Unrestricted Warfare: China's Master Plan to Destroy America


Qiao Liang - 1999
    American military doctrine is typically led by technology; a new class of weapon or vehicle is developed, which allows or encourages an adjustment in strategy. Military strategists Qiao Liang and Wang Xiangsui argue that this dynamic is a crucial weakness in the American military, and that this blind spot with regard to alternative forms warfare could be effectively exploited by enemies. "Unrestricted Warfare" concerns the many ways in which this might occur, and, in turn, suggests what the United States might do to defend itself.The traditional mentality that offensive action is limited to military action is no longer adequate given the range of contemporary threats and the rising costs-both in dollars and lives lost-of traditional warfare. Instead, Liang and Xiangsui suggest the significance of alternatives to direct military confrontation, including international policy, economic warfare, attacks on digital infrastructure and networks, and terrorism. Even a relatively insignificant state can incapacitate a far more powerful enemy by applying pressure to their economic and political systems. Exploring each of these considerations with remarkable insight and clarity, "Unrestricted Warfare" is an engaging evaluation of our geopolitical future.

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race


Nicole Perlroth - 2021
    One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine).For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down.Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.

Principles of Information Security


Michael E. Whitman - 2002
    Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the content to reflect technology's latest capabilities and trends. With this emphasis on currency and comprehensive coverage, readers can feel confident that they are using a standards-based, content-driven resource to prepare them for their work in the field.

Hacker's Delight


Henry S. Warren Jr. - 2002
    Aiming to tell the dark secrets of computer arithmetic, this title is suitable for library developers, compiler writers, and lovers of elegant hacks.

Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door


Brian Krebs - 2014
    Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies and countless viruses, phishing, and spyware attacks he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.Blending cutting-edge research, investigative reporting, and firsthand interviews, this terrifying true story reveals how we unwittingly invite these digital thieves into our lives every day. From unassuming computer programmers right next door to digital mobsters like "Cosma" who unleashed a massive malware attack that has stolen thousands of Americans' logins and passwords, Krebs uncovers the shocking lengths to which these people will go to profit from our data and our wallets.Not only are hundreds of thousands of Americans exposing themselves to fraud and dangerously toxic products from rogue online pharmacies, but even those who never open junk messages are at risk. As Krebs notes, spammers can—and do—hack into accounts through these emails, harvest personal information like usernames and passwords, and sell them on the digital black market. The fallout from this global epidemic doesn't just cost consumers and companies billions, it costs lives too.Fast-paced and utterly gripping, Spam Nation ultimately proposes concrete solutions for protecting ourselves online and stemming this tidal wave of cybercrime, before it's too late."Krebs's talent for exposing the weaknesses in online security has earned him respect in the IT business and loathing among cybercriminals. His track record of scoops has helped him become the rare blogger who supports himself on the strength of his reputation for hard-nosed reporting." Bloomberg Businessweek

1914 Days of Hope


Lyn Macdonald - 1987
    This is an account of the first few months of the Great War, from the build-up of the fighting to the first Battle of Ypres, written by the author of Somme, They called it Passchendaele and The Roses of No Man's Land.

We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency


Parmy Olson - 2012
    WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec. In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.

The Best of 2600: A Hacker Odyssey


Emmanuel Goldstein - 2008
    Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker's perspective. Included are stories about the creation of the infamous tone dialer "red box" that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks.

Hacking: The Art of Exploitation


Jon Erickson - 2003
    This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

Late Innings: A Baseball Companion


Roger Angell - 1982
    Alternate cover edition for ISBN 0671425676Incisive, personal reporting that covers the five most recent baseball seasons and such events as Reggie Jackson's three World Series home runs, the triumph of the Phillies, and the bitter ordeal of the 1981 players' strike.

Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw - By the Man Who Did It


Tsutomu Shimomura - 1996
    Reprint. NYT.

The Hacker Playbook 2: Practical Guide To Penetration Testing


Peter Kim - 2015
    The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

Intel Wars: The Secret History of the Fight Against Terror


Matthew M. Aid - 2012
    Five hundred billion dollars of spending in the Bush-Cheney years turned the U.S. spy network into a monster: 200,000-plus employees, stations in 170 countries, and an annual budget of more than $75 billion. Armed with cutting-edge surveillance gear, high-tech weapons, and fleets of armed and unarmed drone aircraft, America deploys the most advanced intel force in history. But even after the celebrated strike against Osama Bin Laden, America's spies are still struggling to beat a host of ragtag enemies around the world. In Intel Wars, preeminent secrecy and intelligence historian Matthew Aid ("our reigning expert on the NSA"-Seymour M. Hersh) delivers the inside stories of how and why our shadow war against extremism has floundered. Spendthrift, schizophrenic policies leave next-generation spy networks drowning in raw data, resource-starved, and choked on paperwork. Overlapping jurisdictions stall CIA operatives, who wait seventy-two hours for clearance to attack fast-moving Taliban IE D teams. U.S. military computers-their classified hard drives still in place-turn up for sale at Afghan bazaars. Swift, tightly focused operations like the Bin Laden strike are the exception rather than the rule. Intel Wars-based on extensive, on-the-ground interviews, and revelations from Wikileaks cables and other newly declassified documents-shows how our soldier-spies are still fighting to catch up with the enemy. Matthew Aid captures the lumbering behemoth that is the U.S. military-intelligence complex in one comprehensive narrative, and distills the unprecedented challenges to our security into a compelling- and sobering-read.

Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet


Joseph Menn - 2010
    His guides are California surfer and computer whiz Barrett Lyon and a fearless British high-tech agent. Through these heroes, Menn shows the evolution of cyber-crime from small-time thieving to sophisticated, organized gangs, who began by attacking corporate websites but increasingly steal financial data from consumers and defense secrets from governments. Using unprecedented access to Mob businesses and Russian officials, the book reveals how top criminals earned protection from the Russian government.Fatal System Error penetrates both the Russian cyber-mob and La Cosa Nostra as the two fight over the Internet's massive spoils. The cloak-and-dagger adventure shows why cyber-crime is much worse than you thought—and why the Internet might not survive.

Nice Guys Finish Last


Leo Durocher - 1975
    But for sheer cantankerousness, fighting moxie, and will to win, very few have come close to Leo "the Lip" Durocher. Following a five decade career as a player and manager for baseball's most storied franchises, Durocher teamed up with veteran sportswriter Ed Linn to tell the story of his life in the game. The resulting book, Nice Guys Finish Last, is baseball at its best, brimming with personality and full of all the fights and feuds, triumphs and tricks that made Durocher such a success and an outsized celebrity.