips do the founders of Dragos, Inc. and Duo Security have on starting a company? Do you need a college degree or certification to be a cybersecurity professional? What is the biggest bang-for-the-buck action your organization can take to improve its cybersecurity posture? What "life hacks" to real hackers use to make their own lives easier? What resources can women in cybersecurity utilize to maximize their potential?All proceeds from the book will go towards: Bunker Labs, Sickle Cell Disease Association of America, Rainforest Partnership, and Start-Up! Kid's Club.We can't wait to show you the most epic cybersecurity thought leadership collaborative effort, ever.(Source: Amazon.com)

One Click: Jeff Bezos and the Rise of Amazon.com


Richard L. Brandt - 2011
    It can almost be summed up by the button on every page: "Buy now with one click."Why has Amazon been so successful? Much of it has to do with Jeff Bezos, the CEO and founder, whose unique combination of character traits and business strategy have driven Amazon to the top of the online retail world.Richard Brandt charts Bezos's rise from computer nerd to world- changing entrepreneur. His success can be credited to his forward-looking insights and ruthless business sense. Brandt explains: Why Bezos decided to allow negative product reviews, correctly guessing that the earned trust would outweigh possible lost sales. Why Amazon zealously guards some patents yet freely shares others. Why Bezos called becoming profitable the "dumbest" thing they could do in 1997. How Amazon.com became one of the only dotcoms to survive the bust of the early 2000s. Where the company is headed next.Through interviews with Amazon employees, competitors, and observers, Brandt has deciphered how Bezos makes decisions. The story of Amazon's ongoing evolution is a case study in how to reinvent an entire industry, and one that anyone in business today ignores at their peril.

Free: The Future of a Radical Price


Chris Anderson - 2009
    Reveals how to run an online business profitably in spite of the Internet's inherently free culture, disseminating the principles of a ''priceless economy'' in six categories that pertain to advertising, labor exchange, and advanced-version fees.

Dealing with China: An Insider Unmasks the New Economic Superpower


Henry M. Paulson Jr. - 2014
    Written in the same anecdote-rich, page-turning style as Paulson's bestselling memoir, On the Brink , DEALING WITH CHINA is certain to become the classic and definitive examination of engaging an economic superpower. Hank Paulson has dealt with China unlike any other foreigner. As head of Goldman Sachs, Paulson had a pivotal role in opening up China to private enterprise. Then, as Treasury secretary, he created the Strategic Economic Dialogue with what is now the world's second-largest economy. While negotiating with China on economic reforms, he safeguarded the teetering U.S. financial system. Paulson has worked with scores of top Chinese leaders, including Xi Jinping, China's most powerful man in decades. Now, in DEALING WITH CHINA, he takes readers behind closed doors to witness the future of China's state-controlled capitalism.

Descent into Chaos: The United States & the Failure of Nation Building in Pakistan, Afghanistan & Central Asia


Ahmed Rashid - 2007
    His unique knowledge of this complex, war-torn region gives him a panoramic vision and grasp of nuance that no Western writer can emulate.

China Road: A Journey into the Future of a Rising Power


Rob Gifford - 2007
    It flows three thousand miles from east to west, passing through the factory towns of the coastal areas, through the rural heart of China, then up into the Gobi Desert, where it merges with the Old Silk Road. The highway witnesses every part of the social and economic revolution that is turning China upside down.In this utterly surprising and deeply personal book, acclaimed National Public Radio reporter Rob Gifford, a fluent Mandarin speaker, takes the dramatic journey along Route 312 from its start in the boomtown of Shanghai to its end on the border with Kazakhstan. Gifford reveals the rich mosaic of modern Chinese life in all its contradictions, as he poses the crucial questions that all of us are asking about China: Will it really be the next global superpower? Is it as solid and as powerful as it looks from the outside? And who are the ordinary Chinese people, to whom the twenty-first century is supposed to belong? Gifford is not alone on his journey. The largest migration in human history is taking place along highways such as Route 312, as tens of millions of people leave their homes in search of work. He sees signs of the booming urban economy everywhere, but he also uncovers many of the country’s frailties, and some of the deep-seated problems that could derail China’s rise. The whole compelling adventure is told through the cast of colorful characters Gifford meets: garrulous talk-show hosts and ambitious yuppies, impoverished peasants and tragic prostitutes, cell-phone salesmen, AIDS patients, and Tibetan monks. He rides with members of a Shanghai jeep club, hitchhikes across the Gobi desert, and sings karaoke with migrant workers at truck stops along the way.As he recounts his travels along Route 312, Rob Gifford gives a face to what has historically, for Westerners, been a faceless country and breathes life into a nation that is so often reduced to economic statistics. Finally, he sounds a warning that all is not well in the Chinese heartlands, that serious problems lie ahead, and that the future of the West has become inextricably linked with the fate of 1.3 billion Chinese people.“Informative, delightful, and powerfully moving . . . Rob Gifford’s acute powers of observation, his sense of humor and adventure, and his determination to explore the wrenching dilemmas of China’s explosive development open readers’ eyes and reward their minds.” –Robert A. Kapp, president, U.S.-China Business Council, 1994-2004

Mindf*ck: Cambridge Analytica and the Plot to Break America


Christopher Wylie - 2019
    Bannon had long sensed that deep within America's soul lurked an explosive tension. Cambridge Analytica had the data to prove it, and in 2016 Bannon had a presidential campaign to use as his proving ground.Christopher Wylie might have seemed an unlikely figure to be at the center of such an operation. Canadian and liberal in his politics, he was only twenty-four when he got a job with a London firm that worked with the U.K. Ministry of Defense and was charged putatively with helping to build a team of data scientists to create new tools to identify and combat radical extremism online. In short order, those same military tools were turned to political purposes, and Cambridge Analytica was born. Wylie's decision to become a whistleblower prompted the largest data crime investigation in history. His story is both exposé and dire warning about a sudden problem born of very new and powerful capabilities. It has not only exposed the profound vulnerabilities and profound carelessness in the enormous companies that drive the attention economy, it has also exposed the profound vulnerabilities of democracy itself. What happened in 2016 was just a trial run. Ruthless actors are coming for your data, and they want to control what you think.

File System Forensic Analysis


Brian Carrier - 2005
    Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.

Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien"


Jeremy N. Smith - 2019
    When she arrived at MIT in the 1990s, Alien was quickly drawn to the school’s tradition of high‑risk physical trespassing: the original “hacking.” Within a year, one of her hallmates was dead and two others were arraigned. Alien’s adventures were only just beginning. After a stint at the storied, secretive Los Alamos National Laboratory, Alien was recruited by a top cybersecurity firm where she deployed her cache of virtual weapons—and the trespassing and social engineering talents she had developed while “hacking” at MIT. The company tested its clients’ security by every means possible—not just coding, but donning disguises and sneaking past guards and secretaries into the C‑suite. Alien now runs a boutique hacking outfit that caters to some of the world’s biggest and most vulnerable institutions—banks, retailers, government agencies. Her work combines devilish charm, old‑school deception, and next generation spycraft. In Breaking and Entering, cybersecurity finally gets the rich, character‑driven, fast-paced treatment it deserves.