Penetration Testing: A Hands-On Introduction to Hacking


Georgia Weidman - 2014
    This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software.

Stealing the Network: How to Own an Identity


Raven Alder - 2005
    Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... Stealing the Network: How to Own an Identity is the 3rd book in the Stealing series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this STN collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.Cast upon a backdrop of Evasion, surviving characters from How to Own a Continent find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.

War Made New: Technology, Warfare, and the Course of History: 1500 to Today


Max Boot - 2006
    Combining gripping narrative history with wide-ranging analysis, Boot focuses on four “revolutions” in military affairs and describes key battles from each period to explain how inventions ranging from gunpowder to GPS-guided air-strikes have remade the field of battle— and shaped the rise and fall of empires. Bringing to life battles from the defeat of the Spanish Armada to Wellington’s victory at Assaye, War Made New analyzes the Gunpowder Revolution and explains warfare’s evolution from ritualistic, drawn-out engagements to much deadlier events, precipitating the rise of the modern nation state. He next explores the triumph of steel and steam during the Industrial Revolution, including the British triumph at Omdurman and the climax of the Russo-Japanese war at Tsushima, showing how it powered the spread of European colonial empires. Moving into the twentieth century and the Second Industrial Revolution, Boot examines three critical clashes of World War II—the German army’s blitzkrieg, Pearl Harbor, and the firebombing of Tokyo—to illustrate how new technology such as the tank, radio, and airplane ushered in terrifying new forms of warfare that aided the rise of highly centralized, and even totalitarian, world powers. Finally, in his section on the Information Revolution, Boot focuses on the Gulf War, the invasion of Afghanistan, and the Iraq war, arguing that even as cutting-edge technologies such as stealth aircraft have made America the greatest military power in world history, advanced communications systems have allowed decentralized, “irregular” forces to become an increasingly significant threat to Western power. BACKCOVER: Advance Praise for War Made New “Max Boot traces the impact of military revolutions on the course of politics and history over the past 500 years. In doing so, he shows that changes in military technology are limited not to warfighting alone, but play a decisive role in shaping our world. Sweeping and erudite, while entirely accessible to the lay reader, this work is key for anyone interested in where military revolutions have taken us—and where they might lead in the future.” —U.S. Senator John McCain “While much has been in written in recent years about the so-called ‘Revolution in Military Affairs,’ Max Boot is the first scholar to place it within the broad sweep of history, and in the context of the rise of the West in world affairs since 1500. In so doing, he not only tells a remarkable tale, but he compels us all, even those obsessed solely with contemporary military affairs, to ask the right questions and to distinguish what is truly new and revolutionary from what is merely ephemeral. He has rendered a valuable service, and given us a fascinating read at the same time, so we are doubly in his debt.” —Paul Kennedy, Professor of History at Yale University and author of The Rise and Fall of the Great Powers “War Made New is impressive in scope. What is equally impressive is its unique interpretation of the causal relationship between technology, warfare and the contemporary social milieu. This is a superb thinking person's book which scrutinizes conventional historical wisdom through a new lens.” —Lt. Gen. Bernard E. Trainor, USMC (ret.), co-author of Cobra II: The Inside Story of the Invasion and Occupation of Iraq “Max Boot's book takes hundred of years of tactical battle history and reduces it to an incisive narrative of how war has changed. By providing such a coherent view of the past, he has pointed us toward the future. What is doubly impressive is how he draws surprising, fresh lessons from wars we thought we knew so much about but in fact didn't.” —Robert D. Kaplan, author of Imperial Grunts

The Last Good Season: Brooklyn, the Dodgers and Their Final Pennant Race Together


Michael Shapiro - 2003
    The love between team and borough was equally storied, an iron bond of loyalty forged through years of adversity and sometimes legendary ineptitude. Coming off their first World Series triumph ever in 1955, against the hated Yankees, the Dodgers would defend their crown against the Milwaukee Braves and the Cincinnati Reds in a six-month neck-and-neck contest until the last day of the playoffs, one of the most thrilling pennant races in history.But as The Last Good Season so richly relates, all was not well under the surface. The Dodgers were an aging team at the tail end of its greatness, and Brooklyn was a place caught up in rapid and profound urban change. From a cradle of white ethnicity, it was being transformed into a racial patchwork, including Puerto Ricans and blacks from the South who flocked to Ebbets Field to watch the Dodgers’ black stars. The institutions that defined the borough – the Brooklyn Eagle, the Brooklyn Navy Yard – had vanished, and only the Dodgers remained. And when their shrewd, dollar-squeezing owner, Walter O’Malley, began casting his eyes elsewhere in the absence of any viable plan to replace the aging Ebbets Field and any support from the all-powerful urban czar Robert Moses, the days of the Dodgers in Brooklyn were clearly numbered.Michael Shapiro, a Brooklyn native, has interviewed many of the surviving participants and observers of the 1956 season, and undertaken immense archival research to bring its public and hidden drama to life. Like David Halberstam’s The Summer of ’49, The Last Good Season combines an exciting baseball story, a genuine sense of nostalgia, and hard-nosed reporting and social thinking to reveal, in a new light, a time and place we only thought we understood.From the Hardcover edition.

Security in Computing


Charles P. Pfleeger - 1988
    In this newFourth Edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends. The authors first introduce the core concepts and vocabulary of computer security, including cryptography. Next, they systematically identify and assess threats now facing programs, operating systems, databases, and networks. For each threat, they offer best-practice responses. Security in Computing, Fourth Edition, goes beyond technology, covering crucial management issues you face in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, and making the business case for security investments. Another new chapter addresses privacy--from data mining to identity theft, to RFID and e-voting. New coverage also includes Programming mistakes that compromise security: man-in-the-middle, timing, and privilege escalation Web application threats and vulnerabilities Networks of compromised systems: bots, botnets, and drones Rootkits--including the notorious Sony XCP Wi-Fi network security challenges, standards, and techniques New malicious code attacks, including false interfaces and keystroke loggers Improving code quality: software engineering, testing, and liability approaches Biometric authentication: capabilities and limitations Using Advanced Encryption System (AES) more effectively Balancing efficiency and piracy control in music and other digital content Defending against new cryptanalytic attacks against RSA, DES, and SHA Responding to the emergence of organized attacker groups pursuing profit 0132390779B0721200 Every day, the news media giv

Israel/Palestine: How to End the War of 1948


Tanya Reinhart - 2002
    Examining the official record of recent diplomacy, including United States-brokered accords and talks at Camp David, Oslo, and Taba, Reinhart explores the fundamental power imbalances between the negotiating parties and identifies Israel's strategy of creating facts on the ground to define and complicate the terms of any future settlement. In this indispensable primer, Reinhart's searing insight illuminates the current conflict and suggests a path toward change.

The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics


Ben Buchanan - 2020
    

Why We Fight: Defeating America's Enemies - With No Apologies


Sebastian Gorka - 2018
    Dr. Gorka knows Donald Trump and the threats we face. Buy and read Why We Fight to find how we win and what it means to be an American hero." — RUSH LIMBAUGH WAR. It will happen again. We must be ready. Sober words from Dr. Sebastian Gorka, a man who has made the unvarnished truth his specialty. And there’s one eternal truth that Americans are in danger of forgetting: the most important weapon in any geopolitical conflict is the will to win. And we must win.  In this powerful manifesto, Dr. Gorka explains the basic principles that have guided strategists since Sun Tzu penned The Art of War in the sixth century B.C. To defeat your enemy, you must know him. But that’s the last thing liberal elites are interested in. Willful ignorance about our adversary—whether it’s Russia, China, or the global jihadi movement—has been crippling. Tearing off America’s politically correct blindfold, Dr. Gorka clarifies who our foes are and what makes them tick. An eight-year vacation from geopolitical reality under Obama left our country dangerously weakened. Dr. Gorka addresses the pressing questions we face as we rebuild under President Trump’s leadership: - What are the most serious threats to American security? - How are they different from the threats of the past? - What can we do to counter these threats? - How can we achieve the “perfect victory” of vanquishing our enemies without mortal combat? All the money and weapons in the world cannot substitute for the will to fight for our precious country and what she represents. To remind us of what the will to win looks like, Dr. Gorka intersperses the stories of four American heroes—Stephen Decatur, Chesty Puller, “Red” McDaniel, and a warrior who never took up arms, Whittaker Chambers—men who believed in their country and put everything on the line for her.

The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age


Adam Segal - 2016
    Nation-states wielded military force, financial pressure, and diplomatic persuasion to create “world order.” Even after the end of the Cold War, the elements comprising world order remained essentially unchanged.But 2012 marked a transformation in geopolitics and the tactics of both the established powers and smaller entities looking to challenge the international community. That year, the US government revealed its involvement in Operation “Olympic Games,” a mission aimed at disrupting the Iranian nuclear program through cyberattacks; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield.Cyber conflict is hard to track, often delivered by proxies, and has outcomes that are hard to gauge. It demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, cybersecurity expert Adam Segal reveals, power has been well and truly hacked.

War by Other Means: An Insider's Account of the War on Terror


John Yoo - 2006
    While America reeled from the cataclysmic events of September 11, 2001, Yoo and a skeletal staff of the Office of Legal Counsel found themselves on the phone with the White House. In a series of memos, Yoo offered his legal opinions on the president's authority to respond, and in the process had an almost unmatched impact on America's fight against terrorism. His analysis led to many of the Bush administration's most controversial policies, including detention at Guantanamo Bay, coercive interrogation, military trials for terrorists, preemptive attacks, and the National Security Agency's wiretapping program. In fascinating detail, Yoo takes us inside the corridors of power and examines specific cases, from John Walker Lindh and Jose Padilla to an American al-Qaeda leader assassinated by a CIA pilotless drone in the deserts of Yemen. In a midterm election year, when the controversies over the president's handling of the War on Terror are sure to wage more forcefully than ever before, John Yoo's War by Other Means is set to become one of the fall's most talked about books.

Understanding Cryptography: A Textbook For Students And Practitioners


Christof Paar - 2009
    Today's designers need a comprehensive understanding of applied cryptography.After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book's website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

Shenzhen Superstars: How China’s Smartest City is Challenging Silicon Valley


Johan Nylander - 2017
     It’s the story about how a Chinese fishing village became a global economic powerhouse of innovation and technology. Just four decades ago Shenzhen was a backwater area, populated by fishermen and rice farmers. Today, it’s home to up to 20 million people and some of the world’s leading technology companies and most innovative tech startups. No other city better symbolizes the rise of modern China. And no other city challenges Silicon Valley more aggressively as the global hub for innovation and technology startups. In many ways, the Chinese city has already outsmarted the Valley. “Shenzhen has an energy of growth – the same energy I felt when I first came to Silicon Valley ten years ago. And it’s not just in technology. It’s this idea that whoever you are, whatever you’re into, you can come to China, and especially Shenzhen, and do it!” American entrepreneur Scotty Allen says in the book. Shenzhen Superstars is written for anyone who wants to be part of this raging growth story – no matter if you’re a tech buff, investor or just someone curious about knowing what’s driving the future. As a journalist for CNN, Forbes and other international media, Johan Nylander has witnessed the astonishing transformation of the south Chinese city. Its speed, energy and determination are just mind-blowing. His aim is to take you inside, to the very heart of what is shaping this vibrant city. KEY QUOTES FROM THE BOOK “In terms of hardware plus software innovation, Shenzhen is ahead of the curve.” – Jeffrey Towson, private equity investor and Peking University professor “The next ten years will be the era of robots and intelligent machines, and Shenzhen will play well to that.” – Jixun Foo, managing partner of GGV Capital “Shenzhen is just better than Silicon Valley in terms of hardware and software integration.” – Qin Li, CEO of startup Sennotech “If you’re not already in Shenzhen, you're crazy.” – Edith Yeung, general partner of 500 Startups

Mr. Lincoln's T-Mails: The Untold Story of How Abraham Lincoln Used the Telegraph to Win the Civil War


Tom Wheeler - 2006
    Among the many modern marvels that gave the North an advantage was the telegraph, which Lincoln used to stay connected to the forces in the field in almost real time.No leader in history had ever possessed such a powerful tool to gain control over a fractious situation. An eager student of technology, Lincoln (the only president to hold a patent) had to learn to use the power of electronic messages. Without precedent to guide him, Lincoln began by reading the telegraph traffic among his generals. Then he used the telegraph to supplement his preferred form of communication—meetings and letters. He did not replace those face-to-face interactions. Through this experience, Lincoln crafted the best way to guide, reprimand, praise, reward, and encourage his commanders in the field.Mr. Lincoln's T-Mails tells a big story within a small compass. By paying close attention to Lincoln's "lightning messages," we see a great leader adapt to a new medium. No reader of this work of history will be able to miss the contemporary parallels. Watching Lincoln carefully word his messages—and follow up on those words with the right actions—offers a striking example for those who spend their days tapping out notes on computers and BlackBerrys.An elegant work of history, Mr. Lincoln's T-Mails is an instructive example of timeless leadership lessons.

Louis-Hippolyte Lafontaine and Robert Baldwin


John Ralston Saul - 2010
    Here he argues that Canada did not begin in 1867; indeed, its foundation was laid by two visionary men, Louis-Hippolyte LaFontaine and Robert Baldwin. The two leaders of Lower and Upper Canada, respectively, worked together after the 1841 Union to lead a reformist movement for responsible government run by elected citizens instead of a colonial governor.But it was during the "Great Ministry" of 1848—51 that the two politicians implemented laws that created a more equitable country. They revamped judicial institutions, created a public education system, made bilingualism official, designed a network of public roads, began a public postal system, and reformed municipal governance. Faced with opposition, and even violence, the two men— polar opposites in temperament—united behind a set of principles and programs that formed modern Canada. Writing with verve and deep conviction, Saul restores these two extraordinary Canadians to rightful prominence.

Eclipse of the Sunnis: Power, Exile, and Upheaval in the Middle East


Deborah Amos - 2010
    From Amman to Beirut and Damascus, Deborah Amos follows the impact of one of the great migrations of modern times.The history of the Middle East tells us that one of the greatest problems of the last forty years has been that of a displaced population, angered by their inability to safely return home and resume ownership of their property--as they see it. Now, the pattern has been repeated. A new population of exiles, as large as the Palestinians, has been created.This particular displacement stirs up the historic conflict between Sunni and Shia. More significant even than the creation of colonial nation states a century ago, the alienation of the Sunni middle class has the capacity to cause resounding resentments across the region for generations to come.