Book picks similar to
Dark Territory: The Secret History of Cyber War by Fred Kaplan
history
non-fiction
technology
politics
The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies
Erik Brynjolfsson - 2014
Digital technologies—with hardware, software, and networks at their core—will in the near future diagnose diseases more accurately than doctors can, apply enormous data sets to transform retailing, and accomplish many tasks once considered uniquely human.In The Second Machine Age MIT’s Erik Brynjolfsson and Andrew McAfee—two thinkers at the forefront of their field—reveal the forces driving the reinvention of our lives and our economy. As the full impact of digital technologies is felt, we will realize immense bounty in the form of dazzling personal technology, advanced infrastructure, and near-boundless access to the cultural items that enrich our lives.Amid this bounty will also be wrenching change. Professions of all kinds—from lawyers to truck drivers—will be forever upended. Companies will be forced to transform or die. Recent economic indicators reflect this shift: fewer people are working, and wages are falling even as productivity and profits soar.Drawing on years of research and up-to-the-minute trends, Brynjolfsson and McAfee identify the best strategies for survival and offer a new path to prosperity. These include revamping education so that it prepares people for the next economy instead of the last one, designing new collaborations that pair brute processing power with human ingenuity, and embracing policies that make sense in a radically transformed landscape.A fundamentally optimistic book, The Second Machine Age alters how we think about issues of technological, societal, and economic progress.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
13 Hours: The Inside Account of What Really Happened In Benghazi
Mitchell Zuckoff - 2014
13 Hours presents, for the first time ever, the true account of the events of September 11, 2012, when terrorists attacked the US State Department Special Mission Compound and a nearby CIA station called the Annex in Benghazi, Libya. A team of six American security operators fought to repel the attackers and protect the Americans stationed there. Those men went beyond the call of duty, performing extraordinary acts of courage and heroism, to avert tragedy on a much larger scale. This is their personal account, never before told, of what happened during the thirteen hours of that now-infamous attack. 13 Hours sets the record straight on what happened during a night that has been shrouded in mystery and controversy. Written by New York Times bestselling author Mitchell Zuckoff, this riveting book takes readers into the action-packed story of heroes who laid their lives on the line for one another, for their countrymen, and for their country. 13 Hours is a stunning, eye-opening, and intense book--but most importantly, it is the truth. The story of what happened to these men--and what they accomplished--is unforgettable.
How Democracies Die: What History Reveals About Our Future
Steven Levitsky - 2018
Democracy no longer ends with a bang--in a revolution or military coup--but with a whimper: the slow, steady weakening of critical institutions, such as the judiciary and the press, and the gradual erosion of long-standing political norms. The good news is that there are several exit ramps on the road to authoritarianism. The bad news is that, by electing Trump, we have already passed the first one.Drawing on decades of research and a wide range of historical and global examples, from 1930s Europe to contemporary Hungary, Turkey, and Venezuela, to the American South during Jim Crow, Levitsky and Ziblatt show how democracies die--and how ours can be saved.
Security Engineering: A Guide to Building Dependable Distributed Systems
Ross J. Anderson - 2008
Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
Blind Man's Bluff: The Untold Story of American Submarine Espionage
Sherry Sontag - 1998
Now, after six years of research, those missions are told in Blind Man's Bluff, a magnificent achievement in investigative reporting. It reads like a spy thriller -- except everything in it is true. This is an epic of adventure, ingenuity, courage, and disaster beneath the sea, a story filled with unforgettable characters who engineered daring missions to tap the enemy's underwater communications cables and to shadow Soviet submarines. It is a story of heroes and spies, of bravery and tragedy.
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Michael Sikorski - 2011
When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.
Glock: The Rise of America's Gun
Paul M. Barrett - 2012
police departments, glamorized in countless Hollywood movies, and featured as a ubiquitous presence on prime-time TV. It has been rhapsodized by hip-hop artists, and coveted by cops and crooks alike. Created in 1982 by Gaston Glock, an obscure Austrian curtain-rod manufacturer, and swiftly adopted by the Austrian army, the Glock pistol, with its lightweight plastic frame and large-capacity spring-action magazine, arrived in America at a fortuitous time. Law enforcement agencies had concluded that their agents and officers, armed with standard six-round revolvers, were getting "outgunned" by drug dealers with semi-automatic pistols. They needed a new gun. When Karl Water, a firearm salesman based in the U.S. first saw a Glock in 1984, his reaction was, “Jeez, that’s ugly.” But the advantages of the pistol soon became apparent. The standard semi-automatic Glock could fire as many as 17 bullets from its magazine without reloading (one equipped with an extended thirty-three cartridge magazine was used in Tucson to shoot Gabrielle Giffords and 19 others). It was built with only 36 parts that were interchangeable with those of other models. You could drop it underwater, toss it from a helicopter, or leave it out in the snow, and it would still fire. It was reliable, accurate, lightweight, and cheaper to produce than Smith and Wesson’s revolver. Made in part of hardened plastic, it was even rumored (incorrectly) to be invisible to airport security screening. Filled with corporate intrigue, political maneuvering, Hollywood glitz, bloody shoot-outs—and an attempt on Gaston Glock’s life by a former lieutenant—Glock is at once the inside account of how Glock the company went about marketing its pistol to police agencies and later the public, as well as a compelling chronicle of the evolution of gun culture in America.
Agent Storm: My Life Inside al Qaeda and the CIA
Morten Storm - 2014
A six-foot-one red-haired Dane, Storm spent his teens in and out of trouble. A book about the Prophet Mohammed prompted his conversion to Islam, and Storm sought purpose in a community of believers. He attended a militant madrasah in Yemen, named his son Osama, and became close friends with Anwar al-Awlaki, the American-born terrorist cleric. But after a decade of Jihadi life, he not only repudiated extremism but, in a quest for atonement, became a double agent for the CIA and British and Danish intelligence.Agent Storm takes readers inside the jihadist world like never before, showing the daily life of zealous men set on mass murder, from dodging drones with al-Qaeda leaders in the Arabian desert to training in extremist gyms in Britain and performing supply drops in Kenya. The book also provides a tantalizing look at his dangerous life undercover, as Storm traveled the world for missions targeting its most dangerous terrorists , and into the world’s most powerful spy agencies: their tradecraft, rivalries, and late-night carousing, as well as their ruthless use of a beautiful blonde in an ambitious honey trap. Agent Storm is a captivating, utterly unique, real-life espionage tale.
Metasploit: The Penetration Tester's Guide
David Kennedy - 2011
But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.
The Good Soldiers
David Finkel - 2009
In January 2007, President George W. Bush announced a new strategy for Iraq. He called it the surge. “Many listening tonight will ask why this effort will succeed when previous operations to secure Baghdad did not. Well, here are the differences,” he told a skeptical nation. Among those listening were the young, optimistic army infantry soldiers of the 2-16, the battalion nicknamed the Rangers. About to head to a vicious area of Baghdad, they decided the difference would be them.Fifteen months later, the soldiers returned home forever changed. Pulitzer Prize-winning Washington Post reporter David Finkel was with them in Bagdad, and almost every grueling step of the way.What was the true story of the surge? And was it really a success? Those are the questions he grapples with in his remarkable report from the front lines. Combining the action of Mark Bowden’s Black Hawk Down with the literary brio of Tim O’Brien’s The Things They Carried, The Good Soldiers is an unforgettable work of reportage. And in telling the story of these good soldiers, the heroes and the ruined, David Finkel has also produced an eternal tale—not just of the Iraq War, but of all wars, for all time.
All the Devils are Here: The Hidden History of the Financial Crisis
Bethany McLean - 2010
Should the blame fall on Wall Street, Main Street, or Pennsylvania Avenue? On greedy traders, misguided regulators, sleazy subprime companies, cowardly legislators, or clueless home buyers?According to Bethany McLean and Joe Nocera, two of America's most acclaimed business journalists, the real answer is all of the above-and more. Many devils helped bring hell to the economy. And the full story, in all of its complexity and detail, is like the legend of the blind men and the elephant. Almost everyone has missed the big picture. Almost no one has put all the pieces together.All the Devils Are Here goes back several decades to weave the hidden history of the financial crisis in a way no previous book has done. It explores the motivations of everyone from famous CEOs, cabinet secretaries, and politicians to anonymous lenders, borrowers, analysts, and Wall Street traders. It delves into the powerful American mythology of homeownership. And it proves that the crisis ultimately wasn't about finance at all; it was about human nature.Among the devils you'll meet in vivid detail:• Angelo Mozilo, the CEO of Countrywide, who dreamed of spreading homeownership to the masses, only to succumb to the peer pressure-and the outsized profits-of the sleaziest subprime lending.• Roland Arnall, a respected philanthropist and diplomat, who made his fortune building Ameriquest, a subprime lending empire that relied on blatantly deceptive lending practices.• Hank Greenberg, who built AIG into a Rube Goldberg contraption with an undeserved triple-A rating, and who ran it so tightly that he was the only one who knew where all the bodies were buried.• Stan O'Neal of Merrill Lynch, aloof and suspicious, who suffered from "Goldman envy" and drove a proud old firm into the ground by promoting cronies and pushing out his smartest lieutenants.• Lloyd Blankfein, who helped turn Goldman Sachs from a culture that famously put clients first to one that made clients secondary to its own bottom line.• Franklin Raines of Fannie Mae, who (like his predecessors) bullied regulators into submission and let his firm drift away from its original, noble mission.• Brian Clarkson of Moody's, who aggressively pushed to increase his rating agency's market share and stock price, at the cost of its integrity.• Alan Greenspan, the legendary maestro of the Federal Reserve, who ignored the evidence of a growing housing bubble and turned a blind eye to the lending practices that ultimately brought down Wall Street-and inflicted enormous pain on the country.Just as McLean's The Smartest Guys in the Room was hailed as the best Enron book on a crowded shelf, so will All the Devils Are Here be remembered for finally making sense of the meltdown and its consequences.
How America Lost Its Secrets: Edward Snowden, the Man and the Theft
Edward Jay Epstein - 2017
After details of American government surveillance were published in 2013, Edward Snowden, formerly a subcontracted IT analyst for the NSA, became the center of an international controversy: Was he a hero, traitor, whistle-blower, spy? Was his theft legitimized by the nature of the information he exposed? When is it necessary for governmental transparency to give way to subterfuge? Edward Jay Epstein brings a lifetime of journalistic and investigative acumen to bear on these and other questions, delving into both how our secrets were taken and the man who took them. He makes clear that by outsourcing parts of our security apparatus, the government has made classified information far more vulnerable; how Snowden sought employment precisely where he could most easily gain access to the most sensitive classified material; and how, though he claims to have acted to serve his country, Snowden is treated as a prized intelligence asset in Moscow, his new home."
World Without Mind: The Existential Threat of Big Tech
Franklin Foer - 2017
Over the past few decades there has been a revolution in terms of who controls knowledge and information. This rapid change has imperiled the way we think. Without pausing to consider the cost, the world has rushed to embrace the products and services of four titanic corporations. We shop with Amazon; socialize on Facebook; turn to Apple for entertainment; and rely on Google for information. These firms sell their efficiency and purport to make the world a better place, but what they have done instead is to enable an intoxicating level of daily convenience. As these companies have expanded, marketing themselves as champions of individuality and pluralism, their algorithms have pressed us into conformity and laid waste to privacy. They have produced an unstable and narrow culture of misinformation, and put us on a path to a world without private contemplation, autonomous thought, or solitary introspection--a world without mind. In order to restore our inner lives, we must avoid being coopted by these gigantic companies, and understand the ideas that underpin their success.Elegantly tracing the intellectual history of computer science--from Descartes and the enlightenment to Alan Turing to Stuart Brand and the hippie origins of today's Silicon Valley--Foer exposes the dark underpinnings of our most idealistic dreams for technology. The corporate ambitions of Google, Facebook, Apple, and Amazon, he argues, are trampling longstanding liberal values, especially intellectual property and privacy. This is a nascent stage in the total automation and homogenization of social, political, and intellectual life. By reclaiming our private authority over how we intellectually engage with the world, we have the power to stem the tide.At stake is nothing less than who we are, and what we will become. There have been monopolists in the past but today's corporate giants have far more nefarious aims. They're monopolists who want access to every facet of our identities and influence over every corner of our decision-making. Until now few have grasped the sheer scale of the threat. Foer explains not just the looming existential crisis but the imperative of resistance.