Book picks similar to
Privacy On The Line: The Politics Of Wiretapping And Encryption by Whitfield Diffie
non-fiction
cryptography
intelligence
infosec
Alan Turing: Unlocking the Enigma
David Boyle - 2014
Turing’s openness about his homosexuality at a time when it was an imprisonable offense ultimately led to his untimely lo death at the age of only forty-one. In Alan Turing: Unlocking the Enigma, David Boyle reveals the mysteries behind the man and his remarkable career. Aged just 22, Turing was elected a fellow at King's College, Cambridge on the strength of a dissertation in which he proved the central limit theorem. By the age of 33, he had been awarded the OBE by King George VI for his wartime services: Turing was instrumental in cracking the Nazi Enigma machines at the top secret code breaking establishment at Bletchley Park during the Second World War.But his achievements were to be tragically overshadowed by the paranoia of the post-War years. Hounded for his supposedly subversive views and for his sexuality, Turing was prosecuted in 1952, and forced to accept the humiliation of hormone treatment to avoid a prison sentence. Just two years later, at the age of 41 he was dead. The verdict: cyanide poisoning.Was Turing’s death accidental as his mother always claimed? Or did persistent persecution drive him to take him own life?Alan Turing: Unlocking the Enigma seeks to find the man behind the science, illuminating the life of a person who is still a shadowy presence behind his brilliant achievements.
Open Secrets: WikiLeaks, War and American Diplomacy
The New York Times - 2011
government diplomatic cables and battlefield reports. The New York Times played a crucial role in breaking the WikiLeaks story, and “Open Secrets” is the definitive chronicle of the documents’ release and the controversy that ensued. It includes detailed analyses of the documents by Times correspondents; opinion essays by Frank Rich, Maureen Dowd and others; and the full text of all the cables and war logs posted on The Times's Web site, along with 27 new cables selected for this volume. It also includes an essay in which the executive editor of The Times, Bill Keller, explains how the newspaper came to publish documents obtained by WikiLeaks, and why it did; expanded profiles of Julian Assange, WikiLeaks's founder, and Bradley Manning, the Army private suspected of being his source; and original essays on what the fracas has revealed about American diplomacy and government secrecy. A legal and technological thriller and a primer on world politics, "Open Secrets" is also a field guide to how information and power are wielded today, and why it matters.
Web Hacking 101
Peter Yaworski
With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different.Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties. With over 30 examples, the book covers topics like:HTML InjectionCross site scripting (XSS)Cross site request forgery (CSRF)Open RedirectsRemote Code Execution (RCE)Application Logicand more...Each example includes a classification of the attack, a report link, the bounty paid, easy to understand description and key takeaways. After reading this book, your eyes will be opened to the wide array of vulnerabilities that exist and you'll likely never look at a website or API the same way.
Rogue Warrior of the SAS: The Blair Mayne Legend
Roy Bradford - 1987
Robert Blair Mayne is still regarded as one of the greatest soldiers in the history of military special operations. He was the most decorated British soldier of the Second World War, receiving four DSOs, the Croix de Guerre, and the Legion d'honneur, and he pioneered tactics used today by the SAS and other special operations units worldwide. Rogue Warrior of the SAS tells the remarkable life story of "Colonel Paddy," whose exceptional physical strength and uniquely swift reflexes made him a fearsome opponent. But his unorthodox rules of war and his resentment of authority would deny him the ultimate accolade of the Victoria Cross. Drawing on personal letters and family papers, declassified SAS files and records, together with the Official SAS Diary compiled in wartime and eyewitness accounts, this is the true story of the soldier.
The Net Delusion: The Dark Side of Internet Freedom
Evgeny Morozov - 2010
Yet for all the talk about the democratizing power of the Internet, regimes in Iran and China are as stable and repressive as ever. In fact, authoritarian governments are effectively using the Internet to suppress free speech, hone their surveillance techniques, disseminate cutting-edge propaganda, and pacify their populations with digital entertainment. Could the recent Western obsession with promoting democracy by digital means backfire?In this spirited book, journalist and social commentator Evgeny Morozov shows that by falling for the supposedly democratizing nature of the Internet, Western do-gooders may have missed how it also entrenches dictators, threatens dissidents, and makes it harder - not easier - to promote democracy. Buzzwords like "21st-century statecraft" sound good in PowerPoint presentations, but the reality is that "digital diplomacy" requires just as much oversight and consideration as any other kind of diplomacy.Marshaling compelling evidence, Morozov shows why we must stop thinking of the Internet and social media as inherently liberating and why ambitious and seemingly noble initiatives like the promotion of "Internet freedom" might have disastrous implications for the future of democracy as a whole.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
Don Murdoch - 2014
The BTHb includes essential information in a condensed handbook format. Main topics include the incident response process, how attackers work, common tools for incident response, a methodology for network analysis, common indicators of compromise, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, packet headers, and numerous other quick reference topics. The book is designed specifically to share "real life experience," so it is peppered with practical techniques from the authors' extensive career in handling incidents. Whether you are writing up your cases notes, analyzing potentially suspicious traffic, or called in to look over a misbehaving server - this book should help you handle the case and teach you some new techniques along the way.
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson - 2010
Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.
Security Engineering: A Guide to Building Dependable Distributed Systems
Ross J. Anderson - 2008
Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
The Dark Net: Inside the Digital Underworld
Jamie Bartlett - 2014
A world that is as creative and complex as it is dangerous and disturbing. A world that is much closer than you think.The dark net is an underworld that stretches from popular social media sites to the most secretive corners of the encrypted web. It is a world that frequently appears in newspaper headlines, but one that is little understood, and rarely explored. The Dark Net is a revelatory examination of the internet today, and of its most innovative and dangerous subcultures: trolls and pornographers, drug dealers and hackers, political extremists and computer scientists, Bitcoin programmers and self-harmers, libertarians and vigilantes.Based on extensive first-hand experience, exclusive interviews and shocking documentary evidence, The Dark Net offers a startling glimpse of human nature under the conditions of freedom and anonymity, and shines a light on an enigmatic and ever-changing world.
Recording The Beatles: The Studio Equipment and Techniques Used To Record Their Classic Albums
Kevin Ryan - 2006
It addresses the technical side of The Beatles' sessions and was written with the assistance of many of the group's former engineers and technicians [1]. The book looks at every piece of recording equipment used at Abbey Road Studios during the Beatles' sessions, including all microphones, outboard gear, mixing consoles, speakers, and tape machines. Each piece is examined in great detail, and the book is illustrated with hundreds of full color photographs, charts, drawings and illustrations. How the equipment was implemented during the group's sessions is also covered. The effects used on the Beatles' records are addressed in great detail, with full explanations of concepts such as ADT and flanging. The Production section of the book looks at the group's recording processes chronologically, starting with their "artist test" in 1962 and progressing through to their final session in 1970. The book contains several rare and unseen photos of the Beatles in the studio. The studio personnel and the studio itself is examined.The authors spent over a decade researching the subject matter and offer up their findings in exhaustive detail. The 540-page hardcover book has been highly praised not only for its massive scope, but also for its presentation. The "Deluxe" version, released in September of 2006, was housed in a replica EMI multi-track tape-box, complete with faux time-worn edges. Rather than a listing of the tape's contents, the back of the box featured the book's contents, hand-written by former Beatles tape-op and engineer, Ken Scott. The book was also accompanied by several "bonus items", including reproductions of never-seen photos of the Beatles. The first printing of 3,000 books sold out in November of 2006, and a second printing was released in February of 2007. The book is currently in its fourth printing.The book has been critically praised by recognized Beatles authority Mark Lewisohn (who also contributed the book's Foreword), The New York Times[2][3], Mojo (magazine) (which gave it 5 stars), Beatles engineers Norman Smith, Ken Scott, and Alan Parsons, Yoko Ono, and many other individuals directly involved with the Beatles' work. The release of the book was celebrated in November 2006 with a party in Studio Two at Abbey Road [4]. In attendance were most of the Beatles' former engineers and technicians.
Codebreakers' Victory: How the Allied Cryptographers Won World War II
Hervie Haufler - 2003
From the Purple Machine to the Navajo Talkers to the breaking of Japan's JN-25 Naval Code to the shadowy world of decoding units like Hut-8 in Bletchley Park, he shows how crucial information-often obtained by surreptitious and violent means-was the decisive edge in the Battle of Britain, at Midway and against the U-Boats in the North Atlantic, and how Allied intelligence saved the Soviet Union from almost certain defeat. In an accessible account based on years of research, interviews and exclusive access to previously top-secret archives, Haufler demonstrates how cryptography enabled Nimitz and MacArthur to persevere in the Pacific and helped Eisenhower and Patton mount the assaults on Normandy. In compelling detail, Haufler shows us how it was done-as only one who was on the frontlines of the "secret war" could tell it.
The Hacker Diaries: Confessions of Teenage Hackers
Dan Verton - 2001
He was a normal kid...On February 7, 2000, Yahoo.com was the first victim of the biggest distributed denial-of-service attack ever to hit the Internet. On May 8th, Buy.com was battling a massive denial-of-service attack. Later that afternoon, eBay.com also reported significant outages of service, as did Amazon.com. Then CNN's global online news operation started to grind to a crawl. By the following day, Datek and E-Trade entered crisis mode...all thanks to an ordinary fourteen-year-old kid.Friends and neighbors were shocked to learn that the skinny, dark-haired, boy next door who loved playing basketball--almost as much as he loved computers--would cause millions of dollars worth of damage on the Internet and capture the attention of the online world--and the federal government. He was known online as Mafiaboy and, to the FBI, as the most notorious teenage hacker of all time. He did it all from his bedroom PC. And he's not alone.Computer hacking and Web site defacement has become a national pastime for America's teenagers, and according to the stories you'll read about in The Hacker Diaries--it is only the beginning. But who exactly are these kids and what motivates a hacker to strike? Why do average teenagers get involved in hacking in the first place? This compelling and revealing book sets out to answer these questions--and some of the answers will surprise you. Through fascinating interviews with FBI agents, criminal psychologists, law-enforcement officials--as well as current and former hackers--you'll get a glimpse inside the mind of today's teenage hacker. Learn how they think, find out what it was like for them growing up, and understand the internal and external pressures that pushed them deeper and deeper into the hacker underground. Every hacker has a life and story of his or her own. One teenager's insatiable curiosity as to how the family's VCR worked was enough to trigger a career of cracking into computer systems. This is a remarkable story of technological wizardry, creativity, dedication, youthful angst, frustration and disconnection from society, boredom, anger, and jail time. Teenage hackers are not all indifferent punks. They're just like every other kid and some of them probably live in your neighborhood. They're there. All you have to do is look.
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz - 2014
But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:Create a trojan command-and-control using GitHubDetect sandboxing and automate common malware tasks, like keylogging and screenshottingEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machineExtend the popular Burp Suite web-hacking toolAbuse Windows COM automation to perform a man-in-the-browser attackExfiltrate data from a network most sneakilyInsider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python."
Game Six: Cincinnati, Boston, and the 1975 World Series: The Triumph of America's Pastime
Mark Frost - 2009
The Red Sox and the Cincinnati Reds have endured an excruciating three-day rain delay. Tonight, at last, they will play Game Six of the World Series. Leading three games to two, Cincinnati hopes to win it all; Boston is desperate to stay alive. But for all the anticipation, nobody could have predicted what a classic it would turn out to be: an extra-innings thriller, created by one of the Big Red Machine's patented comebacks and the Red Sox's improbable late-inning rally; clutch hitting, heart-stopping defensive plays, and more twists and turns than a Grand Prix circuit, climaxed by one of the most famous home runs in baseball history that ended it in the twelfth. Here are all the inside stories of some of that era's biggest names in sports: Johnny Bench, Luis Tiant, Sparky Anderson, Pete Rose, Carl Yastrzemski--eight Hall of Famers in all--as well as sportscasters and network execs, cameramen, umpires, groundskeepers, politicians, and fans who gathered in Fenway that extraordinary night.Game Six is an unprecedented behind-the-scenes look at what is considered by many to be the greatest baseball game ever played--remarkable also because it was about so much more than just balls and strikes. This World Series marked the end of an era; baseball's reserve clause was about to be struck down, giving way to the birth of free agency, a watershed moment that changed American sports forever. In bestselling author Mark Frost's talented hands, the historical significance of Game Six becomes every bit as engrossing as its compelling human drama.