Book picks similar to
The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age by Adam Segal
cybersecurity
non-fiction
nonfiction
technology
Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy
Cathy O'Neil - 2016
Increasingly, the decisions that affect our lives--where we go to school, whether we can get a job or a loan, how much we pay for health insurance--are being made not by humans, but by machines. In theory, this should lead to greater fairness: Everyone is judged according to the same rules.But as mathematician and data scientist Cathy O'Neil reveals, the mathematical models being used today are unregulated and uncontestable, even when they're wrong. Most troubling, they reinforce discrimination--propping up the lucky, punishing the downtrodden, and undermining our democracy in the process.
How the World Works
Noam Chomsky - 2011
. . or at least he wasn’t until these books came along. Made up of intensively edited speeches and interviews, they offer something not found anywhere else: pure Chomsky, with every dazzling idea and penetrating insight intact, delivered in clear, accessible, reader-friendly prose.Published as four short books in the famous Real Story series—What Uncle Sam Really Wants; The Prosperous Few and the Restless Many; Secrets, Lies and Democracy; and The Common Good—they’ve collectively sold almost 600,000 copies.And they continue to sell year after year after year because Chomsky’s ideas become, if anything, more relevant as time goes by. For example, twenty years ago he pointed out that “in 1970, about 90% of international capital was used for trade and long-term investment—more or less productive things—and 10% for speculation. By 1990, those figures had reversed.” As we know, speculation continued to increase exponentially. We’re paying the price now for not heeding him them.
Just for Fun: The Story of an Accidental Revolutionary
Linus Torvalds - 2001
Then he wrote a groundbreaking operating system and distributed it via the Internet -- for free. Today Torvalds is an international folk hero. And his creation LINUX is used by over 12 million people as well as by companies such as IBM.Now, in a narrative that zips along with the speed of e-mail, Torvalds gives a history of his renegade software while candidly revealing the quirky mind of a genius. The result is an engrossing portrayal of a man with a revolutionary vision, who challenges our values and may change our world.
Eniac: The Triumphs and Tragedies of the World's First Computer
Scott McCartney - 1999
10 illustrations.
Fantasyland: How America Went Haywire: A 500-Year History
Kurt Andersen - 2017
America was founded by wishful dreamers, magical thinkers, and true believers, by hucksters and their suckers. Fantasy is deeply embedded in our DNA.Over the course of five centuries--from the Salem witch trials to Scientology to the Satanic Panic of the 1980s, from P. T. Barnum to Hollywood and the anything-goes, wild-and-crazy sixties, from conspiracy theories to our fetish for guns and obsession with extraterrestrials--our love of the fantastic has made America exceptional in a way that we've never fully acknowledged. From the start, our ultra-individualism was attached to epic dreams and epic fantasies--every citizen was free to believe absolutely anything, or to pretend to be absolutely anybody. With the gleeful erudition and tell-it-like-it-is ferocity of a Christopher Hitchens, Andersen explores whether the great American experiment in liberty has gone off the rails.
The Annotated Turing: A Guided Tour Through Alan Turing's Historic Paper on Computability and the Turing Machine
Charles Petzold - 2008
Turing
Mathematician Alan Turing invented an imaginary computer known as the Turing Machine; in an age before computers, he explored the concept of what it meant to be "computable," creating the field of computability theory in the process, a foundation of present-day computer programming.The book expands Turing's original 36-page paper with additional background chapters and extensive annotations; the author elaborates on and clarifies many of Turing's statements, making the original difficult-to-read document accessible to present day programmers, computer science majors, math geeks, and others.Interwoven into the narrative are the highlights of Turing's own life: his years at Cambridge and Princeton, his secret work in cryptanalysis during World War II, his involvement in seminal computer projects, his speculations about artificial intelligence, his arrest and prosecution for the crime of "gross indecency," and his early death by apparent suicide at the age of 41.
The Wires of War: Technology and the Global Struggle for Power
Jacob Helberg - 2021
During this time, he found himself in the midst of what can only be described as a quickly escalating two-front technology cold war between democracy and autocracy. On the front-end, we’re fighting to control the software—applications, news information, social media platforms, and more—of what we see on the screens of our computers, tablets, and phones, a clash which started out primarily with Russia but now increasingly includes China and Iran. Even more ominously, we’re also engaged in a hidden back-end battle—largely with China—to control the internet’s hardware, which includes devices like cellular phones, satellites, fiber-optic cables, and 5G networks. This tech-fueled war will shape the world’s balance of power for the coming century as autocracies exploit 21st-century methods to redivide the world into 20th-century-style spheres of influence. Without a firm partnership with the government, Silicon Valley is unable to protect democracy from the autocrats looking to sabotage it from Beijing to Moscow and Tehran. Helberg offers “unnervingly convincing evidence that time is running out in the ‘gray war’ with the enemies of freedom” (Kirkus Reviews) which could affect every meaningful aspect of our lives, including our economy, our infrastructure, our national security, and ultimately, our national sovereignty.
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman - 2014
This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software.
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
Michael Bazzell - 2012
In this book, he shares his methods in great detail. Each step of his process is explained throughout twenty-five chapters of specialized websites, software solutions, and creative search techniques. Over 250 resources are identified with narrative tutorials and screen captures. This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to "think outside the box" when scouring the internet for personal information. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to use various technologies for an unintended purpose. This book will greatly improve anyone's online investigative skills. Among other techniques, you will learn how to locate: Hidden Social Network Content Cell Phone Subscriber Information Deleted Websites & Posts Missing Facebook Profile Data Full Twitter Account Data Alias Social Network Profiles Free Investigative Software Useful Browser Extensions Alternative Search Engine Results Website Owner Information Photo GPS & Metadata Live Streaming Social Content Social Content by Location IP Addresses of Users Additional User Accounts Sensitive Documents & Photos Private Email Addresses Duplicate Video Posts Mobile App Network Data Unlisted Addresses s Public Government Records Document Metadata Rental Vehicle Contracts Online Criminal Activity Personal Radio Communications Compromised Email Information Automated Collection Solutions Linux Investigative Programs Dark Web Content (Tor) Restricted YouTube Content Hidden Website Details Vehicle Registration Details
What the Dormouse Said: How the Sixties Counterculture Shaped the Personal Computer Industry
John Markoff - 2005
Many accounts of the birth of personal computing have been written, but this is the first close look at the drug habits of the earliest pioneers." --New York TimesMost histories of the personal computer industry focus on technology or business. John Markoff's landmark book is about the culture and consciousness behind the first PCs--the culture being counter- and the consciousness expanded, sometimes chemically. It's a brilliant evocation of Stanford, California, in the 1960s and '70s, where a group of visionaries set out to turn computers into a means for freeing minds and information. In these pages one encounters Ken Kesey and the phone hacker Cap'n Crunch, est and LSD, The Whole Earth Catalog and the Homebrew Computer Lab. What the Dormouse Said is a poignant, funny, and inspiring book by one of the smartest technology writers around.
The Future: Six Drivers of Global Change
Al Gore - 2013
Ours is a time of revolutionary change that has no precedent in history. With the same passion he brought to the challenge of climate change, and with his decades of experience on the front lines of global policy, Al Gore surveys our planet’s beclouded horizon and offers a sober, learned, and ultimately hopeful forecast in the visionary tradition of Alvin Toffler’s Future Shock and John Naisbitt’s Megatrends. In The Future, Gore identifies the emerging forces that are reshaping our world: • Ever-increasing economic globalization has led to the emergence of what he labels “Earth Inc.”—an integrated holistic entity with a new and different relationship to capital, labor, consumer markets, and national governments than in the past. • The worldwide digital communications, Internet, and computer revolutions have led to the emergence of “the Global Mind,” which links the thoughts and feelings of billions of people and connects intelligent machines, robots, ubiquitous sensors, and databases. • The balance of global political, economic, and military power is shifting more profoundly than at any time in the last five hundred years—from a U.S.-centered system to one with multiple emerging centers of power, from nation-states to private actors, and from political systems to markets. • A deeply flawed economic compass is leading us to unsustainable growth in consumption, pollution flows, and depletion of the planet’s strategic resources of topsoil, freshwater, and living species. • Genomic, biotechnology, neuroscience, and life sciences revolutions are radically transforming the fields of medicine, agriculture, and molecular science—and are putting control of evolution in human hands. • There has been a radical disruption of the relationship between human beings and the earth’s ecosystems, along with the beginning of a revolutionary transformation of energy systems, agriculture, transportation, and construction worldwide. From his earliest days in public life, Al Gore has been warning us of the promise and peril of emergent truths—no matter how “inconvenient” they may seem to be. As absorbing as it is visionary, The Future is a map of the world to come, from a man who has looked ahead before and been proven all too right.Praise for The Future “Magisterial . . . The passion is unmistakable. So is the knowledge. Practically every page offers an illumination.”—Bloomberg “In The Future . . . Gore takes on a subject whose scale matches that of his achievements and ambition.”—The New York Times Book Review “Historically grounded . . . Gore’s strengths lie in his passion for the subject and in his ability to take the long view by putting current events and trends in historical context.”—Publishers Weekly “Provocative, smart, densely argued . . . a tour de force of Big Picture thinking.”—Kirkus Reviews (starred review) “A luminously intelligent analysis that is packed with arresting ideas and facts.”—The Guardian
Free Software, Free Society: Selected Essays
Richard M. Stallman - 2002
Healso discusses the social aspects of software and how free softwarecan create community and social justice.Given the current turmoil in copyright and patent laws, includingthe DMCA and proposed CBDTPA, these essays are more relevant thanever. Stallman tackles head-on the essential issues driving thecurrent changes in copyright law. He argues that for creativity toflourish, software must be free of inappropriate and overly-broadlegal constraints. Over the past twenty years his arguments andactions have changed the course of software history; this new book issure to impact the future of software and legal policies in the yearsto come.Lawrence Lessig, the author of two well-known books on similar topics,writes the introduction. He is a noted legal expert on copyright lawand a Stanford Law School professor.
The Next 100 Years: A Forecast for the 21st Century
George Friedman - 2008
It imagines passing clouds to be permanent and is blind to powerful, long-term shifts taking place in full view of the world.” —George Friedman In his long-awaited and provocative new book, George Friedman turns his eye on the future—offering a lucid, highly readable forecast of the changes we can expect around the world during the twenty-first century. He explains where and why future wars will erupt (and how they will be fought), which nations will gain and lose economic and political power, and how new technologies and cultural trends will alter the way we live in the new century.The Next 100 Years draws on a fascinating exploration of history and geopolitical patterns dating back hundreds of years. Friedman shows that we are now, for the first time in half a millennium, at the dawn of a new era—with changes in store, including:• The U.S.-Jihadist war will conclude—replaced by a second full-blown cold war with Russia.• China will undergo a major extended internal crisis, and Mexico will emerge as an important world power.• A new global war will unfold toward the middle of the century between the United States and an unexpected coalition from Eastern Europe, Eurasia, and the Far East; but armies will be much smaller and wars will be less deadly.• Technology will focus on space—both for major military uses and for a dramatic new energy resource that will have radical environmental implications.• The United States will experience a Golden Age in the second half of the century.Written with the keen insight and thoughtful analysis that has made George Friedman a renowned expert in geopolitics and forecasting, The Next 100 Years presents a fascinating picture of what lies ahead.For continual, updated analysis and supplemental material, go to www.Stratfor.com
CISSP Study Guide
Eric Conrad - 2010
The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. It also provides tips on how to prepare for the exam and take the exam. It also contains CISSP practice quizzes to test ones knowledge. The first domain provides information about risk analysis and mitigation. It also discusses security governance. The second domain discusses different techniques for access control, which is the basis for all the security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental for operating the system and software security components. Domain 6 is a critical domain in the Common Body of Knowledge, the Business Continuity Planning, and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domains 7, 8, and 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework in determining the laws about information system.
Playing to the Edge: American Intelligence in the Age of Terror
Michael V. Hayden - 2016
Otherwise, by playing back, you may protect yourself, but you will be less successful in protecting America. "Play to the edge" was Hayden's guiding principle when he ran the National Security Agency, and it remained so when he ran CIA. In his view, many shortsighted and uninformed people are quick to criticize, and this book will give them much to chew on but little easy comfort; it is an unapologetic insider's look told from the perspective of the people who faced awesome responsibilities head on, in the moment. How did American intelligence respond to terrorism, a major war and the most sweeping technological revolution in the last 500 years? What was NSA before 9/11 and how did it change in its aftermath? Why did NSA begin the controversial terrorist surveillance program that included the acquisition of domestic phone records? What else was set in motion during this period that formed the backdrop for the infamous Snowden revelations in 2013? As Director of CIA in the last three years of the Bush administration, Hayden had to deal with the rendition, detention and interrogation program as bequeathed to him by his predecessors. He also had to ramp up the agency to support its role in the targeted killing program that began to dramatically increase in July 2008. This was a time of great crisis at CIA, and some agency veterans have credited Hayden with actually saving the agency. He himself won't go that far, but he freely acknowledges that CIA helped turn the American security establishment into the most effective killing machine in the history of armed conflict. For 10 years, then, General Michael Hayden was a participant in some of the most telling events in the annals of American national security. General Hayden's goals are in writing this book are simple and unwavering: No apologies. No excuses. Just what happened. And why. As he writes, "There is a story here that deserves to be told, without varnish and without spin. My view is my view, and others will certainly have different perspectives, but this view deserves to be told to create as complete a history as possible of these turbulent times. I bear no grudges, or at least not many, but I do want this to be a straightforward and readable history for that slice of the American population who depend on and appreciate intelligence, but who do not have the time to master its many obscure characteristics."