Book picks similar to
Privacy On The Line: The Politics Of Wiretapping And Encryption by Whitfield Diffie
intelligence
infosec
non-fiction
cryptography
Baseball: The Early Years
Harold Seymour - 1960
By investigating previously unknown sources, the book uncovers the real story of how baseball evolved from a gentleman's amateur sport of well-bred play followed by well-laden banquet tables into a professional sport where big leagues operate under their own laws. Offering countless anecdotes and a wealth of new information, the authors explode many cherished myths, including the one which claims that Abner Doubleday invented baseball in 1839. They describe the influence of baseball on American business, manners, morals, social institutions, and even show business, as well as depicting the types of men who became the first professional ball players, club owners, and managers, including Spalding, McGraw, Comiskey, and Connie Mack.Note: On August 2, 2010, Oxford University Press made public that it would credit Dorothy Seymour Mills as co-author of the three baseball histories previously authored solely by her late husband, Harold Seymour. The Seymours collaborated on Baseball: The Early Years (1960), Baseball: The Golden Age (1971) and Baseball: The People's Game (1991).
Code: The Hidden Language of Computer Hardware and Software
Charles Petzold - 1999
And through CODE, we see how this ingenuity and our very human compulsion to communicate have driven the technological innovations of the past two centuries. Using everyday objects and familiar language systems such as Braille and Morse code, author Charles Petzold weaves an illuminating narrative for anyone who’s ever wondered about the secret inner life of computers and other smart machines. It’s a cleverly illustrated and eminently comprehensible story—and along the way, you’ll discover you’ve gained a real context for understanding today’s world of PCs, digital media, and the Internet. No matter what your level of technical savvy, CODE will charm you—and perhaps even awaken the technophile within.
Curse of Rocky Colavito: A Loving Look at a Thirty-Year Slump
Terry Pluto - 1994
But three? It's enough to make you believe in the supernatural. The Cleveland Indians were surely tempting the fates when they traded away Rocky Colavito. He was young, strong, rugged, popular, and coming off back-to-back 40 home run/100 RBI seasons. He was the type of player you just don't trade, especially not for a three-years-older singles hitter, even if Harvey Kuenn had just won the American League batting title. Frank Lane's blunder could be expected to hurt the Tribe's pennant chances for a while. But for a generation? In the thirteen years before the trade, the Indians finished above .500 twelve times, and were first, second, or third in the league nine times. In the thirty-three years since the trade, they've finished above .500 six times, and were in the top three in their league just once (never finishing as high as third in their division). With the sharp-edged wit and keen eye for detail that have made him Cleveland's favorite sportswriter, Terry Pluto looks at the strange goings-on of the past thirty-plus years, unusual occurrences that could only be the result of some cosmic plan. Other teams lose players to injuries; the Indians lose them to alcoholism (Sam McDowell), a nervous breakdown (Tony Horton), and the pro golf tour (Ken Harrelson - okay, so it was only for a little while). Other teams bask in the glow when a young star plays in the All-Star Game in his first full season; the Indians saw catcher Ray Fosse's career derailed by a homeplate collision with Pete Rose in the 1970 midsummer classic. Other teams make deals to improve the ballclub; the Indians had to trade young Dennis Eckersley because his wife had fallen in love with hisbest friend and teammate, Rick Manning. Through long years of trials and tribulations that would have tested Job, the Indians' faithful have continued to come to huge, drafty Cleveland Stadium. Pluto understands the fierce attachment Tribe fans feel for their team, because he's
The Coming Anarchy: Shattering the Dreams of the Post Cold War
Robert D. Kaplan - 1994
Environmental degradation is causing the rampant spread of famine and disease, and a rising number of nations are being torn by violent wars of fierce tribalism and trenchant regionalism. Our newest democracies, such as Russia and Venezuela, are bloody maelstroms of violence and crime, while America is beset with an alarmingly high number of apathetic citizens content to concern themselves with matters of entertainment and convenience. Bold, erudite, and profoundly important, The Coming Anarchy is a compelling must-read by one of today's most penetrating writers and provocative minds."Analytically daring.... Informed by a rock-solid, unwavering realism and an utter absence of sentimentality.... Kaplan is a knowledgeable and forceful polemicist who mixes the attributes of journalist and visionary." —The New York Times"Ambitiously eclectic.... [Kaplan] is one of America's most engaging writers on contemporary international affairs." —The New York Times Book Review
Napoleonic Wars: A History from Beginning to End
Hourly History - 2020
Tools and Weapons: The Promise and the Peril of the Digital Age
Brad Smith - 2019
This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. Now, though, we have reached an inflection point: Silicon Valley has moved fast and it has broken things. A new understanding has emerged that companies that create technology must accept greater responsibility for the future. And governments will need to regulate technology by moving faster and catching up with the pace of innovation that is impacting our communities and changing the world.In Tools and Weapons, Brad Smith takes us into the cockpit of one of the world's largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no preexisting playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of AI, big tech's relationship to inequality and the challenges for democracy, far and near. While in no way a self-glorifying "Microsoft memoir," the book opens up the curtain remarkably wide onto some of the company's most crucial recent decision points, as it strives to protect the hopes technology offers against the very real threats it also presents. Every tool can be a weapon in the wrong person's hands, and companies are being challenged in entirely new ways to embrace the totality of their responsibilities. We have moved from a world in which Silicon Valley could take no prisoners to one in which tech companies and governments must work together to address the challenges and adapt to the changes technology has unleashed. There are huge ramifications to be thought through, and Brad Smith provides a marvelous and urgently necessary contribution to that effort.
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Andrew Jaquith - 2007
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index
Masters of the Word: How Media Shaped History from the Alphabet to the Internet
William J. Bernstein - 2013
Bernstein’s A Splendid Exchange: How Trade Shaped the World, an Economist and Financial Times Best Book of the Year, placed him firmly among the top flight of historians like Jared Diamond and Bill Bryson, capable of distilling major trends and reams of information into insightful, globe-spanning popular narrative. Bernstein explains how new communication technologies and in particular our access to them, impacted human society. Writing was born thousands of years ago in Mesopotamia. Spreading to Sumer, and then Egypt, this revolutionary tool allowed rulers to extend their control far and wide, giving rise to the world’s first empires. When Phoenician traders took their alphabet to Greece, literacy’s first boom led to the birth of drama and democracy. In Rome, it helped spell the downfall of the Republic. Later, medieval scriptoria and vernacular bibles gave rise to religious dissent, and with the combination of cheaper paper and Gutenberg’s printing press, the fuse of Reformation was lit. The Industrial Revolution brought the telegraph and the steam driven printing press, allowing information to move faster than ever before and to reach an even larger audience. But along with radio and television, these new technologies were more easily exploited by the powerful, as seen in Germany, the Soviet Union, even Rwanda, where radio incited genocide. With the rise of carbon duplicates (Russian samizdat), photocopying (the Pentagon Papers), the internet, social media and cell phones (the recent Arab Spring) more people have access to communications, making the world more connected than ever before. In Masters of the Word, Bernstein masterfully guides the reader through the vast history of communications, illustrating each step with colorful stories and anecdotes. This is a captivating, enlightening book, one that will change the way you look at technology, history, and power.
Serious Cryptography: A Practical Introduction to Modern Encryption
Jean-Philippe Aumasson - 2017
You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography.You’ll also learn: - Key concepts in cryptography, such as computational security, attacker models, and forward secrecy - The strengths and limitations of the TLS protocol behind HTTPS secure websites - Quantum computation and post-quantum cryptography - About various vulnerabilities by examining numerous code examples and use cases - How to choose the best algorithm or protocol and ask vendors the right questionsEach chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. Whether you’re a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications.
Viral Loop
Adam L. Penenberg - 2009
Simply by designing your product the right way, you can build a flourishing business from scratch. No advertising or marketing budget, no need for a sales force, and venture capitalists will flock to throw money at you.
Many of the most successful Web 2.0 companies, including MySpace, YouTube, eBay, and rising stars like Twitter and Flickr, are prime examples of what journalist Adam L. Penenberg calls a "viral loop"--to use it, you have to spread it. After all, what's the sense of being on Facebook if none of your friends are? The result: Never before has there been the potential to create wealth this fast, on this scale, and starting with so little. In this game-changing must-read, Penenberg tells the fascinating story of the entrepreneurs who first harnessed the unprecedented potential of viral loops to create the successful online businesses--some worth billions of dollars--that we have all grown to rely on. The trick is that they created something people really want, so much so that their customers happily spread the word about their product for them. All kinds of businesses--from the smallest start-ups to nonprofit organizations to the biggest multinational corporations--can use the paradigm-busting power of viral loops to enable their business through technology. Viral Loop is a must-read for any entrepreneur or business interested in uncorking viral loops to benefit their bottom line.
Vanity Fair: The Portraits: A Century of Iconic Images
Graydon Carter - 2008
The photographers — from Edward Steichen and Cecil Beaton to Annie Leibovitz and Mario Testino — are a glittering and celebrated group themselves. Their portraits have become the iconic likenesses of the best-known figures from the worlds of art, film, music, sports, business, and politics.From legends such as Pablo Picasso, Amelia Earhart, Cary Grant, and Katharine Hepburn to the stars, writers, athletes, style icons, and titans of business and politics of today, Vanity Fair: The Portraits offers an authoritative roster of talent and glamour in the 20th century.
The Next Exit: Interstate Highway Guide
Mark Watson - 2002
The most complete USA Interstate Highway exit directory ever printed.
War by Other Means: Geoeconomics and Statecraft
Robert D. Blackwill - 2016
Policies governing everything from trade and investment to energy and exchange rates are wielded as tools to win diplomatic allies, punish adversaries, and coerce those in between. Not so in the United States, however. America still too often reaches for the gun over the purse to advance its interests abroad. The result is a playing field sharply tilting against the United States.In a cogent analysis of why the United States is losing ground as a world power and what it can do to reverse the trend, War by Other Means describes the statecraft of geoeconomics: the use of economic instruments to achieve geopolitical goals. Geoeconomics has long been a lever of America’s foreign policy. But factors ranging from U.S. bureaucratic politics to theories separating economics from foreign policy leave America ill prepared for this new era of geoeconomic contest, while rising powers, especially China, are adapting rapidly. The rules-based system Americans set in place after World War II benefited the United States for decades, but now, as the system frays and global competitors take advantage, America is uniquely self-constrained. Its geoeconomic policies are hampered by neglect and resistance, leaving the United States overly reliant on traditional military force.Drawing on immense scholarship and government experience, Robert Blackwill and Jennifer Harris show that if America’s policies are left uncorrected, the price in American blood and treasure will only grow. What geoeconomic warfare requires is a new vision of U.S. statecraft.
Analyzing Intelligence: Origins, Obstacles, and Innovations
Roger Z. George - 2008
Its in-depth and balanced evaluation of more than fifty years of U.S. analysis includes a critique of why it has under-performed at times. It provides insights regarding the enduring obstacles as well as new challenges of analysis in the post-9/11 world, and suggests innovative ideas for improved analytical methods, training, and structured approaches. The book's six sections present a coherent plan for improving analysis. Early chapters examine how intelligence analysis has evolved since its origins in the mid-20th century, focusing on traditions, culture, successes, and failures.The middle sections examine how analysis supports the most senior national security and military policymakers and strategists, and how analysts must deal with the perennial challenges of collection, politicization, analytical bias, knowledge building and denial and deception. The final sections of the book propose new ways to address enduring issues in warning analysis, methodology (or 'analytical tradecraft') and emerging analytic issues like homeland defense. The book suggests new forms of analytic collaboration in a global intelligence environment, and imperatives for the development of a new profession of intelligence analysis. "Analyzing Intelligence" is written for the national security expert who needs to understand the role of intelligence and its strengths and weaknesses.Practicing and future analysts will also find that its attention to the enduring challenges provides useful lessons-learned to guide their own efforts. The innovations section will provoke senior intelligence managers to consider major changes in the way analysis is currently organized and conducted, and the way that analysts are trained and perform.
Enigma: The Battle for the Code
Hugh Sebag-Montefiore - 2000
Sebag-Montefiore also relates new details about the genesis of the code, little-known facts about how the Poles first cracked the Luftwaffe's version of the code (and then passed it along to the British), and the feverish activities at Bletchley Park. Based in part on documents recently unearthed from American and British archives--including previously confidential government files--and in part on unforgettable, firsthand accounts of surviving witnesses, Enigma unearths the stunning truth about the brilliant piece of decryption that changed history.