Book picks similar to
Cyber Security by Edward Amoroso
cyber
cyber-security
cybersec-hack
paper-book-library
Reversing: Secrets of Reverse Engineering
Eldad Eilam - 2005
The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into disassembly-code-level reverse engineering-and explaining how to decipher assembly language
The ARRL Extra Class License Manual for Ham Radio
H. Ward Silver - 2002
Whenyou upgrade to Extra Class, you gain access to the entire Amateur Radio frequency spectrum. Ues this book to ace the top-level ham radio licensing exam. Our expert instruction will lead you through all of the knowledge you need to pass the exam: rules, specific operating skills and more advanced electronics theory.
Mindf*ck: Cambridge Analytica and the Plot to Break America
Christopher Wylie - 2019
Bannon had long sensed that deep within America's soul lurked an explosive tension. Cambridge Analytica had the data to prove it, and in 2016 Bannon had a presidential campaign to use as his proving ground.Christopher Wylie might have seemed an unlikely figure to be at the center of such an operation. Canadian and liberal in his politics, he was only twenty-four when he got a job with a London firm that worked with the U.K. Ministry of Defense and was charged putatively with helping to build a team of data scientists to create new tools to identify and combat radical extremism online. In short order, those same military tools were turned to political purposes, and Cambridge Analytica was born. Wylie's decision to become a whistleblower prompted the largest data crime investigation in history. His story is both exposé and dire warning about a sudden problem born of very new and powerful capabilities. It has not only exposed the profound vulnerabilities and profound carelessness in the enormous companies that drive the attention economy, it has also exposed the profound vulnerabilities of democracy itself. What happened in 2016 was just a trial run. Ruthless actors are coming for your data, and they want to control what you think.
Grumby
Andy Kessler - 2010
In this comic novel a band of hacker-geeks load state-of-the-art artificial intelligence, including working eyes, ears, spy software, and a smart mouth, into a bunch of old Furby dolls, re-christened Grumbies, network them together, sell millions, become rich and famous and make enemies/allies of Mossad, the CIA, Google, Microsoft, IRS, Goldman Sachs, the guys from Google, and Steve Jobs.
Over The Top: How The Internet Is (Slowly But Surely) Changing The Television Industry
Alan Wolk - 2015
Given the intricacies of the industry, it's also going to be the most resistant to change. Alan Wolk, an industry veteran and longtime analyst and observer, lays out how the television industry is adapting to the digital era, explaining what's really happening in a tone that will appeal to laypeople and insiders alike. In the first section, Wolk takes us through how the industry works today, focusing on how the various players actually make money and who pays who for what. The next section deals with the changes that are taking place in the industry today–everything from time shifting to binge viewing to cord cutting–and how those changes are starting to create some seismic shifts. In the final section, Wolk reveals his predictions for the future and what the industry will look like in ten years time. Andrew Wallenstein, co-editor-in-chief of Variety says "Alan Wolk is one of the most insightful observers writing about the media business today. There's no better expert to help you navigate the confusing, complicated nexus of TV and the Internet." David Zaslav, President and CEO of Discovery Communications says "Alan Wolk has a deep understanding of the complex nature of television today… this is a fantastic primer of the business and one of the most educated perspectives on the future of our rapidly evolving industry."
iPod & iTunes For Dummies
Tony Bove - 2003
You'll learn about everything from buying music and videos, importing music, and burning CDs to setting up play lists, transferring and viewing photos, adding podcasts, maintaining battery life, and synchronizing information. Order your copy today!
Smart Phone Dumb Phone: Free Yourself from Digital Addiction
Allen Carr - 2019
When their phone is out of sight or the signal wavers, anxiety rises. You hear people saying again and again: 'I can't live without my phone, ' and sadly technology which should be a wonderful boon to us has started to blight lives; the more you are addicted, the less you get out of it. Technology can turn against us if we let it. Allen Carr's Easyway is the most successful stop-smoking method of all time. It works by unravelling the brainwashing that leads us to desire the very thing that is bad for us and it can help beat any addiction. For the first time, it has been applied to the problems of overusing your mobile phone, and it works
Come and Take It: The Gun Printer's Guide to Thinking Free
Cody Wilson - 2016
Deflecting interference from the State Department and the Bureau of Alcohol, Tobacco, Firearms and Explosives, the story of Defense Distributed—where Wilson’s employees work against all odds to defend liberty and the right to access arms through the production of 3D printed firearms—takes us across continents, into dusty warehouses and high rise condominiums, through television studios, to the Texas desert, and beyond.Harkening to both Zen and the Art of Motorcycle Maintenance and The Anarchist Cookbook, Come and Take It follows a group of digital radicals as they navigate political subterfuge to create a technological miracle, against all odds. Combining elements of a modern-day thriller with a fascinating philosophical treatise, Wilson paints a scathing and timely portrait of an ideologically polarized America and his own struggle in the fight for liberty.
Modern Technical Writing: An Introduction to Software Documentation
Andrew Etter - 2016
Written by the lead technical writer at one of Silicon Valley's most exciting companies, Modern Technical Writing is a set of guiding principles and thoughtful recommendations for new and experienced technical writers alike. Not a reference manual, and not comprehensive, it instead serves as an introduction to a sensible writing and publishing process, one that has eluded the profession for too long.
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter - 2014
The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.
Worm: The First Digital World War
Mark Bowden - 2011
Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm: the story of the first digital world war.
Confessions of a Rogue Nuclear Regulator
Gregory B. Jaczko - 2019
Smith. But, thanks to the determination of a powerful senator, he would soon find himself at the agency’s helm. A Birkenstocks-wearing physics PhD, Jaczko was unlike any chairman the agency had ever seen: he was driven by a passion for technology and a concern for public safety, with no ties to the industry and no agenda other than to ensure that his agency made the world a safer place. And so Jaczko witnessed what outsiders like him were never meant to see—an agency overpowered by the industry it was meant to regulate and a political system determined to keep it that way. After an emergency trip to Japan to help oversee the frantic response to the horrifying nuclear disaster at Fukushima in 2011, and witnessing the American nuclear industry’s refusal to make the changes he considered necessary to prevent an equally catastrophic event from occurring here, Jaczko started saying aloud what no one else had dared. Confessions of a Rogue Nuclear Regulator is a wake-up call to the dangers of lobbying, the importance of governmental regulation, and the failures of congressional oversight. But it is also a classic tale of an idealist on a mission whose misadventures in Washington are astounding, absurd, and sometimes even funny—and Jaczko tells the story with humor, self-deprecation, and, yes, occasional bursts of outrage. Above all, Confessions of a Rogue Nuclear Regulator is a tale of confronting the truth about one of the most pressing public safety and environmental issues of our time: nuclear power will never be safe.
Behind Deep Blue: Building the Computer That Defeated the World Chess Champion
Feng-Hsiung Hsu - 2002
Written by the man who started the adventure, Behind Deep Blue reveals the inside story of what happened behind the scenes at the two historic Deep Blue vs. Kasparov matches. This is also the story behind the quest to create the mother of all chess machines. The book unveils how a modest student project eventually produced a multimillion dollar supercomputer, from the development of the scientific ideas through technical setbacks, rivalry in the race to develop the ultimate chess machine, and wild controversies to the final triumph over the world's greatest human player.In nontechnical, conversational prose, Feng-hsiung Hsu, the system architect of Deep Blue, tells us how he and a small team of fellow researchers forged ahead at IBM with a project they'd begun as students at Carnegie Mellon in the mid-1980s: the search for one of the oldest holy grails in artificial intelligence--a machine that could beat any human chess player in a bona fide match. Back in 1949 science had conceived the foundations of modern chess computers but not until almost fifty years later--until Deep Blue--would the quest be realized.Hsu refutes Kasparov's controversial claim that only human intervention could have allowed Deep Blue to make its decisive, "uncomputerlike" moves. In riveting detail he describes the heightening tension in this war of brains and nerves, the "smoldering fire" in Kasparov's eyes. Behind Deep Blue is not just another tale of man versus machine. This fascinating book tells us how man as genius was given an ultimate, unforgettable run for his mind, no, not by the genius of a computer, but of man as toolmaker.
Crushing YouTube: How to Start a YouTube Channel, Launch Your YouTube Business and Make Money
Joseph Hogue - 2019
If you're serious about starting a YouTube business and want to make money on YouTube, I can show you the way. I've doubled my monthly income by creating a YouTube channel. Thousands of people watch each video and I've built a community that supports and motivates me every day...and that's all in less than two years! Is it Too Late to Start a YouTube Business? I"ve been developing online businesses since 2012 but was late to the game on YouTube. By the time I started my YouTube channel, people were already saying, "YouTube is dead!"; People were saying you couldn"t grow on YouTube anymore and that small channels couldn't win in the YouTube algorithm. I'm living proof you CAN start a YouTube business and be successful. I average $3,500 a month on ads alone (June 2019) and another three- to four-thousand on sponsorships, affiliates and my own products. In fact, I believe we’re just coming into the Age of YouTube with the rollout of 5G and every business owner needs a video presence.
A YouTube How-To from Someone that's Been There
I've seen the frustration for small YouTubers, trying to compete and get views against the million-subscriber monsters. I know what it’s like to start a channel from nothing. I’ll not only show you how to set up your channel to look professional, I’ll reveal the secrets even some of the biggest YouTube creators don’t know. In this book, you'll learn: How to get YouTube video ideas and hack the most popular videos for viral success (Pg 49) Five steps to building a YouTube channel brand that creates an army of supporters (Pg 69) The easy way to record videos, even if you don't like to be on camera (Pg 85) Five income streams that guarantee you WILL make money on YouTube (Pg 135) Since starting my YouTube channel, I've consulted and helped other video influencers grow their channels for millions of views. I’ve helped them find sponsorships and make enough money to quit their day job to make YouTube a full-time business. I can do the same for you with this book. I can show you the way but YOU have to get started. Scroll back up and click Buy Now to create your YouTube business and start making money on YouTube.
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State
Glenn Greenwald - 2014
That source turned out to be the twenty-nine-year-old NSA contractor Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security and information privacy.Now Greenwald fits all the pieces together, recounting his high-intensity eleven-day trip to Hong Kong, examining the broader implications of the surveillance detailed in his reporting for The Guardian, and revealing fresh information on the NSA's unprecedented abuse of power with documents from the Snowden archive. Fearless and incisive, No Place to Hide has already sparked outrage around the globe and been hailed by voices across the political spectrum as an essential contribution to our understanding of the U.S. surveillance state.