Book picks similar to
Privacy On The Line: The Politics Of Wiretapping And Encryption by Whitfield Diffie
non-fiction
intelligence
infosec
cryptography
Blood Makes the Grass Grow: A Norwegian Volunteer's War Against the Islamic State
Mike Peshmerganor - 2018
August 2014: ISIS continues its reign of terror, conquering new areas in Iraq and Syria, leaving tens of thousands of dead and millions displaced in their homelands. International news shows gruesome images of massacres and ethnic cleansing. A horrified Norwegian soldier at Camp Rena, shocked by Norway’s unwillingness to commit troops to eradicate the terrorists, decides to take matters into his own hands and travels to the Kurdish front line in Iraq.
In this gripping memoir, Mike Peshmerganor recounts how his Kurdish heritage, liberal Norwegian upbringing and military training shaped his worldview and drew him into the fight against militant Islamism. Armed only with gear he purchased himself and the name of a Kurdish contact, Mike is thrust into a military culture completely foreign to Westerners; where soldiers work without pay, adequate food and even ammunition, and their revered leader is a former hitman. Here are dramatic firefights against the world’s most feared terrorist organization, and insight into the mindset of a true warrior. Mike Peshmerganor is a pseudonym. He escaped from Kurdistan as an infant with his family, grew up in Eastern Norway and served in Norway’s elite Telemark Battalion. "I couldn’t think of a single better reason for the government to send troops abroad than to stop an ongoing genocide. And what about all the foreign fighters from Europe who fought for ISIS? Didn’t we have a responsibility to stop our own citizens from actively perpetrating war crimes and other atrocities in Iraq? Who will prevent them from returning home and carrying out terrorist attacks here, in
our own cities? I realized it was futile to wait for Norway to engage directly in the fight against ISIS. I had to do it on my own."
White Water Red Hot Lead: On Board U.S. Navy Swift Boats in Vietnam
Dan Daly - 2015
The boats patrolled the coast and rivers of South Vietnam, with the average age of the crew being twenty-four. Their days consisted of deadly combat, intense lightning firefights, storms and many hidden dangers.This action-packed story of combat written by Dan Daly, a Vietnam combat veteran who was the Officer in Charge of PCF 76 makes you part of the Swift Boat crew. The six man crew of PCF 76 were volunteers from all over the United States, eager to serve their country in a highly unique type of duty not seen since the PT boats of WWII. This inexperienced and disparate group of men would meld into a combat team - a team that formed an unbreakable, lifelong bond.After training they were plunged into a 12 month tour of duty. Combat took place in the closest confines imaginable, where the enemy were hidden behind a passing sand dune or a single sniper could be concealed in an onshore bunker, mines might be submerged at every fork in the river. The enemy was all around you, hiding, waiting, while your fifty-foot Swift Boat works its way upriver. In many cases the rivers became so narrow there was barely room to maneuver or turn around. The only way out might be into a deadly ambush. Humor and a touch of romance relieve the tension in this thrilling ride with America's finest.
Hacking: Computer Hacking Beginners Guide How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
Alan T. Norman - 2016
Get this Amazing #1 Amazon Top Release - Great Deal! You can read on your PC, Mac, smartphone, tablet or Kindle device. This book will teach you how you can protect yourself from most common hacking attacks -- by knowing how hacking actually works! After all, in order to prevent your system from being compromised, you need to stay a step ahead of any criminal hacker. You can do that by learning how to hack and how to do a counter-hack. Within this book are techniques and tools that are used by both criminal and ethical hackers – all the things that you will find here will show you how information security can be compromised and how you can identify an attack in a system that you are trying to protect. At the same time, you will also learn how you can minimise any damage in your system or stop an ongoing attack. Read this book for FREE on Kindle Unlimited - Download NOW! With Hacking: Computer Hacking Beginners Guide…, you'll learn everything you need to know to enter the secretive world of computer hacking. It provides a complete overview of hacking, cracking, and their effect on the world. You'll learn about the prerequisites for hacking, the various types of hackers, and the many kinds of hacking attacks: Active Attacks Masquerade Attacks Replay Attacks Modification of Messages Spoofing Techniques WiFi Hacking Hacking Tools Your First Hack Passive Attacks Download Hacking: Computer Hacking Beginners Guide How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack right away - This Amazing New Edition puts a wealth of knowledge at your disposal. You'll learn how to hack an email password, spoofing techniques, WiFi hacking, and tips for ethical hacking. You'll even learn how to make your first hack. Today For Only $3.99 $5.99 $0.99. Scroll Up And Start Enjoying This Amazing Deal Instantly
Incognito Toolkit - Tools, Apps, and Creative Methods for Remaining Anonymous, Private, and Secure While Communicating, Publishing, Buying, and Researching Online
Rob Robideau - 2013
With laws getting stricter by the day and making it more and more difficult to properly protect your personal information, you need the most up-to-date information and tools available and that's what you will find in Incognito Toolkit! Don't let snoopers, investigators, and scammers look over your shoulder or track you while you work and play on the internet! Learn about the tools that will help you use the internet anonymously, privately, and securely to protect assets, avoid social stigmas, and make you safer. This book is full of information that large corporations, scammers, and nosy governments don't want you to find! You won't find a collection of techniques and creative methods like this anywhere else! Covered in Incognito Toolkit: - Making truly anonymous online purchases - Shortcomings of Bitcoin - Encrypting communications - Encryption for online file storage solutions - Locking down and monitoring your hardware - Browser Fingerprinting - Using TOR and VPNs - Creative Text and File Steganography Techniques - Critical Techniques for Publishing Anonymously - Cleaning photo and video metadata - Dealing with tracking cookies Updated December 4th, 2013 with new information about credit card skimmers, TOR hardware devices, and more!
Scroll up and click the "Look Inside" feature on the top left hand side of the page!
Alan Turing: The Enigma
Andrew Hodges - 1983
His breaking of the German U-boat Enigma cipher in World War II ensured Allied-American control of the Atlantic. But Turing's vision went far beyond the desperate wartime struggle. Already in the 1930s he had defined the concept of the universal machine, which underpins the computer revolution. In 1945 he was a pioneer of electronic computer design. But Turing's true goal was the scientific understanding of the mind, brought out in the drama and wit of the famous "Turing test" for machine intelligence and in his prophecy for the twenty-first century.Drawn in to the cockpit of world events and the forefront of technological innovation, Alan Turing was also an innocent and unpretentious gay man trying to live in a society that criminalized him. In 1952 he revealed his homosexuality and was forced to participate in a humiliating treatment program, and was ever after regarded as a security risk. His suicide in 1954 remains one of the many enigmas in an astonishing life story.
The Hut Six Story: Breaking the Enigma Codes
Gordon Welchman - 1982
Here, unsuspected by the Germans, the famous Enigma codes were broken, almost continuously throughout the war. Welchman was a leading figure at Bletchley Park; his brilliant mathematical mind, and imaginative attack on apparently insuperable problems, were of inestimable value in shaping the course of the war and hastening victory. No other book has explained so thoroughly how the job was done, and how so often a flash of genius, an inspired insight, or even a stroke of luck, tipped the balance from failure to success, against all the odds.Gordon Welchman, a talented mathematician, was educated at Marlborough, and Trinity College, Cambridge. He had taken up a post as a fellow of Sidney Sussex College when the war started, and he was an obvious recruit for the expanding codebreaking operations at Bletchley Park. He was awarded the OBE for his war work. After the war he emigrated to the USA, and continued to work on computers and their applications to security and communications. He died in 1985."A publishing history is given on page 252, in Appendix III: First published by McGraw-Hill Book Co. Inc. in 1982, with a British edition appearing in the same year under the Allen Lane imprint. A paperback edition was published by Penguin Books in 1984.
Colossus: Bletchley Park's Greatest Secret
Paul Gannon - 2006
Using science, math, innovation, and improvisation, Bletchley Park code breakers worked furiously to invent a machine to decipher what turned out to be the secrets of Nazi high command. It was called Colossus. What these code breakers didn't realize was that they had fashioned the world's first true computer. When the war ended, this incredible invention was dismantled and hidden away for almost 50 years. Paul Gannon has pieced together the tremendous story of what is now recognized as the greatest secret of Bletchley Park.
Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien"
Jeremy N. Smith - 2019
When she arrived at MIT in the 1990s, Alien was quickly drawn to the school’s tradition of high‑risk physical trespassing: the original “hacking.” Within a year, one of her hallmates was dead and two others were arraigned. Alien’s adventures were only just beginning. After a stint at the storied, secretive Los Alamos National Laboratory, Alien was recruited by a top cybersecurity firm where she deployed her cache of virtual weapons—and the trespassing and social engineering talents she had developed while “hacking” at MIT. The company tested its clients’ security by every means possible—not just coding, but donning disguises and sneaking past guards and secretaries into the C‑suite. Alien now runs a boutique hacking outfit that caters to some of the world’s biggest and most vulnerable institutions—banks, retailers, government agencies. Her work combines devilish charm, old‑school deception, and next generation spycraft. In Breaking and Entering, cybersecurity finally gets the rich, character‑driven, fast-paced treatment it deserves.
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
T.J. O'Connor - 2012
Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
Points Unknown: The Greatest Adventure Writing of the Twentieth Century
David Roberts - 2000
A frigid winter ascent of Mount McKinley; the vastness of Arabia's Empty Quarter; the impossibly thin air at Everest's summit; the deadly black pressure of an underwater cave; a desperate escape through a Norwegian winter—these and thirty-six other stories recount the minutes, hours, and days of lives pushed to the brink. But there is more to adventure than hair's-breadth escapes. By turns charming and tragic, whimsical and nerve-racking, this extraordinary collection gets to the heart of why adventure stories enthrall us. Includes works by Sebastian Junger, Jon Krakauer, Edward Abbey, Tim Cahill, Edward Hoagland, Ernest Shackleton, Freya Stark, and Wilfred Thesiger.
Surveillance Valley: The Rise of the Military-Digital Complex
Yasha Levine - 2018
This idea--using computers to spy on people and groups perceived as a threat, both at home and abroad--drove ARPA to develop the internet in the 1960s, and continues to be at the heart of the modern internet we all know and use today. As Levine shows, surveillance wasn't something that suddenly appeared on the internet; it was woven into the fabric of the technology.But this isn't just a story about the NSA or other domestic programs run by the government. As the book spins forward in time, Levine examines the private surveillance business that powers tech-industry giants like Google, Facebook, and Amazon, revealing how these companies spy on their users for profit, all while doing double duty as military and intelligence contractors. Levine shows that the military and Silicon Valley are effectively inseparable: a military-digital complex that permeates everything connected to the internet, even coopting and weaponizing the antigovernment privacy movement that sprang up in the wake of Edward Snowden.With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news--and the device on which you read it.
Why Terrorism Works: Understanding the Threat, Responding to the Challenge
Alan M. Dershowitz - 2002
Dershowitz, comes from religiously inspired, state sponsored terrorist groups that seek to develop weapons of mass destruction for use against civilian targets. In his newest book, Dershowitz argues passionately and persuasively that global terrorism is a phenomenon largely of our own making and that we must and can take steps to reduce the frequency and severity of terrorist acts. Analyzing recent acts of terrorism and our reaction to them, Dershowitz explains that terrorism is successful when the international community gives in to the demands of terrorists—or even tries to understand and eliminate the “root causes” of terrorism. He discusses extreme approaches to wiping out international terrorism that would work if we were not constrained by legal, moral, and humanitarian considerations. And then, given that we do operate under such constraints, he offers a series of proposals that would effectively reduce the frequency and severity of international terrorism by striking a balance between security and liberty.
From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism
Fred Turner - 2006
Bleak tools of the cold war, they embodied the rigid organization and mechanical conformity that made the military-industrial complex possible. But by the 1990s—and the dawn of the Internet—computers started to represent a very different kind of world: a collaborative and digital utopia modeled on the communal ideals of the hippies who so vehemently rebelled against the cold war establishment in the first place. From Counterculture to Cyberculture is the first book to explore this extraordinary and ironic transformation. Fred Turner here traces the previously untold story of a highly influential group of San Francisco Bay–area entrepreneurs: Stewart Brand and the Whole Earth network. Between 1968 and 1998, via such familiar venues as the National Book Award–winning Whole Earth Catalog, the computer conferencing system known as WELL, and, ultimately, the launch of the wildly successful Wired magazine, Brand and his colleagues brokered a long-running collaboration between San Francisco flower power and the emerging technological hub of Silicon Valley. Thanks to their vision, counterculturalists and technologists alike joined together to reimagine computers as tools for personal liberation, the building of virtual and decidedly alternative communities, and the exploration of bold new social frontiers. Shedding new light on how our networked culture came to be, this fascinating book reminds us that the distance between the Grateful Dead and Google, between Ken Kesey and the computer itself, is not as great as we might think.
Israel's Edge: The Story of The IDF's Most Elite Unit - Talpiot
Jason Gewirtz - 2016
In order to join this unit they have to commit to being in the army for ten years, rather than the three years a normal soldier serves.Talpiots are taught advanced level physics, math and computer science as they train with soldiers from every other branch of the IDF. The result: young men and women become research and development machines. Talpiots have developed battle ready weapons that only Israel's top military officers and political leaders know about. They have also dramatically improved much of the weapons already in Israel's arsenal.Talpiot has been tasked with keeping Israel a generation ahead of a rapidly strengthening and technologically capable Iran. Talpiots contribute to all of the areas that will be most important to the IDF as Iran becomes even more powerful including missile technology, anti-missile defense, cyber-warfare, intelligence, satellite technology and high powered imaging. Talpiot soldiers have also been a major factor in the never ending fight against Israel's other enemies and many have left the R&D lab to fly fighter planes, serve in the field as commanders of elite army ground units and at sea commanding Israel's fleet of naval ships.After leaving the army, Talpiots have become a major force in the Israeli economy, developing some of Israel's most famous and powerful companies.Israel's Edge contains dozens of interviews with Talpiot graduates and some of the early founders of the program. It explains Talpiot's highly successful recruiting methods and discloses many of the secrets of the program's success. The book also profiles some of the most successful businesses founded by Talpiot graduates including CheckPoint, Compugen, Anobit, recently bought by Apple, and XIV, recently bought by IBM. No other military unit has had more of an impact on the State of Israel and no other unit will have more of an impact in the years ahead. The soldiers of Talpiot are truly unsung heroes.
Rootkits: Subverting the Windows Kernel
Greg Hoglund - 2005
It is truly cutting-edge. As the only book on the subject,
Rootkits
will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks