The Human Use of Human Beings: Cybernetics and Society


Norbert Wiener - 1949
    Norbert Wiener's classic is one in that small company. Founder of the science of cybernetics—the study of the relationship between computers and the human nervous system—Wiener was widely misunderstood as one who advocated the automation of human life. As this book reveals, his vision was much more complex and interesting. He hoped that machines would release people from relentless and repetitive drudgery in order to achieve more creative pursuits. At the same time he realized the danger of dehumanizing and displacement. His book examines the implications of cybernetics for education, law, language, science, technology, as he anticipates the enormous impact—in effect, a third industrial revolution—that the computer has had on our lives.

No Filter: The Inside Story of Instagram


Sarah Frier - 2020
    Since its creation in 2010, Instagram’s fun and simple interface has captured our collective imagination, swiftly becoming a way of life. In No Filter: The Inside Story of Instagram, technology reporter Sarah Frier explains how Instagram’s founders married art and technology to overcome skeptics and to hook the public on visual storytelling. At first, Instagram initially attracted artisans, but then the platform exploded in popularity among the masses, creating an entire industry of digital influencers that’s now worth tens of billions of dollars. Eighteen months after Instagram’s launch and explosive growth, the founders—Kevin Systrom and Mike Krieger—made the gut-wrenching decision to sell the company to Facebook. For most companies, that would be the end of the story; but for Instagram, it was only the beginning. Instagram borrowed some lessons from Facebook and rejected others, until eventually its success stirred tension with Facebook’s CEO Mark Zuckerberg, just as Facebook became embroiled in a string of public crises. Frier unearths the details that led to the cofounders’ departure, bringing to light dramatic moments unknown to the public until now. At its heart, No Filter draws on unprecedented exclusive access—from the founders of Instagram, as well as employees, executives, and competitors; hedge fund billionaire Ray Dalio; Anna Wintour of Vogue; Kris Jenner of the Kardashian-Jenner empire; and a plethora of influencers, from fashionistas with millions of followers to owners of famous dogs worldwide—to show how Instagram has fundamentally changed the way we communicate, shop, eat, and travel. The book brings readers inside users’ strategies to craft their personal image and fame, explaining how the company’s product decisions have affected the structure of our society. From teenagers to the pope, No Filter tells the captivating story of how Instagram not only created a new industry but also changed our lives.

The Hacker Playbook 3: Practical Guide To Penetration Testing


Peter Kim - 2018
    With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory. The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments? The real question we need to ask ourselves is, are all the safeguards we are putting in place working? This is what The Hacker Playbook 3 - Red Team Edition is all about. By now, we are all familiar with penetration testing, but what exactly is a Red Team? Red Teams simulate real-world, advanced attacks to test how well your organization's defensive teams respond if you were breached. They find the answers to questions like: Do your incident response teams have the right tools, skill sets, and people to detect and mitigate these attacks? How long would it take them to perform these tasks and is it adequate? This is where you, as a Red Teamer, come in to accurately test and validate the overall security program. THP3 will take your offensive hacking skills, thought processes, and attack paths to the next level. This book focuses on real-world campaigns and attacks, exposing you to different initial entry points, exploitation, custom malware, persistence, and lateral movement--all without getting caught! This heavily lab-based book will include multiple Virtual Machines, testing environments, and custom THP tools. So grab your helmet and let's go break things! For more information, visit http://thehackerplaybook.com/about/.

Code Complete


Steve McConnell - 1993
    Now this classic book has been fully updated and revised with leading-edge practices--and hundreds of new code samples--illustrating the art and science of software construction. Capturing the body of knowledge available from research, academia, and everyday commercial practice, McConnell synthesizes the most effective techniques and must-know principles into clear, pragmatic guidance. No matter what your experience level, development environment, or project size, this book will inform and stimulate your thinking--and help you build the highest quality code. Discover the timeless techniques and strategies that help you: Design for minimum complexity and maximum creativity Reap the benefits of collaborative development Apply defensive programming techniques to reduce and flush out errors Exploit opportunities to refactor--or evolve--code, and do it safely Use construction practices that are right-weight for your project Debug problems quickly and effectively Resolve critical construction issues early and correctly Build quality into the beginning, middle, and end of your project

A Mind at Play: How Claude Shannon Invented the Information Age


Jimmy Soni - 2017
    He constructed a fleet of customized unicycles and a flamethrowing trumpet, outfoxed Vegas casinos, and built juggling robots. He also wrote the seminal text of the digital revolution, which has been called “the Magna Carta of the Information Age.” His discoveries would lead contemporaries to compare him to Albert Einstein and Isaac Newton. His work anticipated by decades the world we’d be living in today—and gave mathematicians and engineers the tools to bring that world to pass.In this elegantly written, exhaustively researched biography, Jimmy Soni and Rob Goodman reveal Claude Shannon’s full story for the first time. It’s the story of a small-town Michigan boy whose career stretched from the era of room-sized computers powered by gears and string to the age of Apple. It’s the story of the origins of our digital world in the tunnels of MIT and the “idea factory” of Bell Labs, in the “scientists’ war” with Nazi Germany, and in the work of Shannon’s collaborators and rivals, thinkers like Alan Turing, John von Neumann, Vannevar Bush, and Norbert Wiener.And it’s the story of Shannon’s life as an often reclusive, always playful genius. With access to Shannon’s family and friends, A Mind at Play brings this singular innovator and creative genius to life.

Goliath: The 100-Year War Between Monopoly Power and Democracy


Matt Stoller - 2019
    A concentration of power, whether in the hands of a military dictator or a JP Morgan, was understood as autocratic and dangerous to individual liberty and democracy. This idea stretched back to the country’s founding. In the 1930s, people observed that the Great Depression was caused by financial concentration in the hands of a few whose misuse of their power induced a financial collapse. They drew on this tradition to craft the New Deal. In Goliath, Matt Stoller explains how authoritarianism and populism have returned to American politics for the first time in eighty years, as the outcome of the 2016 election shook our faith in democratic institutions. It has brought to the fore dangerous forces that many modern Americans never even knew existed. Today’s bitter recriminations and panic represent more than just fear of the future, they reflect a basic confusion about what is happening and the historical backstory that brought us to this moment. The true effects of populism, a shrinking middle class, and concentrated financial wealth are only just beginning to manifest themselves under the current administrations. The lessons of Stoller’s study will only grow more relevant as time passes. Building upon his viral article in The Atlantic, “How the Democrats Killed Their Populist Soul,” Stoller illustrates in rich detail how we arrived at this tenuous moment, and the steps we must take to create a new democracy.

Arms and Influence


Thomas C. Schelling - 1967
    Schelling considers the ways in which military capabilities—real or imagined—are used as bargaining power.  This edition contains a new foreword by the author where he considers the book’s relevance over forty years after its first publication.  Included as an afterword is the text of Professor Schelling’s Nobel acceptance speech in which he reflects upon the global taboo that has emerged against nuclear weapons since Hiroshima."This is a brilliant and hardheaded book.  It will frighten those who prefer not to dwell on the unthinkable and infuriate those who have taken refuge in stereotypes and moral attitudinizing."—Gordon A. Craig, New York Times Book ReviewThomas C. Schelling is Distinguished University Professor, Department of Economics and School of Public Affairs, University of Maryland and Lucius N. Littauer Professor of Political Economy, Emeritus, Harvard University. He is co-recipient of the 2005 Nobel Prize in Economics. The Henry L. Stimson Lectures Series

Googled: The End of the World as We Know It


Ken Auletta - 2009
    This is a ride on the Google wave, and the fullest account of how it formed and crashed into traditional media businesses. With unprecedented access to Google's founders and executives, as well as to those in media who are struggling to keep their heads above water, Ken Auletta reveals how the industry is being disrupted and redefined.Auletta goes inside Google's closed-door meetings, introducing Google's notoriously private founders, Larry Page and Sergey Brin, as well as those who work with - and against - them. In Googled, the reader discovers the 'secret sauce' of the company's success and why the worlds of 'new' and 'old' media often communicate as if residents of different planets. It may send chills down traditionalists' spines, but it's a crucial roadmap to the future of media business: the Google story may well be the canary in the coal mine.Googled is candid, objective and authoritative. Crucially, it's not just a history or reportage: it's ahead of the curve and unlike any other Google books, which tend to have been near-histories, somewhat starstruck, now out of date or which fail to look at the full synthesis of business and technology.

Hadoop Explained


Aravind Shenoy - 2014
    Hadoop allowed small and medium sized companies to store huge amounts of data on cheap commodity servers in racks. The introduction of Big Data has allowed businesses to make decisions based on quantifiable analysis. Hadoop is now implemented in major organizations such as Amazon, IBM, Cloudera, and Dell to name a few. This book introduces you to Hadoop and to concepts such as ‘MapReduce’, ‘Rack Awareness’, ‘Yarn’ and ‘HDFS Federation’, which will help you get acquainted with the technology.

Technically Wrong: Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech


Sara Wachter-Boettcher - 2017
    But few of us realize just how many oversights, biases, and downright ethical nightmares are baked inside the tech products we use every day. It’s time we change that.In Technically Wrong, Sara Wachter-Boettcher demystifies the tech industry, leaving those of us on the other side of the screen better prepared to make informed choices about the services we use—and to demand more from the companies behind them.

The Bitcoin Standard: The Decentralized Alternative to Central Banking


Saifedean Ammous - 2018
    Can this young upstart money challenge the global monetary order? Economist Saifedean Ammous traces the history of the technologies of money to seashells, limestones, cattle, salt, beads, metals, and government debt, explaining what gave these technologies their monetary role, what makes for sound money, and the benefits of a sound monetary regime to economic growth, innovation, culture, trade, individual freedom, and international peace.The monetary and historical analysis sets the stage for understanding the mechanics of the operation of Bitcoin, the reasons for its initial success, and the role it could play in an information economy. Rather than serving as a currency and network for consumer purchases, the author argues Bitcoin is better suited as a store of value and network for settlement between large financial institutions. With an automated and perfectly predictable monetary policy, and the ability to perform final settlement of large sums across the world in a matter of minutes, Bitcoin's true importance may just lie in providing a decentralized, neutral, free-market alternative to national central banks.

Python for Kids


Jason R. Briggs - 2012
    Jason Briggs, author of the popular online tutorial "Snake Wrangling for Kids," begins with the basics of how to install Python and write simple commands. In bite-sized chapters, he instructs readers on the essentials of Python, including how to use Python's extensive standard library, the difference between strings and lists, and using for-loops and while-loops. By the end of the book, readers have built a game and created drawings with Python's graphics library, Turtle. Each chapter closes with fun and relevant exercises that challenge the reader to put their newly acquired knowledge to the test.

Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali


OccupyTheWeb - 2018
    Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password crackerHacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?