Book picks similar to
Privacy On The Line: The Politics Of Wiretapping And Encryption by Whitfield Diffie
intelligence
cryptography
infosec
non-fiction
Codebreaker: The History of Codes and Ciphers, from the Ancient Pharaohs to Quantum Cryptography
Stephen Pincock - 2006
The 4,000-year history of cryptography has been a kind of arms race: Each time a more complex encryption has been developed, it has been attacked and, more often than not, decoded; and each time, in response, codemakers have produced tougher and tougher codes. Codebreaker surveys the entire history of codes through an eloquent narrative and an evocative range of illustrations, paying special attention to famous codes that have never been broken, such as the Beale Ciphers, the Voynich manuscript, the Easter Island code, and many more. Many great names in history appear throughout, from Caesar and Mary Queen of Scots, to Samuel Morse and Alan Turing. The narrative is based in part on interviews with cryptology experts, Navaho windtalkers, decryption experts, and law enforcement experts, and ends with a vision of the coded future via quantum cryptography.
Metasploit: The Penetration Tester's Guide
David Kennedy - 2011
But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.
Dragon on Our Doorstep: Managing China Through Military Power
Pravin Sawhney - 2017
Apart from superior military power, close coordination between the political leadership and the military and the ability to take quick decisions, China has potent anti-satellite and cyber warfare capabilities. Even more shockingly, regardless of popular opinion, India today is not even in a position to win a war against Pakistan. This has nothing to do with Pakistan’s nuclear weapons. It is because while India has been focused on building military force (troops and materiel needed to wage war) Pakistan has built military power (learning how to optimally utilize its military force). In this lies the difference between losing and winning. Far from being the strong Asian power of its perception, India could find itself extremely vulnerable to the hostility of its powerful neighbors. In Dragon On Our Doorstep, Pravin Sawhney and Ghazala Wahab analyse the geopolitics of the region and the military strategies of the three Asian countries to tell us exactly why India is in this precarious position and how it can transform itself through deft strategy into a leading power.The most populous countries and fastest growing economies in the world—India and China—have cultural and economic relations that date back to the second century bc. But over the years, despite the many treaties and agreements between the two nations, border clashes (including the disastrous 1962 war) and disagreements over Tibet and Jammu and Kashmir have complicated the relationship. For decades China kept a low profile. However, since 2008, when it was recognized as an economic power, China has become assertive. Today, this Himalayan balancing act of power is clearly tilted towards China, in whose view there is room for only one power in Asia. In this rise, Pakistan has emerged as China’s most trusted and crucial partner. The partnership between China and Pakistan, whether in terms of military interoperability (ability to operate as one in combat), or geostrategic design (which is unfolding through the wide-sweeping One Belt One Road project), has serious implications for India. The best that India can do is try and manage the relationship so that the dragon’s rise is not at the cost of India.
Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
Edward Skoudis - 2005
I asked other people and they didn't seem to know how these things work, or at least they couldn't explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!" --Stephen Northcutt, CEO, SANS Institute "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "Ed Skoudis is a rare individual. He knows the innards of all the various systems, knows all the latest exploits and defenses, and yet is able to explain everything at just the right level. The first edition of Counter Hack was a fascinating read. It's technically intriguing and very clear. . . . A book on vulnerabilities, though, will get out of date, and so we definitely needed this updated and significantly rewritten second edition. This book is a wonderful overview of the field." --From the Foreword by Radia Perlman, series editor, The Radia Perlman Series in Computer Networking and Security; author of Interconnections; and coauthor of Network Security: Private Communications in a Public World "What a great partnership! Ed Skoudis and Tom Liston share an uncanny talent for explaining even the most challenging security concepts in a clear and enjoyable manner. Counter Hack Reloaded is an indispensable resource for those who want to improve their defenses and understand the mechanics of computer attacks." --Lenny Zeltser, coauthor of Malware: Fighting Malicious Code "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "In addition to having breadth of knowledge about and probing insights into network security, Ed Skoudis's real strength is in his ability to show complex topics in an understandable form. By the time he's done, what started off as a hopeless conglomeration of acronyms starts to sound comfortable and familiar. This book is your best source for understanding attack strategies, attack tools, and the defenses against both." --William Stearns, network security expert, www.stearns.org "This book is a must-have for anyone in the Internet security game. It covers everything from the basic principles to the fine details of online attack methods and counter-strategies and is very engagingly written." --Warwick Ford, coauthor of Secure Electronic Commerce For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks.For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You'll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.Important features of this new edition includeAll-new "anatomy-of-an-attack" scenarios and tools An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more Fully updated coverage of reconnaissance tools, including Nmap port scanning and "Google hacking" New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit New information on dangerous, hard-to-detect, kernel-mode rootkits
Colossus: The Secrets of Bletchley Park's Codebreaking Computers
B. Jack Copeland - 2006
This book rewrites the history of computer science, arguing that in reality Colossus--the giant computer built by the British secret service during World War II--predates ENIAC by two years.Colossus was built during the Second World War at the Government Code and Cypher School at Bletchley Park. Until very recently, much about the Colossus machine was shrouded in secrecy, largely because the code-breaking algorithms that were employed during World War II remained in use by the British security services until a short time ago. In addition, the United States has recently declassified a considerable volume of wartime documents relating to Colossus. Jack Copeland has brought together memoirs of veterans of Bletchley Park--the top-secret headquarters of Britain's secret service--and others who draw on the wealth of declassified information to illuminate the crucial role Colossus played during World War II. Included here are pieces by the former WRENS who actually worked the machine, the scientist who pioneered the use of vacuum tubes in data processing, and leading authorities on code-breaking and computer science.A must read for anyone curious about code-breaking or World War II espionage, Colossus offers a fascinating insider's account of the world first giant computer, the great great grandfather of the massive computers used today by the CIA and the National Security Agency.
Mafiaboy: How I Cracked The Internet And Why Its Still Broken
Michael Calce - 2008
After 2 months and hundreds of hours of wiretapping, the FBI and RCMP staged a late-night raid to apprehend the most wanted man in cyberspace—a 15-year-old kid, Mafiaboy. 8 years later, Mafiaboy, a.k.a.Michael Calce, has ignored requests from every major media outlet in North America and has not told a word of his story—until now. Using his experience as a cautionary tale, Calce takes the reader through the history of hacking and how it has helped make the internet the new frontier for crime in the 21st century.
Lee and His Men at Gettysburg: The Death of a Nation
Clifford Dowdey - 1958
history. With vivid and breathtaking detail, Lee and His Men at Gettysburg is both a historical work and an honorary ode to the almost fifty thousand soldiers who died at the fields of Pennsylvania. Written with an emphasis on the Confederate forces, the book captures the brilliance and frustration of a general forced to contend with overwhelming odds and in-competent subordinates. Dowdey not only presents the facts of war, but brings to life the cast of characters that defined this singular moment in American history.
Magnum! The Wild Weasels in Desert Storm. The Elimination of Iraq's Air Defence
Braxton R. Eisel - 2009
Building upon that record and the recollections of other F-4G Wild Weasel aircrew, the authors show a slice of what life and war was like during that time. The pawns in the game, the ones that had to actually do the fighting and dying were the hundreds of thousands of men and women who left their homes and families to live for seemingly endless months in the vast, trackless desert while the world stage-play unfolded. To them, the war was deeply personal. At times, the war was scary; at other times, it was funny as hell. Usually, if you survive the former, it turns into the latter.
Solid Fool's Gold: Detours on the Way to Conventional Wisdom
Bill James - 2011
This book is reminiscent of James' Baseball Abtracts from the 70s and 80s and even includes a reprint of one of his articles from that period. The book contains some 25 essays, some full of sabermetric breakthroughs and others with nary a statistic to be found.
The Clash of Fundamentalisms: Crusades, Jihads and Modernity
Tariq Ali - 2002
The inviolability of the American mainland, breached for the first time since 1812, led to extravagant proclamations by the pundits. It was a new world-historical turning point. The 21st century, once greeted triumphantly as marking the dawn of a worldwide neo-liberal civilization, suddenly became menaced. The choice presented from the White House and its supporters was to stand shoulder-to-shoulder against terrorism or be damned.Tariq Ali challenges these assumptions, arguing instead that what we have experienced is the return of History in a horrific form, with religious symbols playing a part on both sides: ‘Allah’s revenge,’ ‘God is on Our Side’ and ‘God Bless America.’ The visible violence of September 11 was the response to the invisible violence that has been inflicted on countries like Afghanistan, Pakistan, Iraq, Saudi Arabia, Egypt, Palestine and Chechnya. Some of this has been the direct responsibility of the United States and Russia. In this wide-ranging book that provides an explanation for both the rise of Islamic fundamentalism and new forms of Western colonialism, Tariq Ali argues that many of the values proclaimed by the Enlightenment retain their relevance, while portrayals of the American Empire as a new emancipatory project are misguided.
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Bruce Sterling - 1992
A journalist investigates the past, present, and future of computer crimes, as he attends a hacker convention, documents the extent of the computer crimes, and presents intriguing facts about hackers and their misdoings.
The Wires of War: Technology and the Global Struggle for Power
Jacob Helberg - 2021
During this time, he found himself in the midst of what can only be described as a quickly escalating two-front technology cold war between democracy and autocracy. On the front-end, we’re fighting to control the software—applications, news information, social media platforms, and more—of what we see on the screens of our computers, tablets, and phones, a clash which started out primarily with Russia but now increasingly includes China and Iran. Even more ominously, we’re also engaged in a hidden back-end battle—largely with China—to control the internet’s hardware, which includes devices like cellular phones, satellites, fiber-optic cables, and 5G networks. This tech-fueled war will shape the world’s balance of power for the coming century as autocracies exploit 21st-century methods to redivide the world into 20th-century-style spheres of influence. Without a firm partnership with the government, Silicon Valley is unable to protect democracy from the autocrats looking to sabotage it from Beijing to Moscow and Tehran. Helberg offers “unnervingly convincing evidence that time is running out in the ‘gray war’ with the enemies of freedom” (Kirkus Reviews) which could affect every meaningful aspect of our lives, including our economy, our infrastructure, our national security, and ultimately, our national sovereignty.
How We Lead: Canada in a Century of Change
Joe Clark - 2013
In the world that is taking shape, the unique combination of Canada's success at home as a diverse society and its reputation internationally as a sympathetic and respected partner consititute national assets that are at least as valuable as its natural resource wealth. As the world becomes more competitive and complex, and the chances of deadly conflict grow, the example and the initiative of Canada can become more important than they have ever been. That depends on its people: assets have no value if Canadians don't recognize or use them, or worse, if they waste them. A more effective Canada is not only a benefit to itself, but to its friends and neighbours. And in this compelling examination of what it as a nation has been, what it has become and what it can yet be to the world, Joe Clark takes the reader beyond formal foreign policy and looks at the contributions and leadership offered by Canada's most successful individuals and organizations who are already putting these uniquely Canadian assets to work internationally.
Floating Worlds: The Letters of Edward Gorey & Peter F. Neumeyer
Edward Gorey - 2011
Gorey had been contracted by Addison-Wesley to illustrate "Donald and the...," a childrens story written by Neumeyer. On their first encounter, Neumeyer managed to dislocate Goreys shoulder when he grabbed his arm to keep him from falling into the ocean. In a hospital waiting room, they pored over Goreys drawings for the first time together, and Gorey infused the situation with much hilarity. This was the beginning of an invigorating friendship, fueled by a wealth of letters and postcards that sped between the two men through the fall of 1969.Those letters, published here for the first time, are remarkable in their quantity and their content. While the creative collaborations of Gorey and Neumeyer centered on illustrated books, they held wide-ranging interests; both were erudite, voracious readers, and they sent each other many volumes. Reading their discussions of these books, one marvels at the beauty of thoughtful (and merry) discourse driven by intellectual curiosity.The letters also paint an intimate portrait of Edward Gorey, a man often mischaracterized as macabre or even ghoulish. His gentleness, humility, and brilliance--interwoven with his distinctive humor--shine in these letters; his deft artistic hand is evident on the decorated envelopes addressed to Neumeyer, 38 of which are reproduced here.During the time of their correspondence, Peter Neumeyer was teaching at Harvard University and at SUNY Stony Brook, on Long Island. His acumen and compassion, expressed in his discerning, often provocative missives, reveal him to be an ideal creative and intellectual ally for Gorey.More than anything else, "Floating Worlds" is the moving memoir of an extraordinary friendship. Gorey wrote that he felt they were part of the same family, and I dont mean just metaphorically. I guess that even more than I think of you as a friend,
Brady's Civil War: A Collection of Civil War Images Photographed by Matthew Brady and his Assistants
Webb Garrison - 2000
An unforgettable collection of hundreds of historic photographs from America's most horrific war.