Book picks similar to
Cyber Security by Edward Amoroso


cyber-security
cybersec-hack
political-science
technology

How to Build a Robot Army: Tips on Defending Planet Earth Against Alien Invaders, Ninjas, and Zombies


Daniel H. Wilson - 2007
    They hunt, swarm, and fire lasers from their eyes. They even beat humans at chess. So who better to stand with us when the real villains arrive? Movies instruct us that, whether we like it or not, we will one day be under siege by pirates, ninjas, zombies, aliens, and Godzilla. Also great white sharks. And-let's face it-we're not prepared. But with the advice contained in this brilliantly illustrated, ingenious book, you can build your own robot army to fend off hordes of bloodthirsty foes. From common-sense injunctions ("never approach an unfamiliar robot in a militarized zone") to tactical pointers ("low-power radar beats cameras for detecting mummies in a fog-shrouded crypt") to engineering advice ("passive-dynamic exoskeleton suits will increase sprint speeds but not leg strength"), this book contains all the wisdom you'll need to fend off the coming apocalypse. Witty, informative, and utterly original, How to Build a Robot Army is the ideal book for readers of any age.

The Internet Police: How Crime Went Online, and the Cops Followed


Nate Anderson - 2013
    It’s not just computer hackers and cyber crooks who lurk in the dark corners of the Web—the cops are there, too.In The Internet Police, Ars Technica deputy editor Nate Anderson takes readers on a behind-the-screens tour of landmark cybercrime cases, revealing how criminals continue to find digital and legal loopholes even as police hurry to cinch them closed. From the Cleveland man whose "natural male enhancement" pill inadvertently protected the privacy of your e-mail to the Russian spam king who ended up in a Milwaukee jail to the Australian arrest that ultimately led to the breakup of the largest child pornography ring in the United States, Anderson draws on interviews, court documents, and law-enforcement reports to reconstruct accounts of how online policing actually works. Questions of online crime are as complex and interconnected as the Internet itself. With each episode in The Internet Police, Anderson shows the dark side of online spaces—but also how dystopian a fully "ordered" alternative would be.Includes an afterword that details law enforcement's dramatic seizure of the online black market Silk Road.

Empire State Building: The Making of a Landmark


John Tauranac - 1994
    The Empire State Building is the companion volume to the Museum of the City of New York's definitive exhibition: "A Dream Well Planned: The Empire State Building."

Defensive Security Handbook: Best Practices for Securing Infrastructure


Lee Brotherston - 2017
    For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring

Sweet Jesus, I Hate Bill O'Reilly


Joseph Minton Amann - 2006
    He calls for boycotting Canada, says Adolf Hitler would have been a card-carrying member of the ACLU, and thinks Hurricane Katrina victims seen carrying televisions should be shot on sight. Amann and Breuer – the creators of the hugely popular website www.sweetjesusihatebilloreilly.com — take a close look at O'Reilly's own assertions and arguments — taken from his TV and radio shows, books and columns — to expose him for what he is: a self-righteous boob and a sham newsman. The ongoing themes explored in Sweet Jesus, I Hate Bill O'Reilly are that O'Reilly is a bit crazy, not all that sharp and, as the authors put it, about "as self-aware as a legume." The result is a hilariously funny book, a great read for anyone who enjoys seeing a puffed-up blowhard taken down a notch or two — whether they're an O'Reilly hater, fan, or something in between.

War in 140 Characters: How Social Media Is Reshaping Conflict in the Twenty-First Century


David Patrikarakos - 2017
    Whether you are a president or a terrorist, if you don't understand how to deploy the power of social media effectively you may win the odd battle but you will lose a twenty-first century war. Here, journalist David Patrikarakos draws on unprecedented access to key players to provide a new narrative for modern warfare. He travels thousands of miles across continents to meet a de-radicalized female member of ISIS recruited via Skype, a liberal Russian in Siberia who takes a job manufacturing "Ukrainian" news, and many others to explore the way social media has transformed the way we fight, win, and consume wars-and what this means for the world going forward.

Strength of Materials, Part 1 and Part 2


Stephen P. Timoshenko - 1983
    1: Elementary Theory and Problems contains the essential material that is usually covered in required courses of strength of materials in our engineering schools. Strength of Materials - Part. 2: Advanced Theory and Problems contains the later developments that are of practical importance in the fields of strength of materials, and theory of elasticity. Complete derivations of problems of practical interest are given in most cases. The books are illustrated with a number of problems to which solutions are presented. In many cases, the problems are chosen so as to widen the field covered by the text and to illustrate the application of the theory in the solution of design problems.

Black Code: The Battle for the Future of Cyberspace


Ronald J. Deibert - 2011
    It is difficult to imagine a world without instant access and 24/7 connectivity. We have reengineered our business, governance, and social relations around a planetary network unlike any that has come before. And, as with any social transformation, there have been unintended consequences.     In Black Code, Ron Deibert examines the profound effect that cyberspace is having on the relationship between citizens and states, on the private and public spheres, and on domestic and international affairs. Cyberspace has brought us a world of do-it-yourself signals intelligence, he argues, and WikiLeaks is only a symptom of a much larger phenomenon to which governments, businesses, and individuals will have to get accustomed. Our lives have been turned inside out by a digital world of our own spinning.     Fast-paced, revealing, and sometimes terrifying, Black Code takes readers into the shadowy realm of cybersecurity, offering insight into the very future of cyberspace and revealing what new rules and norms we will need to adopt in order to survive in this new environment.

The Success of Open Source


Steven Weber - 2004
    Leaving source code open has generated some of the most sophisticated developments in computer technology, including, most notably, Linux and Apache, which pose a significant challenge to Microsoft in the marketplace. As Steven Weber discusses, open source's success in a highly competitive industry has subverted many assumptions about how businesses are run, and how intellectual products are created and protected.Traditionally, intellectual property law has allowed companies to control knowledge and has guarded the rights of the innovator, at the expense of industry-wide cooperation. In turn, engineers of new software code are richly rewarded; but, as Weber shows, in spite of the conventional wisdom that innovation is driven by the promise of individual and corporate wealth, ensuring the free distribution of code among computer programmers can empower a more effective process for building intellectual products. In the case of Open Source, independent programmers--sometimes hundreds or thousands of them--make unpaid contributions to software that develops organically, through trial and error.Weber argues that the success of open source is not a freakish exception to economic principles. The open source community is guided by standards, rules, decisionmaking procedures, and sanctioning mechanisms. Weber explains the political and economic dynamics of this mysterious but important market development.

The Moonshot Game: Adventures of an Indian Venture Capitalist


Rahul Chandra - 2019
    The second wave came in 2006 when home-grown VCs raised large amounts of capital and funded products and services companies for Indian consumers.This is a gripping behind-the-scenes story of a VC's journey, right from the beginning of the second start-up revolution in India in 2006 until the end of the funding frenzy in 2016. A story about how global conditions, local consumers, founder ambition and good old greed shaped the start-up story in India.Rahul Chandra is the co-founder of Helion Ventures, and in this candid memoir he tells us about his journey building one of India's oldest VC firms. In a remarkably gripping account, he recounts his adventures in India's hyper-funded start-up ecosystem.The Moonshot Game gives readers an insight into the secret world of a VC, with unguarded stories involving large bets and big mistakes, and tales of how one juggles several investments at the same time.Rahul shows why being a VC is a constant journey of ups and downs, why building value is a long-term business, and why no amount of failure can be an excuse to lose optimism in the power of entrepreneurship.

Ctrl+Shift+Enter Mastering Excel Array Formulas: Do the Impossible with Excel Formulas Thanks to Array Formula Magic


Mike Girvin - 2013
    Beginning with an introduction to array formulas, this manual examines topics such as how they differ from ordinary formulas, the benefits and drawbacks of their use, functions that can and cannot handle array calculations, and array constants and functions. Among the practical applications surveyed include how to extract data from tables and unique lists, how to get results that match any criteria, and how to utilize various methods for unique counts. This book contains 529 screen shots.

Battleship


Peter Padfield - 2004
    It describes the evolution, use and eclipse of the battleship.’ Lloyds’ List ‘With crisp scholarship, Peter Padfield traces the development of the battleship from sailing ships much like Nelson’s which had been fitted with auxiliary steam engines and had iron armour hung on their sides, to the ultimate: the Japanese battleship, Yamato, a giant of more than 70,000 tons firing 18 inch shells more than 20 miles.’ Books and Bookmen ‘A fascinating documentary account of particular interest to the armchair strategist.’ Booklist ‘A worthy addition to anyone’s library that wishes to learn more of the rise and fall of the battleship.’ Good Book Guide The battleship reigned supreme at sea from the 1860s to the 1940s, the ultimate symbol of naval power and national pride, queen on the naval chessboard. This book describes its evolution from the wooden man-of-war plated with iron armour to the great steel leviathan of the Second World War, and its ultimate displacement as arbiter of naval power by the aircraft carrier. At the same time the author explains how strategy and battle tactics changed in response to the mounting of ever larger guns with greater range and penetrative power, and the development of threatening new weapon systems, particularly torpedoes, torpedo boats, mines and submarines; and he explores the chilling reality of action with vivid descriptions of major naval battles including the Yalu in the first Sino-Japanese War, Tsushima in the Russo-Japanese War, Jutland in the First World War and many lesser known engagements. The pioneer naval architects and engineers and the commanders who fought these great ships in action, Togo, Jellicoe, Beatty, Scheer, Hipper, Cunningham, Lee, Oldendorf find their way naturally into this absorbing, often horrifying history of what was once the arbiter of naval power.

The Sciences of the Artificial


Herbert A. Simon - 1969
    There are updates throughout the book as well. These take into account important advances in cognitive psychology and the science of design while confirming and extending the book's basic thesis: that a physical symbol system has the necessary and sufficient means for intelligent action. The chapter "Economic Reality" has also been revised to reflect a change in emphasis in Simon's thinking about the respective roles of organizations and markets in economic systems."People sometimes ask me what they should read to find out about artificial intelligence. Herbert Simon's book The Sciences of the Artificial is always on the list I give them. Every page issues a challenge to conventional thinking, and the layman who digests it well will certainly understand what the field of artificial intelligence hopes to accomplish. I recommend it in the same spirit that I recommend Freud to people who ask about psychoanalysis, or Piaget to those who ask about child psychology: If you want to learn about a subject, start by reading its founding fathers." -- George A. Miller

Masters of Deception: The Gang That Ruled Cyberspace


Michelle Slatalla - 1995
    "An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour

Cypherpunks: Freedom and the Future of the Internet


Julian Assange - 2012
    Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us. Among the topics addressed are: Do Facebook and Google constitute "the greatest surveillance machine that ever existed," perpetually tracking our location, our contacts and our lives? Far from being victims of that surveillance, are most of us willing collaborators? Are there legitimate forms of surveillance, for instance in relation to the "Four Horsemen of the Infopocalypse" (money laundering, drugs, terrorism and pornography)? And do we have the ability, through conscious action and technological savvy, to resist this tide and secure a world where freedom is something which the Internet helps bring about?The harassment of WikiLeaks and other Internet activists, together with attempts to introduce anti-file sharing legislation such as SOPA and ACTA, indicate that the politics of the Internet have reached a crossroads. In one direction lies a future that guarantees, in the watchwords of the cypherpunks, "privacy for the weak and transparency for the powerful"; in the other lies an Internet that allows government and large corporations to discover ever more about internet users while hiding their own activities. Assange and his co-discussants unpick the complex issues surrounding this crucial choice with clarity and engaging enthusiasm.