Book picks similar to
The Smartest Person in the Room by Christian Espinosa
giveaways
business
politics
computer-science
Tools and Weapons: The Promise and the Peril of the Digital Age
Brad Smith - 2019
This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. Now, though, we have reached an inflection point: Silicon Valley has moved fast and it has broken things. A new understanding has emerged that companies that create technology must accept greater responsibility for the future. And governments will need to regulate technology by moving faster and catching up with the pace of innovation that is impacting our communities and changing the world.In Tools and Weapons, Brad Smith takes us into the cockpit of one of the world's largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no preexisting playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of AI, big tech's relationship to inequality and the challenges for democracy, far and near. While in no way a self-glorifying "Microsoft memoir," the book opens up the curtain remarkably wide onto some of the company's most crucial recent decision points, as it strives to protect the hopes technology offers against the very real threats it also presents. Every tool can be a weapon in the wrong person's hands, and companies are being challenged in entirely new ways to embrace the totality of their responsibilities. We have moved from a world in which Silicon Valley could take no prisoners to one in which tech companies and governments must work together to address the challenges and adapt to the changes technology has unleashed. There are huge ramifications to be thought through, and Brad Smith provides a marvelous and urgently necessary contribution to that effort.
Managing Risk and Information Security: Protect to Enable
Malcolm Harkins - 2012
Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologiessuch as social media and the huge proliferation of Internet-enabled deviceswhile minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context. Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies. The book contains eye-opening security insights that are easily understood, even by the curious layman. Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities. Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) The mandate of the information security function is being completely rewritten. Unfortunately most heads of security havent picked up on the change, impeding their companies agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come. Dr. Jeremy Bergsman, Practice Manager, CEB The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
Parmy Olson - 2012
WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec. In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.
Black Code: Inside the Battle for Cyberspace
Robert J. Deibert - 2013
We depend on it for everything we do. We have reengineered our business, governance, and social relations around a planetary network unlike any before it. But there are dangers looming, and malign forces are threatening to transform this extraordinary domain.In Black Code, Ronald J. Deibert, a leading expert on digital technology, security, and human rights, lifts the lid on cyberspace and shows what’s at stake for Internet users and citizens. As cyberspace develops in unprecedented ways, powerful agents are scrambling for control. Predatory cyber criminal gangs such as Koobface have made social media their stalking ground. The discovery of Stuxnet, a computer worm reportedly developed by Israel and the United States and aimed at Iran’s nuclear facilities, showed that state cyberwar is now a very real possibility. Governments and corporations are in collusion and are setting the rules of the road behind closed doors.This is not the way it was supposed to be. The Internet’s original promise of a global commons of shared knowledge and communications is now under threat. Drawing on the first-hand experiences of one of the most important protagonists in the battle — the Citizen Lab and its global network of frontline researchers, who have spent more than a decade cracking cyber espionage rings and uncovering attacks on citizens and NGOs worldwide — Black Code takes readers on a fascinating journey into the battle for cyberspace. Thought-provoking, compelling, and sometimes frightening, it is a wakeup call to citizens who have come to take the Internet for granted. Cyberspace is ours, it is what we make of it, Deibert argues, and we need to act now before it slips through our grasp.
Cybersecurity and Cyberwar: What Everyone Needs to Know(r)
P.W. Singer - 2013
Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money off of them; lawyers and ethicists building new frameworks for right and wrong. Most of all, cybersecurity issues affect us as individuals. We face new questions in everything from our rights and responsibilities as citizens of both the online and real world to simply how to protect ourselves and our families from a new type of danger. And yet, there is perhaps no issue that has grown so important, so quickly, and that touches so many, that remains so poorly understood.In Cybersecurity and CyberWar: What Everyone Needs to Know�, New York Times best-selling author P. W. Singer and noted cyber expert Allan Friedman team up to provide the kind of easy-to-read, yet deeply informative resource book that has been missing on this crucial issue of 21st century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters, and what can we do? Along the way, they take readers on a tour of the important (and entertaining) issues and characters of cybersecurity, from the "Anonymous" hacker group and the Stuxnet computer virus to the new cyber units of the Chinese and U.S. militaries. Cybersecurity and CyberWar: What Everyone Needs to Know� is the definitive account on the subject for us all, which comes not a moment too soon.What Everyone Needs to Know� is a registered trademark of Oxford University Press.
Technically Wrong: Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech
Sara Wachter-Boettcher - 2017
But few of us realize just how many oversights, biases, and downright ethical nightmares are baked inside the tech products we use every day. It’s time we change that.In Technically Wrong, Sara Wachter-Boettcher demystifies the tech industry, leaving those of us on the other side of the screen better prepared to make informed choices about the services we use—and to demand more from the companies behind them.
Be Amazing or Go Home: Seven Customer Service Habits That Create Confidence with Everyone
Shep Hyken - 2017
In fact, amazement is a habit that anyone can master--and Shep Hyken knows the tricks to making it your own.In Be Amazing or Go Home, Shep shares the secrets behind making his motto "Always Be Amazing!" an everyday lifestyle and shows how you too can become exceptional in business and in life. Drawing on the routines of incredible people, Shep demonstrates simple practices that can elevate your game, including:
Showing up ready to amazing
Being proactive
Craving feedback
Taking responsibility
Embracing authenticity
Focusing on excellence
Turning misery into magic
Once you master these habits, you'll be able to create trust, build stronger relationships, make sales, advance your career, and more. Now is the time to step out of the ordinary and step into amazing.
(ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple - 2018
This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Four unique 250 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security
The Tao of Network Security Monitoring: Beyond Intrusion Detection
Richard Bejtlich - 2004
This book reducesthe investigative workload of computer security incident response teams(CSIRT) by posturing organizations for incident response success.Firewalls can fail. Intrusion-detection systems can be bypassed. Networkmonitors can be overloaded. These are the alarming but true facts aboutnetwork security. In fact, too often, security administrators' tools can serve asgateways into the very networks they are defending.Now, a novel approach to network monitoring seeks to overcome theselimitations by providing dynamic information about the vulnerability of allparts of a network. Called network security monitoring (NSM), it draws on acombination of auditing, vulnerability assessment, intrusion detection andprevention, and incident response for the most comprehensive approach tonetwork security yet. By focusing on case studies and the application of opensourcetools, the author helps readers gain hands-on knowledge of how tobetter defend networks and how to mitigate damage from security incidents.
Move Fast and Break Things: How Facebook, Google, and Amazon Cornered Culture and Undermined Democracy
Jonathan Taplin - 2017
Since 2001, newspaper and music revenues have fallen by 70%, book publishing, film and television profits have also fallen dramatically. Revenues at Google in this same period grew from $400 million to $74.5 billion. Google's YouTube today controls 60% of the streaming audio business and pays only 11% of the streaming audio revenues. More creative content is being consumed than ever before, but less revenue is flowing to creators and owners of the content.With the reallocation of money to monopoly platforms comes a shift in power. Google, Facebook, and Amazon now enjoy political power on par with Big Oil and Big Pharma, which in part explains how such a tremendous shift in revenues from artists to platforms could have been achieved and why it has gone unchallenged for so long.The stakes in this story go far beyond the livelihood of any one musician or journalist. As Taplin observes, the fact that more and more Americans receive their news, music and other forms of entertainment from a small group of companies poses a real threat to democracy. Move Fast and Break Things offers a vital, forward-thinking prescription for how artists can reclaim their audiences using knowledge of the past and a determination to work together. Using his own half-century career as a music and film producer and early pioneer of streaming video online, Taplin offers new ways to think about the design of the World Wide Web and specifically the way we live with the firms that dominate it.Table of contentsIntroduction1. The Great Disruption2. Levon's Story3. Tech's Counterculture Roots4. The Libertarian Counterinsurgency5. Digital Destruction6. Monopoly in the Digital Age7. Google's Regulatory Capture8. The Social Media Revolution9. Pirates of the Internet10. Libertarian and the 1 Percent11. What It Means to Be Human12. The Digital RenaissanceAfterword
Black Code: The Battle for the Future of Cyberspace
Ronald J. Deibert - 2011
It is difficult to imagine a world without instant access and 24/7 connectivity. We have reengineered our business, governance, and social relations around a planetary network unlike any that has come before. And, as with any social transformation, there have been unintended consequences. In Black Code, Ron Deibert examines the profound effect that cyberspace is having on the relationship between citizens and states, on the private and public spheres, and on domestic and international affairs. Cyberspace has brought us a world of do-it-yourself signals intelligence, he argues, and WikiLeaks is only a symptom of a much larger phenomenon to which governments, businesses, and individuals will have to get accustomed. Our lives have been turned inside out by a digital world of our own spinning. Fast-paced, revealing, and sometimes terrifying,
Black Code
takes readers into the shadowy realm of cybersecurity, offering insight into the very future of cyberspace and revealing what new rules and norms we will need to adopt in order to survive in this new environment.
Calling Bullshit: The Art of Skepticism in a Data-Driven World
Carl T. Bergstrom - 2020
Now, two science professors give us the tools to dismantle misinformation and think clearly in a world of fake news and bad data.It's increasingly difficult to know what's true. Misinformation, disinformation, and fake news abound. Our media environment has become hyperpartisan. Science is conducted by press release. Startup culture elevates bullshit to high art. We are fairly well equipped to spot the sort of old-school bullshit that is based in fancy rhetoric and weasel words, but most of us don't feel qualified to challenge the avalanche of new-school bullshit presented in the language of math, science, or statistics. In Calling Bullshit, Professors Carl Bergstrom and Jevin West give us a set of powerful tools to cut through the most intimidating data.You don't need a lot of technical expertise to call out problems with data. Are the numbers or results too good or too dramatic to be true? Is the claim comparing like with like? Is it confirming your personal bias? Drawing on a deep well of expertise in statistics and computational biology, Bergstrom and West exuberantly unpack examples of selection bias and muddled data visualization, distinguish between correlation and causation, and examine the susceptibility of science to modern bullshit.We have always needed people who call bullshit when necessary, whether within a circle of friends, a community of scholars, or the citizenry of a nation. Now that bullshit has evolved, we need to relearn the art of skepticism.
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
Joseph Menn - 2019
Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development of Tor, the most important privacy tool on the net, and helped build cyberweapons that advanced US security without injuring anyone. With its origins in the earliest days of the Internet, the cDc is full of oddball characters -- activists, artists, even future politicians. Many of these hackers have become top executives and advisors walking the corridors of power in Washington and Silicon Valley. The most famous is former Texas Congressman and current presidential candidate Beto O'Rourke, whose time in the cDc set him up to found a tech business, launch an alternative publication in El Paso, and make long-shot bets on unconventional campaigns.Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
Sonic Boom: Globalization at Mach Speed
Gregg Easterbrook - 2009
So what comes next? Growth will resume. But economic uncertainty will worsen, making what comes next not just a boom but a nerve-shattering SONIC BOOM. Gregg Easterbrook - who "writes nothing that is not brilliant" ("Chicago Tribune") - is a fount of unconventional wisdom, and over time, he is almost always proven right. Throughout 2008 and 2009, as the global economy was contracting and the experts were panicking, Easterbrook worked on a book saying prosperity is about to make its next big leap. Will he be right again? SONIC BOOM: Globalization at Mach Speed presents three basic insights. First, if you don't like globalization, brace yourself, because globalization has barely started. Easterbrook contends the world is about to become "far "more globally linked. Second, the next wave of global change will be primarily positive: economic prosperity, knowledge and freedom will increase more in the next 50 years than in all of human history to this point. But before you celebrate, Easterbrook further warns that the next phase of global change is going to drive us crazy. Most things will be good for most people - but nothing will seem certain for anyone. Each SONIC BOOM chapter is based on examples of cities around the world - in the United States, Europe, Russia, China, South America - that represent a significant Sonic Boom trend. With a terrific sense of humor, pitch-perfect reporting and clear, elegant prose, Easterbrook explains why economic recovery is on the horizon but why the next phase of global change will also give everyone one hell of a headache. "Forbes" calls Easterbrook "the best writer on complex topics in the United States" and SONIC BOOM will show you why.
Virtual Culture: The Way We Work Doesn’t Work Anymore, a Manifesto
Bryan Miles - 2018
Despite instant communication and collaboration through wireless computers and smartphones, employers needlessly rent or own office space. Bryan Miles has a reality check for you: the future of business is virtual, and it’s going to take more than technology upgrades for you to upgrade your workplace environment. In VIRTUAL CULTURE, visionary entrepreneur Bryan Miles champions the benefits of remote working, which will save your company tons of money and create an atmosphere of trust between you and your employees. Productivity comes from people completing their tasks in a timely, professional, adult manner, not from mandatory daily attendance in a sea of cubicles and offices. When you recognize and respect your employees’ time inside and outside work hours, giving them the freedom to work from home, you will retain amazing talent and create a result-oriented virtual culture as a forward-thinking employer that embraces the future of work.