The Revenge Of Geography: What the Map Tells Us About Coming Conflicts and the Battle Against Fate


Robert D. Kaplan - 2012
    Kaplan, the bestselling author of Monsoon and Balkan Ghosts, offers a revelatory new prism through which to view global upheavals and to understand what lies ahead for continents and countries around the world.   In The Revenge of Geography, Kaplan builds on the insights, discoveries, and theories of great geographers and geopolitical thinkers of the near and distant past to look back at critical pivots in history and then to look forward at the evolving global scene. Kaplan traces the history of the world’s hot spots by examining their climates, topographies, and proximities to other embattled lands. The Russian steppe’s pitiless climate and limited vegetation bred hard and cruel men bent on destruction, for example, while Nazi geopoliticians distorted geopolitics entirely, calculating that space on the globe used by the British Empire and the Soviet Union could be swallowed by a greater German homeland.   Kaplan then applies the lessons learned to the present crises in Europe, Russia, China, the Indian subcontinent, Turkey, Iran, and the Arab Middle East. The result is a holistic interpretation of the next cycle of conflict throughout Eurasia. Remarkably, the future can be understood in the context of temperature, land allotment, and other physical certainties: China, able to feed only 23 percent of its people from land that is only 7 percent arable, has sought energy, minerals, and metals from such brutal regimes as Burma, Iran, and Zimbabwe, putting it in moral conflict with the United States. Afghanistan’s porous borders will keep it the principal invasion route into India, and a vital rear base for Pakistan, India’s main enemy. Iran will exploit the advantage of being the only country that straddles both energy-producing areas of the Persian Gulf and the Caspian Sea. Finally, Kaplan posits that the United States might rue engaging in far-flung conflicts with Iraq and Afghanistan rather than tending to its direct neighbor Mexico, which is on the verge of becoming a semifailed state due to drug cartel carnage.   A brilliant rebuttal to thinkers who suggest that globalism will trump geography, this indispensable work shows how timeless truths and natural facts can help prevent this century’s looming cataclysms.

Throwing Rocks at the Google Bus: How Growth Became the Enemy of Prosperity


Douglas Rushkoff - 2016
    Social networks surrender their original missions to more immediately profitable data mining, while brokerage houses abandon value investing for algorithms that drain markets and our 401ks alike--all tactics driven by the need to stoke growth by any means necessary. Instead of taking this opportunity to reprogram our economy for sustainability, we have doubled down on growth as its core command. We have reached the limits of this approach. We must escape the growth trap, once and for all. Media scholar and technology author Douglas Rushkoff--one of today's most original and influential thinkers--argues for a new economic program that utilizes the unique distributive power of the internet while breaking free of the winner-take-all system the growth trap leaves in its wake. Drawing on sources both contemporary and historical, Rushkoff pioneers a new understanding of the old economic paradigm, from central currency to debt to corporations and labor.Most importantly, he offers a series of practical steps for businesses, consumers, investors, and policymakers to remake the economic operating system from the inside out--and prosper along the way. Instead of boycotting Wal-Mart or overtaxing the wealthy, we simply implement strategies that foster the creation of value by stakeholders other than just ourselves. From our currency to our labor to the corporation, every aspect of the economy can be reprogrammed with minimal disruption to create a more equitably distributed prosperity for all.Inspiring and challenging, Throwing Rocks at the Google Bus provides a pragmatic, optimistic, and human-centered model for economic progress in the digital age.

The Wealth of Networks: How Social Production Transforms Markets and Freedom


Yochai Benkler - 2006
    The phenomenon he describes as social production is reshaping markets, while at the same time offering new opportunities to enhance individual freedom, cultural diversity, political discourse, and justice. But these results are by no means inevitable: a systematic campaign to protect the entrenched industrial information economy of the last century threatens the promise of today’s emerging networked information environment.In this comprehensive social theory of the Internet and the networked information economy, Benkler describes how patterns of information, knowledge, and cultural production are changing—and shows that the way information and knowledge are made available can either limit or enlarge the ways people can create and express themselves. He describes the range of legal and policy choices that confront us and maintains that there is much to be gained—or lost—by the decisions we make today.

The Origins of Political Order: From Prehuman Times to the French Revolution


Francis Fukuyama - 2011
    Some went on to create governments that were accountable to their constituents. We take these institutions for granted, but they are absent or are unable to perform in many of today’s developing countries—with often disastrous consequences for the rest of the world.Francis Fukuyama, author of the bestselling The End of History and the Last Man and one of our most important political thinkers, provides a sweeping account of how today’s basic political institutions developed. The first of a major two-volume work, The Origins of Political Order begins with politics among our primate ancestors and follows the story through the emergence of tribal societies, the growth of the first modern state in China, the beginning of the rule of law in India and the Middle East, and the development of political accountability in Europe up until the eve of the French Revolution.Drawing on a vast body of knowledge—history, evolutionary biology, archaeology, and economics—Fukuyama has produced a brilliant, provocative work that offers fresh insights on the origins of democratic societies and raises essential questions about the nature of politics and its discontents.

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws


Dafydd Stuttard - 2007
    The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index

Chaos Under Heaven: Trump, Xi, and the Battle for the Twenty-First Century


Josh Rogin - 2021
    Donald Trump’s surprise electoral victory shattered the fragile understanding between Washington and Beijing, putting the most important relationship of the twenty-first century in the hands of a novice who had bitterly attacked China from the campaign trail. Almost as soon as he entered office, Trump brought to a boil the long-simmering rivalry between the two countries, while also striking up a “friendship” with Chinese president Xi Jinping — whose manipulations of his American counterpart would undermine the White House’s already disjointed response to the historic challenge of a rising China. All the while, Trump’s own officials fought to steer U.S. policy from within. By the time the COVID-19 pandemic erupted in Wuhan, Trump’s love-hate relationship with Xi had sparked a trade war, while Xi’s aggression had pushed the world to the brink of a new Cold War. But their quarrel had also forced a long-overdue reckoning within the United States over China’s audacious foreign-influence operations, horrific human rights abuses, and creeping digital despotism. Ironically, this awakening was one of the biggest foreign-policy victories of Trump’s fractious term in office. ​Filled with shocking revelations drawn from Josh Rogin’s unparalleled access to top U.S. officials from the White House and deep within the country’s foreign policy machine, Chaos Under Heaven reveals an administration at war with itself during perhaps our most urgent hour.

Rise of the Robots: Technology and the Threat of a Jobless Future


Martin Ford - 2015
    In Rise of the Robots, Silicon Valley entrepreneur Martin Ford argues that this is absolutely not the case. As technology continues to accelerate and machines begin taking care of themselves, fewer people will be necessary. Artificial intelligence is already well on its way to making “good jobs” obsolete: many paralegals, journalists, office workers, and even computer programmers are poised to be replaced by robots and smart software. As progress continues, blue and white collar jobs alike will evaporate, squeezing working- and middle-class families ever further. At the same time, households are under assault from exploding costs, especially from the two major industries—education and health care—that, so far, have not been transformed by information technology. The result could well be massive unemployment and inequality as well as the implosion of the consumer economy itself.In Rise of the Robots, Ford details what machine intelligence and robotics can accomplish, and implores employers, scholars, and policy makers alike to face the implications. The past solutions to technological disruption, especially more training and education, aren't going to work, and we must decide, now, whether the future will see broad-based prosperity or catastrophic levels of inequality and economic insecurity. Rise of the Robots is essential reading for anyone who wants to understand what accelerating technology means for their own economic prospects—not to mention those of their children—as well as for society as a whole.

Washington Rules: America's Path to Permanent War


Andrew J. Bacevich - 2010
    In the Obama era, just as in the Bush years, these beliefs remain unquestioned gospel.In a vivid, incisive analysis, Andrew J. Bacevich succinctly presents the origins of this consensus, forged at a moment when American power was at its height. He exposes the preconceptions, biases, and habits that underlie our pervasive faith in military might, especially the notion that overwhelming superiority will oblige others to accommodate America's needs and desires—whether for cheap oil, cheap credit, or cheap consumer goods. And he challenges the usefulness of our militarism as it has become both unaffordable and increasingly dangerous.Though our politicians deny it, American global might is faltering. This is the moment, Bacevich argues, to reconsider the principles which shape American policy in the world—to acknowledge that fixing Afghanistan should not take precedence over fixing Detroit. Replacing this Washington consensus is crucial to America's future, and may yet offer the key to the country's salvation.

World Without Mind: The Existential Threat of Big Tech


Franklin Foer - 2017
    Over the past few decades there has been a revolution in terms of who controls knowledge and information. This rapid change has imperiled the way we think. Without pausing to consider the cost, the world has rushed to embrace the products and services of four titanic corporations. We shop with Amazon; socialize on Facebook; turn to Apple for entertainment; and rely on Google for information. These firms sell their efficiency and purport to make the world a better place, but what they have done instead is to enable an intoxicating level of daily convenience. As these companies have expanded, marketing themselves as champions of individuality and pluralism, their algorithms have pressed us into conformity and laid waste to privacy. They have produced an unstable and narrow culture of misinformation, and put us on a path to a world without private contemplation, autonomous thought, or solitary introspection--a world without mind. In order to restore our inner lives, we must avoid being coopted by these gigantic companies, and understand the ideas that underpin their success.Elegantly tracing the intellectual history of computer science--from Descartes and the enlightenment to Alan Turing to Stuart Brand and the hippie origins of today's Silicon Valley--Foer exposes the dark underpinnings of our most idealistic dreams for technology. The corporate ambitions of Google, Facebook, Apple, and Amazon, he argues, are trampling longstanding liberal values, especially intellectual property and privacy. This is a nascent stage in the total automation and homogenization of social, political, and intellectual life. By reclaiming our private authority over how we intellectually engage with the world, we have the power to stem the tide.At stake is nothing less than who we are, and what we will become. There have been monopolists in the past but today's corporate giants have far more nefarious aims. They're monopolists who want access to every facet of our identities and influence over every corner of our decision-making. Until now few have grasped the sheer scale of the threat. Foer explains not just the looming existential crisis but the imperative of resistance.

Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali


OccupyTheWeb - 2018
    Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password crackerHacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

The Idealist: Aaron Swartz and the Rise of Free Culture on the Internet


Justin Peters - 2016
    He committed suicide in 2013 after being indicted by the government for illegally downloading millions of academic articles from a nonprofit online database. From the age of fifteen, when Swartz, a computer prodigy, worked with Lawrence Lessig to launch Creative Commons, to his years as a fighter for copyright reform and open information, to his work leading the protests against the Stop Online Piracy Act (SOPA), to his posthumous status as a cultural icon, Swartz’s life was inextricably connected to the free culture movement. Now Justin Peters examines Swartz’s life in the context of 200 years of struggle over the control of information.In vivid, accessible prose, The Idealist situates Swartz in the context of other "data moralists" past and present, from lexicographer Noah Webster to ebook pioneer Michael Hart to NSA whistleblower Edward Snowden. In the process, the book explores the history of copyright statutes and the public domain; examines archivists’ ongoing quest to build the “library of the future”; and charts the rise of open access, copyleft, and other ideologies that have come to challenge protectionist IP policies. Peters also breaks down the government’s case against Swartz and explains how we reached the point where federally funded academic research came to be considered private property, and downloading that material in bulk came to be considered a federal crime.The Idealist is an important investigation of the fate of the digital commons in an increasingly corporatized Internet, and an essential look at the impact of the free culture movement on our daily lives and on generations to come.

A Prehistory of the Cloud


Tung-Hui Hu - 2015
    Yet the reality of the cloud is embodied in thousands of massive data centers, any one of which can use as much electricity as a midsized town. Even all these data centers are only one small part of the cloud. Behind that cloud-shaped icon on our screens is a whole universe of technologies and cultural norms, all working to keep us from noticing their existence. In this book, Tung-Hui Hu examines the gap between the real and the virtual in our understanding of the cloud. Hu shows that the cloud grew out of such older networks as railroad tracks, sewer lines, and television circuits. He describes key moments in the prehistory of the cloud, from the game "Spacewar" as exemplar of time-sharing computers to Cold War bunkers that were later reused as data centers. Countering the popular perception of a new "cloudlike" political power that is dispersed and immaterial, Hu argues that the cloud grafts digital technologies onto older ways of exerting power over a population. But because we invest the cloud with cultural fantasies about security and participation, we fail to recognize its militarized origins and ideology. Moving between the materiality of the technology itself and its cultural rhetoric, Hu's account offers a set of new tools for rethinking the contemporary digital environment.

This Is Not Propaganda: Adventures in the War Against Reality


Peter Pomerantsev - 2019
    In this surreal atmosphere created to disorient us and undermine our sense of truth, we’ve lost not only our grip on peace and democracy — but our very notion of what those words even mean.Peter Pomerantsev takes us to the front lines of the disinformation age, where he meets Twitter revolutionaries and pop-up populists, “behavioral change” salesmen, Jihadi fanboys, Identitarians, truth cops, and many others. Forty years after his dissident parents were pursued by the KGB, Pomerantsev finds the Kremlin re-emerging as a great propaganda power. His research takes him back to Russia — but the answers he finds there are not what he expected.Blending reportage, family history, and intellectual adventure, This Is Not Propaganda explores how we can reimagine our politics and ourselves when reality seems to be coming apart.

Thicker Than Water


Tyler Shultz - 2020
    The COO fired back with a dismissive and insulting email, to which Tyler replied: "Consider this my two weeks’ notice."From there, his life spun out of control at the hand of Elizabeth, her team of high-powered lawyers, and the patriarch of Tyler’s own family, George Shultz—one of America’s most prominent statesmen, who sat among the top of the Theranos Board of Directors. And yet, Tyler forged on. To protect his own conscience, the honor and reputation of his grandfather, and the health of patients worldwide.Thicker than Water is Tyler’s as-told-to story—a harrowing and heartbreaking roller coaster of biomedical drama, family intrigue, and redemption—that will ultimately make you feel as though you are at a dinner party, seated next to a brilliant friend with one hell of a story.