Nothing to Hide: The False Tradeoff between Privacy and Security


Daniel J. Solove - 2011
    But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. Why can't we have both? In this concise and accessible book, Solove exposes the fallacies of many pro-security arguments that have skewed law and policy to favor security at the expense of privacy. Protecting privacy isn't fatal to security measures; it merely involves adequate oversight and regulation. Solove traces the history of the privacy-security debate from the Revolution to the present day. He explains how the law protects privacy and examines concerns with new technologies. He then points out the failings of our current system and offers specific remedies. Nothing to Hide makes a powerful and compelling case for reaching a better balance between privacy and security and reveals why doing so is essential to protect our freedom and democracy.

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous


Gabriella Coleman - 2014
    She ended up becoming so closely connected to Anonymous that the tricky story of her inside–outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.The narrative brims with details unearthed from within a notoriously mysterious subculture, whose semi-legendary tricksters—such as Topiary, tflow, Anachaos, and Sabu—emerge as complex, diverse, politically and culturally sophisticated people. Propelled by years of chats and encounters with a multitude of hackers, including imprisoned activist Jeremy Hammond and the double agent who helped put him away, Hector Monsegur, Hacker, Hoaxer, Whistleblower, Spy is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age, including the history of “trolling,” the ethics and metaphysics of hacking, and the origins and manifold meanings of “the lulz.”

The Blood of Free Men: The Liberation of Paris, 1944


Michael S. Neiberg - 2012
    Other jewels of Europe -- sites like Warsaw, Antwerp, and Monte Cassino -- were, or would soon be, reduced to rubble during attempts to liberate them. But Paris endured, thanks to a fractious cast of characters, from Resistance cells to Free French operatives to an unlikely assortment of diplomats, Allied generals, and governmental officials. Their efforts, and those of the German forces fighting to maintain control of the city, would shape the course of the battle for Europe and color popular memory of the conflict for generations to come. In The Blood of Free Men, celebrated historian Michael Neiberg deftly tracks the forces vying for Paris, providing a revealing new look at the city's dramatic and triumphant resistance against the Nazis. The salvation of Paris was not a foregone conclusion, Neiberg shows, and the liberation was a chaotic operation that could have easily ended in the city's ruin. The Allies were intent on bypassing Paris so as to strike the heart of the Third Reich in Germany, and the French themselves were deeply divided; feuding political cells fought for control of the Resistance within Paris, as did Charles de Gaulle and his Free French Forces outside the city. Although many of Paris's citizens initially chose a tenuous stability over outright resistance to the German occupation, they were forced to act when the approaching fighting pushed the city to the brink of starvation. In a desperate bid to save their city, ordinary Parisians took to the streets, and through a combination of valiant fighting, shrewd diplomacy, and last-minute aid from the Allies, managed to save the City of Lights. A groundbreaking, arresting narrative of the liberation, The Blood of Free Men tells the full story of one of the war's defining moments, when a tortured city and its inhabitants narrowly survived the deadliest conflict in human history.

How Obama Betrayed America....And No One Is Holding Him Accountable


David Horowitz - 2013
    is so guilty for past transgressions that it deserves to be chastened on the world stage. As David Horowitz shows in this no holds barred pamphlet, minimizing the Islamist threat to the United States is not an oversight of the Obama administration; it is policy. The most dangerous Islamist regime, Iran, is being allowed to acquire nuclear weapons while Washington dithers over pointless negotiations and stands by as the mullahs fill the vacuum in Iraq created by the withdrawal of all American forces, against the advice of the Joint Chiefs of Staff. In Afghanistan, supposedly the "good war," victory is not an option; the Taliban licks its chops and waits for American troops to leave in ignominy. Meanwhile, this White House has facilitated the rise of the Muslim Brotherhood throughout the Middle East, helping it come to power in Cairo, bankrolling it and giving it F-16s that are likely someday to be used against Israel, and displayed weakness in Syria by ignoring "red lines" it said would never be crossed. It is a low point for America, as David Horowitz shows, with Republicans, traditionally the party of strong national security, offering only an echo, not a choice in American foreign policy, watching in a state of policy paralysis as Obama appeases our enemies and enables their evil ambitions.

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography


Simon Singh - 1999
    From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.

America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare


Joel Brenner - 2011
    An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems.Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that.The structure and culture of the Internet favor spies over governments and corporations, and hackers over privacy, and we've done little to alter that balance. Brenner draws on his extraordinary background to show how to right this imbalance and bring to cyberspace the freedom, accountability, and security we expect elsewhere in our lives.In America the Vulnerable, Brenner offers a chilling and revelatory appraisal of the new faces of war and espionage-virtual battles with dangerous implications for government, business, and all of us.

DarkMarket: Cyberthieves, Cybercops and You


Misha Glenny - 2011
    The world has become a law enforcer's nightmare and every criminal's dream. We bank online; shop online; date, learn, work and live online. But have the institutions that keep us safe on the streets learned to protect us in the burgeoning digital world? Have we become complacent about our personal security--sharing our thoughts, beliefs and the details of our daily lives with anyone who might care to relieve us of them?In this fascinating and compelling book, Misha Glenny, author of the international best seller "McMafia," explores the three fundamental threats facing us in the twenty-first century: cybercrime, cyberwarfare and cyberindustrial espionage. Governments and the private sector are losing billions of dollars each year fighting an ever-morphing, often invisible and often supersmart new breed of criminal: the hacker. Glenny has traveled and trawled the world. By exploring the rise and fall of the criminal website DarkMarket he has uncovered the most vivid, alarming and illuminating stories. Whether JiLsi or Matrix, Iceman, Master Splynter or Lord Cyric; whether Detective Sergeant Chris Dawson in Scunthorpe, England, or Agent Keith Mularski in Pittsburgh, Pennsylvania, Glenny has tracked down and interviewed all the players--the criminals, the geeks, the police, the security experts and the victims--and he places everyone and everything in a rich brew of politics, economics and history.The result is simply unputdownable. DarkMarket is authoritative and completely engrossing. It's a must-read for everyone who uses a computer: the essential crime book for our times.

Wacky Packages


The Topps Company Inc. - 2008
    In fact, for the first two years they were published, Wacky Packages were the only Topps product to achieve higher sales than their flagship line of baseball cards. The series has been relaunched several times over the years, most recently to great success in 2007.Known affectionately among collectors as “Wacky Packs,” as a creative force with artist Art Spiegelman, the stickers were illustrated by such notable comics artists as Kim Deitch, , Bill Griffith, Jay Lynch, and Norm Saunders.This first-ever collection of Series One through Series Seven (from 1973 and 1974) celebrates the 35th anniversary of Wacky Packages and is sure to amuse collectors and fans young and old.

CRACK99: The Takedown of a $100 Million Chinese Software Pirate


David Locke Hall - 2015
    Navy intelligence officer, David Locke Hall was a federal prosecutor when a bizarre-sounding website, CRACK99, came to his attention. It looked like Craigslist on acid, but what it sold was anything but amateurish: thousands of high-tech software products used largely by the military, and for mere pennies on the dollar. Want to purchase satellite tracking software? No problem. Aerospace and aviation simulations? No problem. Communications systems designs? No problem. Software for Marine One, the presidential helicopter? No problem. With delivery times and customer service to rival the world’s most successful e-tailers, anybody, anywhere—including rogue regimes, terrorists, and countries forbidden from doing business with the United States—had access to these goods for any purpose whatsoever.But who was behind CRACK99, and where were they? The Justice Department discouraged potentially costly, risky cases like this, preferring the low-hanging fruit that scored points from politicians and the public. But Hall and his colleagues were determined to find the culprit. They bought CRACK99's products for delivery in the United States, buying more and more to appeal to the budding entrepreneur in the man they identified as Xiang Li. After winning his confidence, they lured him to Saipan—a U.S. commonwealth territory where Hall’s own father had stormed the beaches with the marines during World War II. There they set up an audacious sting that culminated in Xiang Li's capture and imprisonment. The value of the goods offered by CRACK99? A cool $100 million.An eye-opening look at cybercrime and its chilling consequences for national security, CRACK99 reads like a caper that resonates with every amazing detail.

332 Magazine Covers


Norman Rockwell - 1979
    Although technically Norman Rockwell was an academic painter, he had the eye of a photographer and, as he became a mature artist, he used this eye to give us a picture of America that was famliar�astonishingly so�and at the same time unique. Rockwell best expressed this vision of America in his justly famous cover illustrations for magazines like The Saturday Evening Post. 332 of these cover paintings, from beloved classics like "Marbles Champion" to lesser-known gems like "Feeding Time," are reproduced in stunning full color in this large-format volume, which is sure to be treasured by art lovers everywhere.

Computer Security: Principles and Practice


William Stallings - 2007
    This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. Comprehensive treatment of user authentication and access control. Unified approach to intrusion detection and firewalls, giving readers a solid understanding of the threats and countermeasures. More detailed coverage of software security than other books. Exploration of management issues. Systematic, comprehensive discussion of malicious software and denial of service attacks. Coverage of Linux and Windows Vista. Up-to-date coverage of database security. Thorough overview of cryptography, authentication, and digital signatures. Coverage of Internet security. For system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists; a solid, up-to-date reference or tutorial for self-study.

SAS Operation Storm: Nine men against four hundred


Roger Cole - 2011
    The tipping point, Mirbat, South Oman, 19 July 1972 is one of the least-known yet most crucial battles of modern times. If the SAS had been defeated at Mirbat, the Russian and Chinese plan for a communist foothold in the Middle East would have succeeded, with catastrophic consequences for the oil-hungry West. OPERATION STORM is a page-turning account of courage and resilience. Mirbat was a battle fought and won by nine SAS soldiers and a similar number of brave local people - some as young as ten years old - outnumbered by at least twenty-five to one. Roger Cole, one of the SAS soldiers who took part, and writer Richard Belfield have interviewed every SAS survivor who fought in the battle from the beginning to the end - the first time every single one of them has revealed their experience. OPERATION STORM is a classic story of bravery against impossible odds, minute by minute, bullet by bullet.

Dark Mirror: Edward Snowden and the American Surveillance State


Barton Gellman - 2020
    Barton Gellman’s informant called himself ‘Verax’ - the truth-teller. It was only later that Verax unmasked himself as Edward Snowden. But Gellman’s primary role in bringing Snowden’s revelations to light, for which he shared the Pulitzer Prize, is only the beginning of this gripping real-life spy story. Snowden unlocked the door: here Gellman describes what he found on the other side over the course of a years-long journey of investigation. It is also the story of his own escalating battle against unknown digital adversaries after he discovered his own name on a file in the leaked document trove and realised that he himself was under attack.Through a gripping narrative of paranoia, clandestine operations and jaw-dropping revelations, Dark Mirror delineates in full for the first time the hidden superstructure that connects government espionage with Silicon Valley. Who is spying on us and why? Here are the answers.©2020 Barton Gellman (P)2020 Penguin Audio

Jim Henson's Doodle Dreams: Inspiration for Living Life Outside the Lines


Jim Lewis - 2008
     The perfect gift for graduates or for the holidays, this title encourages readers to express their own unique creativity and sense of humor.

Google Hacking for Penetration Testers, Volume 1


Johnny Long - 2004
    What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of informationleakage. *First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.