Book picks similar to
Cyber Security by Edward Amoroso
k-u
nonfiction
guides
paper-book-library
Site Reliability Engineering: How Google Runs Production Systems
Betsy Beyer - 2016
So, why does conventional wisdom insist that software engineers focus primarily on the design and development of large-scale computing systems?In this collection of essays and articles, key members of Google's Site Reliability Team explain how and why their commitment to the entire lifecycle has enabled the company to successfully build, deploy, monitor, and maintain some of the largest software systems in the world. You'll learn the principles and practices that enable Google engineers to make systems more scalable, reliable, and efficient--lessons directly applicable to your organization.This book is divided into four sections: Introduction--Learn what site reliability engineering is and why it differs from conventional IT industry practicesPrinciples--Examine the patterns, behaviors, and areas of concern that influence the work of a site reliability engineer (SRE)Practices--Understand the theory and practice of an SRE's day-to-day work: building and operating large distributed computing systemsManagement--Explore Google's best practices for training, communication, and meetings that your organization can use
SUNBURST and LUMINARY - An Apollo Memoir
Don Eyles - 2018
His assignment is to program the complex lunar landing phase in the Lunar Module's onboard computer. As he masters his art the reader learns about the computer, the mission, and a bit about spacecraft navigation and meets a cast of interesting characters along the way. As Apollo 11 approaches, the author flies lunar landings in simulators and meets the astronauts who will fly the LM for real. He explains the computer alarms that almost prevented Neil Armstrong from landing and describes a narrow escape from another dangerous problem. He helps Pete Conrad achieve a pinpoint landing on Apollo 12, and works with Apollo 16 commander John Young on a technique for landing even more precisely. On Apollo 14 he devises a workaround when a faulty pushbutton threatens Alan Shepard's mission, earning a NASA award, a story in Rolling Stone, and a few lines in the history books. Along the way the author hits the high points of his eclectic personal life, as he enters adulthood in the 1960s. He writes for students of the Apollo project, for whom the development of the flight software is still largely unexplored territory, but also for the young coders of the current digital culture, who will get the author's observations on the art of programming and who may identify as he explores sex, drugs, and the other excitements of the era. The underlying thesis is that the American space program in the 1960s was successful not in spite of, but in large measure because of the idealism, the freedom of thought, and the sense of exploration, inner and outer, that prevailed in the culture during that period. The memoir concludes in a party atmosphere at the spectacular night launch of Apollo 17 before a glittery crowd an occasion that marked the high water mark, so far, of human space exploration.
The Quest: Energy, Security, and the Remaking of the Modern World
Daniel Yergin - 2011
A master storyteller as well as a leading energy expert, Yergin shows us how energy is an engine of global political and economic change. It is a story that spans the energies on which our civilization has been built and the new energies that are competing to replace them. From the jammed streets of Beijing to the shores of the Caspian Sea, from the conflicts in the Mideast to Capitol Hill and Silicon Valley, Yergin takes us into the decisions that are shaping our future.The drama of oil-the struggle for access, the battle for control, the insecurity of supply, the consequences of use, its impact on the global economy, and the geopolitics that dominate it-continues to profoundly affect our world.. Yergin tells the inside stories of the oil market and the surge in oil prices, the race to control the resources of the former Soviet empire, and the massive mergers that transformed the landscape of world oil. He tackles the toughest questions: Will we run out of oil? Are China and the United States destined to come into conflict over oil? How will a turbulent Middle East affect the future of oil supply?Yergin also reveals the surprising and sometimes tumultuous history of nuclear and coal, electricity, and the "shale gale" of natural gas, and how each fits into the larger marketplace. He brings climate change into unique perspective by offering an unprecedented history of how the field of climate study went from the concern of a handful of nineteenth- century scientists preoccupied with a new Ice Age into one of the most significant issues of our times.He leads us through the rebirth of renewable energies and explores the distinctive stories of wind, solar, and biofuels. He offers a perspective on the return of the electric car, which some are betting will be necessary for a growing global economy.The Quest presents an extraordinary range of characters and dramatic stories that illustrate the principles that will shape a robust and flexible energy security system for the decades to come. Energy is humbling in its scope, but our future requires that we deeply understand this global quest that is truly reshaping our world.
How Linux Works: What Every Superuser Should Know
Brian Ward - 2004
Some books try to give you copy-and-paste instructions for how to deal with every single system issue that may arise, but How Linux Works actually shows you how the Linux system functions so that you can come up with your own solutions. After a guided tour of filesystems, the boot sequence, system management basics, and networking, author Brian Ward delves into open-ended topics such as development tools, custom kernels, and buying hardware, all from an administrator's point of view. With a mixture of background theory and real-world examples, this book shows both "how" to administer Linux, and "why" each particular technique works, so that you will know how to make Linux work for you.
Rick Steves Belgium: Bruges, Brussels, Antwerp & Ghent
Rick Steves - 2015
Stop and smell the tulips as you hike past whirring windmills. Visit the ultramodern European Parliament. Explore beyond the cosmopolitan bustle of Brussels with trips to Ghent and Antwerp. When it’s time for a break, sample fine chocolates or sip local beers—each served in its own distinctive glass.Rick’s candid, humorous advice will guide you to good-value hotels and restaurants. He’ll help you plan where to go and what to see, depending on the length of your trip. You’ll get up-to-date recommendations about what is worth your time and money. More than just reviews and directions, a Rick Steves guidebook is a tour guide in your pocket.This first edition guide replaces Rick Steves' Snapshot Bruges & Brussels, ISBN 9781612382296.
Too Soon To Tell
Calvin Trillin - 1995
His short takes send us back to contemporary life refreshed and delighted.
Cyber War Will Not Take Place
Thomas Rid - 2013
In 2005, the U.S. Air Force boasted it would now fly, fight, and win in cyberspace, the "fifth domain" of warfare. This book takes stock, twenty years on: is cyber war really coming? Has war indeed entered the fifth domain? Cyber War Will Not Take Place cuts through the hype and takes a fresh look at cyber security. Thomas Rid argues that the focus on war and winning distracts from the real challenge of cyberspace: non-violent confrontation that may rival or even replace violence in surprising ways. The threat consists of three different vectors: espionage, sabotage, and subversion. The author traces the most significant hacks and attacks, exploring the full spectrum of case studies from the shadowy world of computer espionage and weaponised code. With a mix of technical detail and rigorous political analysis, the book explores some key questions: What are cyber weapons? How have they changed the meaning of violence? How likely and how dangerous is crowd-sourced subversive activity? Why has there never been a lethal cyber attack against a country's critical infrastructure? How serious is the threat of "pure" cyber espionage, of exfiltrating data without infiltrating humans first? And who is most vulnerable: which countries, industries, individuals?
Energy for Future Presidents: The Science Behind the Headlines
Richard A. Muller - 2012
citizens that nothing has more impact on our lives than the supply of and demand for energy. Its procurement dominates our economy and foreign policy more than any other factor. But the “energy question” is more confusing, contentious, and complicated than ever before. We need to know if nuclear power will ever really be safe. We need to know if solar and wind power will ever really be viable. And we desperately need to know if the natural gas deposits in Pennsylvania are a windfall of historic proportions or a false hope that will create more problems than solutions. Richard A. Muller provides all the answers in this must-read guide to our energy priorities now and in the coming years.
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
Joseph Menn - 2019
Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development of Tor, the most important privacy tool on the net, and helped build cyberweapons that advanced US security without injuring anyone. With its origins in the earliest days of the Internet, the cDc is full of oddball characters -- activists, artists, even future politicians. Many of these hackers have become top executives and advisors walking the corridors of power in Washington and Silicon Valley. The most famous is former Texas Congressman and current presidential candidate Beto O'Rourke, whose time in the cDc set him up to found a tech business, launch an alternative publication in El Paso, and make long-shot bets on unconventional campaigns.Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
The Hacker Diaries: Confessions of Teenage Hackers
Dan Verton - 2001
He was a normal kid...On February 7, 2000, Yahoo.com was the first victim of the biggest distributed denial-of-service attack ever to hit the Internet. On May 8th, Buy.com was battling a massive denial-of-service attack. Later that afternoon, eBay.com also reported significant outages of service, as did Amazon.com. Then CNN's global online news operation started to grind to a crawl. By the following day, Datek and E-Trade entered crisis mode...all thanks to an ordinary fourteen-year-old kid.Friends and neighbors were shocked to learn that the skinny, dark-haired, boy next door who loved playing basketball--almost as much as he loved computers--would cause millions of dollars worth of damage on the Internet and capture the attention of the online world--and the federal government. He was known online as Mafiaboy and, to the FBI, as the most notorious teenage hacker of all time. He did it all from his bedroom PC. And he's not alone.Computer hacking and Web site defacement has become a national pastime for America's teenagers, and according to the stories you'll read about in The Hacker Diaries--it is only the beginning. But who exactly are these kids and what motivates a hacker to strike? Why do average teenagers get involved in hacking in the first place? This compelling and revealing book sets out to answer these questions--and some of the answers will surprise you. Through fascinating interviews with FBI agents, criminal psychologists, law-enforcement officials--as well as current and former hackers--you'll get a glimpse inside the mind of today's teenage hacker. Learn how they think, find out what it was like for them growing up, and understand the internal and external pressures that pushed them deeper and deeper into the hacker underground. Every hacker has a life and story of his or her own. One teenager's insatiable curiosity as to how the family's VCR worked was enough to trigger a career of cracking into computer systems. This is a remarkable story of technological wizardry, creativity, dedication, youthful angst, frustration and disconnection from society, boredom, anger, and jail time. Teenage hackers are not all indifferent punks. They're just like every other kid and some of them probably live in your neighborhood. They're there. All you have to do is look.
Paul Graham: The Art of Funding a Startup
Andrew Warner - 2011
Thank you for your feedback and patience.From Andrew Warner:I first interviewed Paul Graham after I heard something shocking from Alexis Ohanian, a founder whose company was funded by Graham's Y Combinator. Alexis came to Mixergy to tell the story of how he launched and sold Reddit.If you're a founder, you know the kind of problems that founders have, right? Figuring out what product to create, how to build it, how to get users to try it, etc.Well Alexis didn't seem to have those problems, or at least they weren't as challenging for him as they were for most of the other 600 entrepreneurs I interviewed on Mixergy.Why? Because Paul Graham helped him launch his business.How did Graham make Reddit's launch easier and more successful than other companies' founding? How did he do the same for hundreds of other startups? And, more importantly, what can you learn from his experiences to grow your business?The book you're holding has those answers.Use what you're about to learn to build your successful startup. After you do, I hope you'll let me interview you so other founders can learn from your experience, the way you're about to benefit from Graham's.About Hyperink, the publisher:Hyperink is the easiest way for anyone to publish a beautiful, high-quality book.We work closely with subject matter experts to create each eBook. We cover topics ranging from higher education to job recruiting, from Android apps marketing to barefoot running.If you have interesting knowledge that people are willing to pay for, especially if you've already produced content on the topic, please reach out to us! There's no writing required and it's a unique opportunity to build your own brand and earn royalties.
The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behavior Changes Online
Mary Aiken - 2016
Levitt, co-author of Freakonomics - One of the best books of the year--NatureMary Aiken, the world's leading expert in forensic cyberpsychology, offers a starting point for all future conversations about how the Internet is shaping development and behavior, societal norms and values, children, safety, privacy, and our perception of the world. Drawing on her own research and extensive experience with law enforcement, Aiken covers a wide range of subjects, from the impact of screens on the developing child to the explosion of teen sexting and the acceleration of compulsive and addictive behaviors online. Aiken provides surprising statistics and incredible-but-true case studies of hidden trends that are shaping our culture and raising troubling questions about where the digital revolution is taking us.Praise for The Cyber Effect"How to guide kids in a hyperconnected world is one of the biggest challenges for today's parents. Mary Aiken clearly and calmly separates reality from myth. She clearly lays out the issues we really need to be concerned about and calmly instructs us on how to keep our kids safe and healthy in their digital lives."--Peggy Orenstein, author of the New York Times bestseller Girls & Sex"[A] fresh voice and a uniquely compelling perspective that draws from the murky, fascinating depths of her criminal case file and her insight as a cyber-psychologist . . . This is Aiken's cyber cri de coeur as a forensic scientist, and she wants everyone on the case."--The Washington Post"Fascinating . . . If you have children, stop what you are doing and pick up a copy of The Cyber Effect."--The Times (UK)"An incisive tour of sociotechnology and its discontents."--Nature"Just as Rachel Carson launched the modern environmental movement with her Silent Spring, Mary Aiken delivers a deeply disturbing, utterly penetrating, and urgently timed investigation into the perils of the largest unregulated social experiment of our time."--Bob Woodward"Mary Aiken takes us on a fascinating, thought-provoking, and at times scary journey down the rabbit hole to witness how the Internet is changing the human psyche. A must-read for anyone who wants to understand the temptations and tragedies of cyberspace."--John R. Suler, PhD, author of The Psychology of Cyberspace"Drawing on a fascinating and mind-boggling range of research and knowledge, Mary Aiken has written a great, important book that terrifies then consoles by pointing a way forward so that our experience online might not outstrip our common sense."--Steven D. Levitt"Having worked with law enforcement groups from INTERPOL and Europol as well as the U.S. government, Aiken knows firsthand how today's digital tools can be exploited by criminals lurking in the Internet's Dark Net."--Newsweek
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Clint Watts - 2018
In Messing with the Enemy, the cyber and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind. Watts reveals how these malefactors use your information and that of your friends and family to work for them through social media, which they use to map your social networks, scour your world affiliations, and master your fears and preferences.Thanks to the schemes engineered by social media manipulators using you and your information, business executives have coughed up millions in fraudulent wire transfers, seemingly good kids have joined the Islamic State, and staunch anti-communist Reagan Republicans have cheered the Russian government’s hacking of a Democratic presidential candidate’s e-mails. Watts knows how they do it because he’s mirrored their methods to understand their intentions, combat their actions, and coopt their efforts.Watts examines a particular social media platform—from Twitter to internet Forums to Facebook to LinkedIn—and a specific bad actor—from al Qaeda to the Islamic State to the Russian and Syrian governments—to illuminate exactly how social media tracking is used for nefarious purposes. He explains how he’s learned, through his successes and his failures, to engage with hackers, terrorists, and even the Russians—and how these interactions have generated methods of fighting back. Shocking, funny, and eye-opening, Messing with the Enemy is a deeply urgent guide for living safe and smart in a super-connected world.
New GRE 2011-2012 Premier with CD-ROM
Kaplan Test Prep - 2011
With an increasing number of graduate and business school applicants and an increasing number of GRE test-takers—now a complete test overhaul by the test-maker—a high GRE score is critical to set yourself apart from the competition.New GRE 2011-2012 Premier with CD-ROM is a comprehensive package that includes a book, CD-ROM, and online companion with in-depth strategies, test information, and practice questions to help students score higher on the new GRE Revised General Test. New GRE 2011-2012 Premier with CD-ROM is fully updated and revised with 75 percent all-new content covering the revised and expanded Verbal, Quantitative, and Analytical Writing Assessment Test sections, including 50 percent new practice questions and brand new strategies for each of the new question types.New GRE 2011-2012 Premier with CD-ROM features:6 full-length practice tests (1 in the book, 5 online)400 practice questions and answer explanations on the CD-ROMA detailed overview of the test changesKey strategies for all New GRE question typesDetails and practice sets for the Verbal and Quantitative sectionsDiagnostic tool in end-of-chapter practice sets for even more targeted practiceAdvice for the graduate school application processKaplan guarantees that readers will score higher on the GRE Revised General Test using our guide—or get their money back.