Hiding from the Internet: Eliminating Personal Online Information


Michael Bazzell - 2012
    Author Michael Bazzell has been well known in government circles for his ability to locate personal information about anyone through the internet. In Hiding from the Internet: Eliminating Personal Online Information, he exposes the resources that broadcast your personal details to public view. He has researched each source and identified the best method to have your private details removed from the databases that store profiles on all of us. This book will serve as a reference guide for anyone that values privacy. Each technique is explained in simple steps. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The author provides personal experiences from his journey to disappear from public view. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to force companies to remove you from their data collection systems. This book exposes loopholes that create unique opportunities for privacy seekers. Among other techniques, you will learn to: Remove your personal information from public databases and people search sites Create free anonymous mail addresses, email addresses, and telephone numbers Control your privacy settings on social networks and remove sensitive data Provide disinformation to conceal true private details Force data brokers to stop sharing your information with both private and public organizations Prevent marketing companies from monitoring your browsing, searching, and shopping habits Remove your landline and cellular telephone numbers from online websites Use a credit freeze to eliminate the worry of financial identity theft and fraud Change your future habits to promote complete privacy and anonymity Conduct a complete background check to verify proper information removalConfigure a home firewall with VPN Kill-SwitchPurchase a completely invisible home or vehicle

iWar: War and Peace in the Information Age


Bill Gertz - 2017
    Covert information warfare is being waged by world powers, rogue states—such as Russia, China, Iran, and North Korea—and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States. This new type of warfare is part of the Information Age that has come to dominate our lives. In iWar, Bill Gertz describes how technology has completely revolutionized modern warfare, how the Obama administration failed to meet this challenge, and what we can and must do to catch up and triumph over this timely and important struggle.

The Trigger Men: Assassins and Terror Bosses in the Ireland Conflict


Martin Dillon - 2003
    Over three decades he has interviewed and investigated some of the most professional, dangerous and ruthless killers in Ireland. Now Dillon explores their personalities, motivations and bizarre crimes.Many of Ireland's assassins learned their trade in fields and on hillsides in remote parts of Ireland, while others were trained in the Middle East or with Basque separatist terrorists in Spain. Some were one-target-one-shot killers, like the sniper who terrorised the inhabitants of Washington State in the autumn of 2002, while others were bombers skilled in designing the most sophisticated explosive devices and booby traps. Another more powerful group of 'trigger men' were the influential figures in the shadows, who were experts in motivating the killers under their control. All of these men, whether they squeezed the trigger on a high-powered rifle, set the timer on a bomb or used their authority to send others out to commit horrific and unspeakable acts of cruelty, are featured in this book. The Trigger Men takes the reader inside the labyrinthine world of terrorist cells and highly classified counter-terrorism units of British Military Intelligence. The individual stories are described in gripping, unflinching detail and show how the terrorists carried out their ghastly work. Dillon also explores the ideology of the cult of the gunmen and the greed and hatred that motivated assassins in their killing sprees. There are penetrating insights into the mindset of the most infamous assassins: their social and historical conditioning, their callousness......

Where Wizards Stay Up Late: The Origins of the Internet


Katie Hafner - 1996
    Today, twenty million people worldwide are surfing the Net. Where Wizards Stay Up Late is the exciting story of the pioneers responsible for creating the most talked about, most influential, and most far-reaching communications breakthrough since the invention of the telephone. In the 1960's, when computers where regarded as mere giant calculators, J.C.R. Licklider at MIT saw them as the ultimate communications devices. With Defense Department funds, he and a band of visionary computer whizzes began work on a nationwide, interlocking network of computers. Taking readers behind the scenes, Where Wizards Stay Up Late captures the hard work, genius, and happy accidents of their daring, stunningly successful venture.

Hard Ground


Tom Waits - 2011
    Their initial contact grew into a friendship that O'Brien chronicled for the Miami News, where he began his career as a staff photographer. O'Brien's photo essays conveyed empathy for the homeless and the disenfranchised and won two Robert F. Kennedy Journalism Awards. In 2006, O'Brien reconnected with the issue of homelessness and learned the problem has grown exponentially since the 1970s, with as many as 3.5 million adults and children in America experiencing homelessness at some point in any given year.In Hard Ground, O'Brien joins with renowned singer-songwriter Tom Waits, described by the New York Times as "the poet of outcasts," to create a portrait of homelessness that impels us to look into the eyes of people who live "on the hard ground" and recognize our common humanity. For Waits, who has spent decades writing about outsiders, this subject is familiar territory. Combining their formidable talents in photography and poetry, O'Brien and Waits have crafted a work in the spirit of Let Us Now Praise Famous Men, in which James Agee's text and Walker Evans's photographs were "coequal, mutually independent, and fully collaborative" elements. Letting words and images communicate on their own terms, rather than merely illustrate each other, Hard Ground transcends documentary and presents independent, yet powerfully complementary views of the trials of homelessness and the resilience of people who survive on the streets.

Nolan Ryan: The Making of a Pitcher


Rob Goldman - 2014
    During his 27-year career, “The Ryan Express” was named an eight-time All-Star and amassed seven no-hitters and more than 5,700 strikeouts—more than any other pitcher in major-league history. This comprehensive biography of Nolan Ryan follows the baseball legend’s journey from the start of his professional career in 1965 to his retirement in 1993. Hall of Famers, journeymen, clubhouse workers, coaches, and trainers offer their own unique take on Ryan in this book filled with never-before-told anecdotes and personal recollections and peppered with eyewitness accounts of his greatest games. In the pages of this history, readers will discover what made Nolan Ryan one of the most revered and respected athletes and citizens of his time.

The 9/11 Wars


Jason Burke - 2011
    The storm broke on September 11th 2001. Since then much of the world has seen invasions, bombings, battles and riots. Hundreds of thousands of people have died.Jason Burke, a first hand witness of many of the conflict's key moments, has written the definitive account of its course. At once investigation, reportage and contemporary history, it is based on hundreds of interviews with participants including desperate refugees and senior intelligence officials, ministers and foot-soldiers, active militants and their victims. Burke reveals the true nature of contemporary Islamic militancy and the inside story of the fight against it. He cuts through the myth and propaganda of all sides to reveal the reality behind well-known - and lesser known - episodes, and brings characters, voices and a sense of place to a gripping narrative.The 9/11 Wars is an essential book for understanding the dangerous and unstable twenty-first century. Whether reporting on the riots in France or the killing of Bin Laden, suicide bombers in Iraq or British troops fighting in Helmand, Jason Burke tells the story of a world that changed forever when the hijacked planes flew out of the brilliant blue sky above Manhattan on September 11th 2001.

Dollar Sign on the Muscle: The World of Baseball Scouting


Kevin Kerrane - 1984
    Kerrane is a professor of English at the University of Delaware.

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker


Kevin D. Mitnick - 2011
    While other nerds were fumbling with password possibilities, this adept break-artist was penetrating the digital secrets of Sun Microsystems, Digital Equipment Corporation, Nokia, Motorola, Pacific Bell, and other mammoth enterprises. His Ghost in the Wires memoir paints an action portrait of a plucky loner motivated by a passion for trickery, not material game. (P.S. Mitnick's capers have already been the subject of two books and a movie. This first-person account is the most comprehensive to date.)

Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier


Suelette Dreyfus - 1997
    Spanning three continents and a decade of high level infiltration, they created chaos amongst some of the world's biggest and most powerful organisations, including NASA and the US military. Brilliant and obsessed, many of them found themselves addicted to hacking and phreaking. Some descended into drugs and madness, others ended up in jail.As riveting as the finest detective novel and meticulously researched, Underground follows the hackers through their crimes, their betrayals, the hunt, raids and investigations. It is a gripping tale of the digital underground.

Managing Risk and Information Security: Protect to Enable


Malcolm Harkins - 2012
    Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: “Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman.” Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel     “As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities.” Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) “The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come.” Dr. Jeremy Bergsman, Practice Manager, CEB     “The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.

Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath


Ted Koppel - 2015
    Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before.  It isn’t just a scenario. A well-designed attack on just one of the nation’s three electric power grids could cripple much of our infrastructure—and in the age of cyberwarfare, a laptop has become the only necessary weapon. Several nations hostile to the United States could launch such an assault at any time. In fact, as a former chief scientist of the NSA reveals, China and Russia have already penetrated the grid. And a cybersecurity advisor to President Obama believes that independent actors—from “hacktivists” to terrorists—have the capability as well. “It’s not a question of if,” says Centcom Commander General Lloyd Austin, “it’s a question of when.”  And yet, as Koppel makes clear, the federal government, while well prepared for natural disasters, has no plan for the aftermath of an attack on the power grid.  The current Secretary of Homeland Security suggests keeping a battery-powered radio.In the absence of a government plan, some individuals and communities have taken matters into their own hands. Among the nation’s estimated three million “preppers,” we meet one whose doomsday retreat includes a newly excavated three-acre lake, stocked with fish, and a Wyoming homesteader so self-sufficient that he crafted the thousands of adobe bricks in his house by hand. We also see the unrivaled disaster preparedness of the Mormon church, with its enormous storehouses, high-tech dairies, orchards, and proprietary trucking company – the fruits of a long tradition of anticipating the worst. But how, Koppel asks, will ordinary civilians survive?With urgency and authority, one of our most renowned journalists examines a threat unique to our time and evaluates potential ways to prepare for a catastrophe that is all but inevitable.

Joe, You Coulda Made Us Proud


Joe Pepitone - 1975
    He could run, throw, field and he had a sweet swing. But during his twelve years in the major leagues, Pepi devoted most of his energy to swinging off the field. He blew his career, he destroyed two marriages, he lost three children and he came very close to a nervous breakdown. At age 33 he gave up a $70,000 contract in Japan and quit baseball for good. He finally admitted that most of his life he had been living a lie, acting the carefree clown to cover up his inner pain. It was time to close the act. In Joe, You Coulda Made Us Proud, Pepitone attempts to show what was behind his berserk behavior. He does so in the most devastatingly honest terms, holding back none of the embarrassment, the anguish, the guilt he kept accumulating. He tells of the father he loved so much, "Willie Pep" Pepitone, the toughest man in a tough Brooklyn neighborhood. Obsessed with making his son a baseball star, Willie constantly beat hell out of Joe. One night, enraged at his father, Joe said,"Mom- I wish he'd die!" The next day Willie died. He tells how he demolished two marriages by trying to ball American, of how he was haunted by the words of his first child - "Daddy, don't leave me" - and of the nights when the guilt left him impotent. Despite the travail, though, there is much humor in Joe's story. Such as the time he was staying at Frank Sinatra's home, and Joe has a $350 pool shot line up. Just as he shot, Sinatra knocked the ball away. "All right, Frank... I won the money." Sinatra, grinning, said, "Joe, this is my game, this is my table - and we are playing my rules." Usually Joe Pepitone played only by his rules, and those rules maimed him. Yet his regrets are not for what he did to himself... "You do what you have to do, and you pay the price - but you pay it double when you see how it has hurt others you love." - from book's dustjacket

Advanced Penetration Testing: Hacking the World's Most Secure Networks


Wil Allsopp - 2017
    Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data--even from organizations without a direct Internet connection--this guide contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures.Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today's threats operate at a much more complex level--and this book shows you how to defend your high security network.Use targeted social engineering pretexts to create the initial compromise Leave a command and control structure in place for long-term access Escalate privilege and breach networks, operating systems, and trust structures Infiltrate further using harvested credentials while expanding control Today's threats are organized, professionally-run, and very much for-profit. Financial institutions, health care organizations, law enforcement, government agencies, and other high-value targets need to harden their IT infrastructure and human capital against targeted advanced attacks from motivated professionals. Advanced Penetration Testing goes beyond Kali linux and Metasploit and to provide you advanced pen testing for high security networks.

Zero Hour for Gen X: How the Last Adult Generation Can Save America from Millennials


Matthew Hennessey - 2018
    Soon Gen Xers will be the only cohort of Americans who remember life as it was lived before the arrival of the Internet. They are, as Hennessey dubs them, “the last adult generation,” the sole remaining link to a time when childhood was still a bit dangerous but produced adults who were naturally resilient. More than a decade into the social media revolution, the American public is waking up to the idea that the tech sector’s intentions might not be as pure as advertised. The mountains of money being made off our browsing habits and purchase histories are used to fund ever-more extravagant and utopian projects that, by their very natures, will corrode the foundations of free society, leaving us all helpless and digitally enslaved to an elite crew of ultra-sophisticated tech geniuses. But it’s not too late to turn the tide. There’s still time for Gen X to write its own future. A spirited defense of free speech, eye contact, and the virtues of patience, Zero Hour for Gen X is a cultural history of the last 35 years, an analysis of the current social and historical moment, and a generational call to arms.