Security Engineering: A Guide to Building Dependable Distributed Systems


Ross J. Anderson - 2008
    Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

Google Hacking for Penetration Testers, Volume 1


Johnny Long - 2004
    What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of informationleakage. *First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.

Writing on the Wall: Social Media - The First 2,000 Years


Tom Standage - 2013
    Indeed, as Tom Standage reveals in his scintillating new book, social media is anything but a new phenomenon.From the papyrus letters that Roman statesmen used to exchange news across the Empire to the advent of hand-printed tracts of the Reformation to the pamphlets that spread propaganda during the American and French revolutions, Standage chronicles the increasingly sophisticated ways people shared information with each other, spontaneously and organically, down the centuries. With the rise of newspapers in the nineteenth century, then radio and television, “mass media” consolidated control of information in the hands of a few moguls. However, the Internet has brought information sharing full circle, and the spreading of news along social networks has reemerged in powerful new ways.A fresh, provocative exploration of social media over two millennia, Writing on the Wall reminds us how modern behavior echoes that of prior centuries-the Catholic Church, for example, faced similar dilemmas in deciding whether or how to respond to Martin Luther's attacks in the early sixteenth century to those that large institutions confront today in responding to public criticism on the Internet. Invoking the likes of Thomas Paine and Vinton Cerf, co-inventor of the Internet, Standage explores themes that have long been debated: the tension between freedom of expression and censorship; whether social media trivializes, coarsens or enhances public discourse; and its role in spurring innovation, enabling self-promotion, and fomenting revolution. As engaging as it is visionary, Writing on the Wall draws on history to cast new light on today's social media and encourages debate and discussion about how we'll communicate in the future.

The Human Use of Human Beings: Cybernetics and Society


Norbert Wiener - 1949
    Norbert Wiener's classic is one in that small company. Founder of the science of cybernetics—the study of the relationship between computers and the human nervous system—Wiener was widely misunderstood as one who advocated the automation of human life. As this book reveals, his vision was much more complex and interesting. He hoped that machines would release people from relentless and repetitive drudgery in order to achieve more creative pursuits. At the same time he realized the danger of dehumanizing and displacement. His book examines the implications of cybernetics for education, law, language, science, technology, as he anticipates the enormous impact—in effect, a third industrial revolution—that the computer has had on our lives.

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation


Bruce Dang - 2014
    Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.

The Fourth Industrial Revolution


Klaus Schwab - 2016
    Characterized by a range of new technologies that are fusing the physical, digital and biological worlds, the developments are affecting all disciplines, economies, industries and governments, and even challenging ideas about what it means to be human.Artificial intelligence is already all around us, from supercomputers, drones and virtual assistants to 3D printing, DNA sequencing, smart thermostats, wear­able sensors and microchips smaller than a grain of sand. But this is just the beginning: nanomaterials 200 times stronger than steel and a million times thinner than a strand of hair and the first transplant of a 3D printed liver are already in development. Imagine “smart factories” in which global systems of manu­facturing are coordinated virtually, or implantable mobile phones made of biosynthetic materials.The fourth industrial revolution, says Schwab, is more significant, and its ramifications more profound, than in any prior period of human history. He outlines the key technologies driving this revolution and discusses the major impacts expected on government, business, civil society and individu­als. Schwab also offers bold ideas on how to harness these changes and shape a better future—one in which technology empowers people rather than replaces them; progress serves society rather than disrupts it; and in which innovators respect moral and ethical boundaries rather than cross them. We all have the opportunity to contribute to developing new frame­works that advance progress.

Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves


Adam Levin - 2015
    So what do you do when it's your turn? Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam filters, and those are good ideas as far as they go. But with the breaches of huge organizations like Target, AshleyMadison.com, JPMorgan Chase, Sony, Anthem, and even the US Office of Personnel Management, more than a billion personal records have already been stolen, and chances are good that you're already in harm's way. This doesn't mean there's no hope. Your identity may get stolen, but it doesn't have to be a life-changing event. Adam Levin, a longtime consumer advocate and identity fraud expert, provides a method to help you keep hackers, phishers, and spammers from becoming your problem. Levin has seen every scam under the sun: fake companies selling "credit card insurance"; criminal, medical, and child identity theft; emails that promise untold riches for some personal information; catphishers, tax fraud, fake debt collectors who threaten you with legal action to confirm your account numbers; and much more. As Levin shows, these folks get a lot less scary if you see them coming. With a clearheaded, practical approach, Swiped is your guide to surviving the identity theft epidemic. Even if you've already become a victim, this strategic book will help you protect yourself, your identity, and your sanity.

How America Lost Its Secrets: Edward Snowden, the Man and the Theft


Edward Jay Epstein - 2017
    After details of American government surveillance were published in 2013, Edward Snowden, formerly a subcontracted IT analyst for the NSA, became the center of an international controversy: Was he a hero, traitor, whistle-blower, spy? Was his theft legitimized by the nature of the information he exposed? When is it necessary for governmental transparency to give way to subterfuge? Edward Jay Epstein brings a lifetime of journalistic and investigative acumen to bear on these and other questions, delving into both how our secrets were taken and the man who took them. He makes clear that by outsourcing parts of our security apparatus, the government has made classified information far more vulnerable; how Snowden sought employment precisely where he could most easily gain access to the most sensitive classified material; and how, though he claims to have acted to serve his country, Snowden is treated as a prized intelligence asset in Moscow, his new home."

Why Nations Fail: The Origins of Power, Prosperity, and Poverty


Daron Acemoğlu - 2012
    None of these factors is either definitive or destiny. Otherwise, how to explain why Botswana has become one of the fastest growing countries in the world, while other African nations, such as Zimbabwe, the Congo, and Sierra Leone, are mired in poverty and violence? Daron Acemoglu and James Robinson conclusively show that it is man-made political and economic institutions that underlie economic success (or lack of it). Korea, to take just one of their fascinating examples, is a remarkably homogeneous nation, yet the people of North Korea are among the poorest on earth while their brothers and sisters in South Korea are among the richest. The south forged a society that created incentives, rewarded innovation, and allowed everyone to participate in economic opportunities. The economic success thus spurred was sustained because the government became accountable and responsive to citizens and the great mass of people. Sadly, the people of the north have endured decades of famine, political repression, and very different economic institutions—with no end in sight. The differences between the Koreas is due to the politics that created these completely different institutional trajectories. Based on fifteen years of original research Acemoglu and Robinson marshall extraordinary historical evidence from the Roman Empire, the Mayan city-states, medieval Venice, the Soviet Union, Latin America, England, Europe, the United States, and Africa to build a new theory of political economy with great relevance for the big questions of today, including:    - China has built an authoritarian growth machine. Will it continue to grow at such high speed and overwhelm the West?    - Are America’s best days behind it? Are we moving from a virtuous circle in which efforts by elites to aggrandize power are resisted to a vicious one that enriches and empowers a small minority?    - What is the most effective way to help move billions of people from the rut of poverty to prosperity? More philanthropy from the wealthy nations of the West? Or learning the hard-won lessons of Acemoglu and Robinson’s breakthrough ideas on the interplay between inclusive political and economic institutions? Why Nations Fail will change the way you look at—and understand—the world.

Stealing the Network: How to Own a Continent


Ryan Russell - 2004
    While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring* An informative and scary insight into the boundries of hacking and cyber-terrorism* Written by a team of the most accomplished cyber-security specialists in the world

The Mental Floss History of the World: An Irreverent Romp through Civilization's Best Bits


Erik Sass - 2008
    As audacious as it is edifying, here is a hilarious and irreverent—yet always historically accurate—overview of the ascent (or descent) of humankind, courtesy of the same rebel geniuses who brought you Mental Floss presents Condensed Knowledge and Mental Floss Presents Forbidden Knowledge. Updated with all the hot topics and events of the past few years, The Mental Floss History of the World is proof positive that just because something’s true doesn’t mean it’s boring.

The End of Absence: Reclaiming What We've Lost in a World of Constant Connection


Michael Harris - 2014
    What does this unavoidable fact mean?For future generations, it won't mean anything very obvious. They will be so immersed in online life that questions about the Internet's basic purpose or meaning will vanish.But those of us who have lived both with and without the crowded connectivity of online life have a rare opportunity. We can still recognize the difference between Before and After. We catch ourselves idly reaching for our phones at the bus stop. Or we notice how, mid-conversation, a fumbling friend dives into the perfect recall of Google.In this eloquent and thought-provoking book, Michael Harris argues that amid all the changes we're experiencing, the most interesting is the one that future generations will find hardest to grasp. That is the end of absence-the loss of lack. The daydreaming silences in our lives are filled; the burning solitudes are extinguished. There's no true "free time" when you carry a smartphone. Today's rarest commodity is the chance to be alone with your own thoughts.

If Then: How the Simulmatics Corporation Invented the Future


Jill Lepore - 2020
    Jill Lepore, best-selling author of These Truths, came across the company’s papers in MIT’s archives and set out to tell this forgotten history, the long-lost backstory to the methods, and the arrogance, of Silicon Valley.Founded in 1959 by some of the nation’s leading social scientists—“the best and the brightest, fatally brilliant, Icaruses with wings of feathers and wax, flying to the sun”—Simulmatics proposed to predict and manipulate the future by way of the computer simulation of human behavior. In summers, with their wives and children in tow, the company’s scientists met on the beach in Long Island under a geodesic, honeycombed dome, where they built a “People Machine” that aimed to model everything from buying a dishwasher to counterinsurgency to casting a vote. Deploying their “People Machine” from New York, Washington, Cambridge, and even Saigon, Simulmatics’ clients included the John F. Kennedy presidential campaign, the New York Times, the Department of Defense, and dozens of major manufacturers: Simulmatics had a hand in everything from political races to the Vietnam War to the Johnson administration’s ill-fated attempt to predict race riots. The company’s collapse was almost as rapid as its ascent, a collapse that involved failed marriages, a suspicious death, and bankruptcy. Exposed for false claims, and even accused of war crimes, it closed its doors in 1970 and all but vanished. Until Lepore came across the records of its remains.The scientists of Simulmatics believed they had invented “the A-bomb of the social sciences.” They did not predict that it would take decades to detonate, like a long-buried grenade. But, in the early years of the twenty-first century, that bomb did detonate, creating a world in which corporations collect data and model behavior and target messages about the most ordinary of decisions, leaving people all over the world, long before the global pandemic, crushed by feelings of helplessness. This history has a past; If Then is its cautionary tale.

I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy


Lori Andrews - 2012
    Social networks are the defining cultural movement of our time. Over a half a billion people are on Facebook alone. If Facebook were a country, it would be the third largest nation in the world. But while that nation appears to be a comforting small town in which we can share photos of friends and quaint bits of trivia about our lives, it is actually a lawless battle zone—a frontier with all the hidden and unpredictable dangers of any previously unexplored place. Social networks offer freedom. An ordinary individual can be a reporter, alerting the world to breaking news of a natural disaster or a political crisis. A layperson can be a scientist, participating in a crowd-sourced research project. Or an investigator, helping cops solve a crime. But as we work and chat and date (and sometimes even have sex) over the web, traditional rights may be slipping away. Colleges and employers routinely reject applicants because of information found on social networks. Cops use photos from people’s profiles to charge them with crimes—or argue for harsher sentences. Robbers use postings about vacations to figure out when to break into homes. At one school, officials used cameras on students’ laptops to spy on them in their bedrooms. The same power of information that can topple governments can also topple a person’s career, marriage, or future. What Andrews proposes is a Constitution for the web, to extend our rights to this wild new frontier. This vitally important book will generate a storm of attention.

The Shia Revival: How Conflicts within Islam Will Shape the Future


Vali Nasr - 2006
    Still essential and still timely ten years after its original publication, The Shia Revival provides a unique and objective understanding of the 1,400-year bitter struggle between Shias and Sunnis and sheds crucial light on its modern-day consequences. A new epilogue elucidates the rise of ISIS and ongoing tensions between Iran and Saudi Arabia.