Book picks similar to
Cyber Security by Edward Amoroso


technology
k-u
cybersec-hack
engineering

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography


Simon Singh - 1999
    From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.

Kali Linux Revealed: Mastering the Penetration Testing Distribution


Raphaël Hertzog - 2017
    They provided a secure and reliable foundation, allowing us to concentrate on securing our digital world.An amazing community has built up around Kali Linux. Every month, more than 300,000 of us download a version of Kali. We come together in online and real-world training rooms and grind through the sprawling Offensive Security Penetration Testing Labs, pursuing the near-legendary Offensive Security certifications. We come together on the Kali forums, some 40,000 strong, and hundreds of us at a time can be found on the Kali IRC channel. We gather at conferences and attend Kali Dojos to learn from the developers themselves how to best leverage Kali.However, the Kali team has never released an official Kali Linux manual, until now.In this book, we'll focus on the Kali Linux platform itself, and help you understand and maximize Kali from the ground up. The developers will walk you through Kali Linux features and fundamentals, provide a crash course in basic Linux commands and concepts, and then walk you through the most common Kali Linux installation scenarios. You'll learn how to configure, troubleshoot and secure Kali Linux and then dive into the powerful Debian package manager. Throughout this expansive section, you'll learn how to install and configure packages, how to update and upgrade your Kali installation, and how to create your own custom packages. Then you'll learn how to deploy your custom installation across massive enterprise networks. Finally, you'll be guided through advanced topics such as kernel compilation, custom ISO creation, industrial-strength encryption, and even how to install crypto kill switches to safeguard your sensitive information.Whether you're a veteran or an absolute n00b, this is the best place to start with Kali Linux, the security professional's platform of choice.

Machines that Think: Everything you need to know about the coming age of artificial intelligence (New Scientist Instant Expert)


New Scientist - 2017
    So are we on the edge of an AI-pocalypse, with super-intelligent devices superseding humanity, as predicted by Stephen Hawking? Or will this herald a kind of Utopia, with machines doing a far better job at complex tasks than us? You might not realise it, but you interact with AIs every day. They route your phone calls, approve your credit card transactions and help your doctor interpret results. Driverless cars will soon be on the roads with a decision-making computer in charge. But how do machines actually think and learn? In Machines That Think, AI experts and New Scientist explore how artificial ingence helps us understand human intelligence, machines that compose music and write stories - and ask if AI is really a threat.--

Comptia A+ 220-801 and 220-802 Exam Cram


David L. Prowse - 2012
     Limited Time Offer: Buy CompTIA(R) A+ 220-801 and 220-802 Exam Cram and receive a 10% off discount code for the CompTIA A+ 220-801 and 220-802 exams. To receive your 10% off discount code:Register your product at pearsonITcertification.com/registerFollow the instructionsGo to your Account page and click on "Access Bonus Content" CompTIA(R) A+ 220-801 and 220-802 Exam Cram, Sixth Edition is the perfect study guide to help you pass CompTIA's A+ 220-801 and 220-802 exams. It provides coverage and practice questions for every exam topic, including substantial new coverage of Windows 7, new PC hardware, tablets, smartphones, and professional-level networking and security. The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Exam Alerts, Sidebars, and Notes interspersed throughout the text keep you focused on what you need to know. Cram Quizzes help you assess your knowledge, and the Cram Sheet tear card is the perfect last minute review. Covers the critical information you'll need to know to score higher on your CompTIA A+ 220-801 and 220-802 exams!Deploy and administer desktops and notebooks running Windows 7, Vista, or XPUnderstand, install, and troubleshoot motherboards, processors, and memoryTest and troubleshoot power-related problemsUse all forms of storage, including new Blu-ray and Solid State (SSD) devicesWork effectively with mobile devices, including tablets and smartphonesInstall, configure, and troubleshoot both visible and internal laptop componentsConfigure Windows components and applications, use Windows administrative tools, and optimize Windows systemsRepair damaged Windows environments and boot errorsWork with audio and video subsystems, I/O devices, and the newest peripheralsInstall and manage both local and network printersConfigure IPv4 and understand TCP/IP protocols and IPv6 changesInstall and configure SOHO wired/wireless networks and troubleshoot connectivityImplement secure authentication, prevent malware attacks, and protect data Companion CDThe companion CD contains a digital edition of the Cram Sheet and the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions and two complete practice exams. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. Pearson IT Certifcation Practice Test Minimum System RequirementsWindows XP (SP3), WIndows Vista (SP2), or Windows 7Microsoft .NET Framework 4.0 ClientPentium-class 1 GHz processor (or equivalent)512 MB RAM650 MB disk space plus 50 MB for each downloaded practice exam David L. Prowse is an author, computer network specialist, and technical trainer. Over the past several years he has authored several titles for Pearson Education, including the well-received CompTIA A+ Exam Cram and CompTIA Security+ Cert Guide. As a consultant, he installs and secures the latest in computer and networking technology. He runs the website www.davidlprowse.com, where he gladly answers questions from students and readers.

DarkMarket: Cyberthieves, Cybercops and You


Misha Glenny - 2011
    The world has become a law enforcer's nightmare and every criminal's dream. We bank online; shop online; date, learn, work and live online. But have the institutions that keep us safe on the streets learned to protect us in the burgeoning digital world? Have we become complacent about our personal security--sharing our thoughts, beliefs and the details of our daily lives with anyone who might care to relieve us of them?In this fascinating and compelling book, Misha Glenny, author of the international best seller "McMafia," explores the three fundamental threats facing us in the twenty-first century: cybercrime, cyberwarfare and cyberindustrial espionage. Governments and the private sector are losing billions of dollars each year fighting an ever-morphing, often invisible and often supersmart new breed of criminal: the hacker. Glenny has traveled and trawled the world. By exploring the rise and fall of the criminal website DarkMarket he has uncovered the most vivid, alarming and illuminating stories. Whether JiLsi or Matrix, Iceman, Master Splynter or Lord Cyric; whether Detective Sergeant Chris Dawson in Scunthorpe, England, or Agent Keith Mularski in Pittsburgh, Pennsylvania, Glenny has tracked down and interviewed all the players--the criminals, the geeks, the police, the security experts and the victims--and he places everyone and everything in a rich brew of politics, economics and history.The result is simply unputdownable. DarkMarket is authoritative and completely engrossing. It's a must-read for everyone who uses a computer: the essential crime book for our times.

Turing's Cathedral: The Origins of the Digital Universe


George Dyson - 2012
    In Turing’s Cathedral, George Dyson focuses on a small group of men and women, led by John von Neumann at the Institute for Advanced Study in Princeton, New Jersey, who built one of the first computers to realize Alan Turing’s vision of a Universal Machine. Their work would break the distinction between numbers that mean things and numbers that do things—and our universe would never be the same. Using five kilobytes of memory (the amount allocated to displaying the cursor on a computer desktop of today), they achieved unprecedented success in both weather prediction and nuclear weapons design, while tackling, in their spare time, problems ranging from the evolution of viruses to the evolution of stars. Dyson’s account, both historic and prophetic, sheds important new light on how the digital universe exploded in the aftermath of World War II. The proliferation of both codes and machines was paralleled by two historic developments: the decoding of self-replicating sequences in biology and the invention of the hydrogen bomb. It’s no coincidence that the most destructive and the most constructive of human inventions appeared at exactly the same time.  How did code take over the world? In retracing how Alan Turing’s one-dimensional model became John von Neumann’s two-dimensional implementation, Turing’s Cathedral offers a series of provocative suggestions as to where the digital universe, now fully three-dimensional, may be heading next.

21 Lessons: What I've Learned from Falling Down the Bitcoin Rabbit Hole


Gigi - 2020
    Like many others, I feel like I have learned more in the last couple of years studying Bitcoin than I have during two decades of formal education. The following lessons are a distillation of what I’ve learned. First published as an article series titled “What I’ve Learned From Bitcoin,” what follows can be seen as a third edition of the original series. Like Bitcoin, these lessons aren’t a static thing. I plan to work on them periodically, releasing updated versions and additional material in the future.Bitcoin is an inexhaustible teacher, which is why I do not claim that these lessons are all-encompassing or complete. They are a reflection of my personal journey down the rabbit hole. There are many more lessons to be learned, and every person will learn something different from entering the world of Bitcoin. I hope that you will find these lessons useful and that the process of learning them by reading won’t be as arduous and painful as learning them firsthand.

Management Information Systems


Raymond McLeod Jr. - 1979
    Focusing on the role of managers within an organization, the volume emphasizes the development of computer-based Information Systems to support an organization's objectives and strategic plans. Focusing on the Systems Concepts, the Systems Approach is implemented throughout the text. The volume covers essential concepts such as using information technology to engage in electronic commerce, and information resources such as database management systems, information security, ethical implications of information technology and decision support systems with projects to challenge users at all levels of competence. For those involved in Management Information Systems.

Android Hacker's Handbook


Joshua J. Drake - 2013
    Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.

Move Fast: How Facebook Builds Software


Jeff Meyerson - 2021
    You may not like Facebook, but you can't deny its success. And to a large degree, that success stems from the "move fast" ethos. The entire culture of Facebook is built for speed.Move Fast is an exploration of modern software strategies and tactics through the lens of Facebook. Relying on in-depth interviews with more than two dozen Facebook engineers, this book explores the product strategy, cultural principles, and technologies that made Facebook the dominant social networking company. Most importantly, Move Fast investigates how you can apply those strategies to your creative projects.It's not easy to build a software company, but once you know how to move fast, your company will be prepared to build a strategy that benefits from the world's rapid changes, rather than suffering from them.

The Pentester BluePrint: Starting a Career as an Ethical Hacker


Phillip L. Wylie - 2020
    Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement.Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing.Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you:The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties

Understanding Privacy


Daniel J. Solove - 2008
    Offering a comprehensive overview of the difficulties involved in discussions of privacy and ultimately providing a provocative resolution, the author argues that no single definition can be workable, but rather that there are multiple forms of privacy, related to one another by family resemblances.

Treat Your Own Rotator Cuff


Jim Johnson - 2007
    The rotator cuff, a group of four, flat tendons that connect to the critical muscles that stabilize your shoulder, can cause a lot more problems than you might think. Consider a few of these statistics from the published literature: .It's simply just a matter of time until the majority of shoulders get a rotator cuff tear. According to Magnetic Resonance Imaging (MRI) scans, approximately 4% of people under forty years of age have a torn rotator cuff. After age sixty, however, 54% of people have one (Sher 1995). .Once the rotator cuff gets torn, it doesn't look good either. One study followed a group of patients with tears in their rotator cuffs and found that 80% of the them went on to either enlarge or turn into full thickness tears-in less than a two-year period (Yamanaka 1994). As you can tell, rotator cuff problems aren't just for elite athletes. Seriously consider investing just a few minutes a week doing the simple exercises in this book if you: .have been diagnosed with either a partial or full thickness rotator cuff tear (yes, many studies show that even full thickness tears can be helped with exercise!) .experience shoulder pain .do upper body weight lifting .have a job or play a sport where you do a lot of work with your arms above shoulder level .have been diagnosed with "impingement syndrome" .want a healthy and properly functioning rotator cuff So whether you already suffer from a rotator cuff problem, or simply want to prevent one, Treat Your Own Rotator Cuff will guide you step-by-step through an evidence-based program that can iron-plate your shoulders in just minutes a week. Jim Johnson, P.T., is a physical therapist who has spent over fifteen years treating both inpatients and outpatients with a wide range of pain and mobility problems. He has written many books based completely on published research and controlled trials including The Multifidus Back Pain Solution, Treat Your Own Knees, The No-Beach, No-Zone, No-Nonsense Weight Loss Plan: A Pocket Guide to What Works, and The Sixty-Second Motivator. His books have been translated into other languages and thousands of copies have been sold worldwide. Besides working full-time as a clinician in a large teaching hospital and writing books, Jim Johnson is a certified Clinical Instructor by the American Physical Therapy Association and enjoys teaching physical therapy students from all over the United States.

The Edge of Disaster: Rebuilding a Resilient Nation


Stephen Flynn - 2007
    We have learned little from the cataclysms of September 11 and Hurricane Katrina. When it comes to catastrophe, America is living on borrowed time-and squandering it. In this new book, leading security expert Stephen Flynn issues a call to action, demanding that we wake up and prepare immediately for a safer future. The truth is acts of terror cannot always be prevented, and nature continues to show its fury in frighteningly unpredictable ways. Resiliency, argues Flynn, must now become our national motto. With chilling frankness and clarity, Flynn paints an all too real scenario of the threats we face within our own borders. A terrorist attack on a tanker carrying liquefied natural gas into Boston Harbor could kill thousands and leave millions more of New Englanders without power or heat. The destruction of a ship with a cargo of oil in Long Beach, California, could bring the West Coast economy to its knees and endanger the surrounding population. But even these all-too-plausible terrorist scenarios pale in comparison to the potential destruction wrought by a major earthquake or hurricane. Our growing exposure to man-made and natural perils is largely rooted in our own negligence, as we take for granted the infrastructure handed down to us by earlier generations. Once the envy of the world, this infrastructure is now crumbling. After decades of neglect, our public health system leaves us at the mercy of microbes that could kill millions in the next flu pandemic. Flash flooding could wipe out a fifty-year-old dam north of Phoenix, placing thousands of homes and lives at risk. The next San Francisco earthquake could destroy century-old levees, contaminating the freshwater supply that most of California relies on for survival. It doesn't have to be this way. "The Edge of Disaster "tells us what we can do about it, as individuals and as a society. We can-and, Flynn argues, we must-construct a more resilient nation. With the wounds of recent national tragedies still unhealed, the time to act is now. Flynn argues that by tackling head-on, eyes open the perils that lie before us, we can remain true to our most important and endearing national trait: our sense of optimism about the future and our conviction that we can change it for the better for ourselves-and our children. "Steve Flynn offers the answer not only to protecting America from terrorist attacks and natural disaster but also to revitalizing our democracy. This book is a must-read for all members of Congress, 2008 presidential candidates, and ordinary citizens who want to build a better and safer future."-Anne-Marie Slaughter, dean, Woodrow Wilson School of Public and International Affairs, Princeton University Advance praise for "The Edge of Disaster" "Steve Flynn has done it again. Like America the Vulnerable before it, "The Edge of Disaster" is the must-read book for every American, elected official, and presidential candidate who is committed to ensuring that our nation continue to thrive in perilous times."-Mark Warner, former governor of Virginia "Since 9/11, protecting our nation against a terrorist attack has consumed policy makers in Washington. What Stephen Flynn points out in The Edge of Disaster is that much of this effort has been directed overseas, often at the expense of our homeland and its much more likely areas of vulnerability. Laying out a series of potential disasters both manmade and natural, Flynn calls for a greater emphasis on preparedness and the ability of communities and the nation to recover. Painting an often frustrating and infuriating picture of missed opportunities, "The Edge of Disaster "is a call to action. The time to act is now. We can only hope that policy makers are listening." -Christine Todd Whitman, former governor of New Jersey and former administrator, Environmental Protection Agency (2001-03) "Steve Flynn's book makes the very persuasive argument that national security preparedness is linked to natural disaster preparedness. By investing significantly in our critical infrastructure, in citizen preparedness, and most importantly in leadership, we can be better prepared for all hazards. A great book that I highly recommend." -James Lee Witt, former director, Federal Emergency Management Agency "Steve Flynn has become a relentless contributor to the dialogue on prioritizing the work of the post-9/11 security environment. "The Edge of Disaster" calls into question the neglect of domestic preparedness in favor of the Department of Defense-driven offensive in the global war on terrorism. The book offers provocative challenges to both our elected and our private-sector leaders, and both should read it thoroughly." -Admiral James M. Loy, former commandant, U.S. Coast Guard, and former deputy secretary of homeland security

An Anthology of Madness


Max Andrew Dubinsky - 2013
    Featuring brand new stories and some old favorites, many of these tell-all, gritty tales were originally published on the blog Make It MAD between 2010 and 2012, and have been rereleased in their originality for this special print and digital anthology.