Book picks similar to
Who Controls the Internet?: Illusions of a Borderless World by Jack L. Goldsmith
non-fiction
technology
internet
nonfiction
The Internet of Money
Andreas M. Antonopoulos - 2016
Acclaimed information-security expert and author of Mastering Bitcoin, Andreas M. Antonopoulos examines and contextualizes the significance of bitcoin through a series of essays spanning the exhilarating maturation of this technology. Bitcoin, a technological breakthrough quietly introduced to the world in 2008, is transforming much more than finance. Bitcoin is disrupting antiquated industries to bring financial independence to billions worldwide. In this book, Andreas explains why bitcoin is a financial and technological evolution with potential far exceeding the label “digital currency.” Andreas goes beyond exploring the technical functioning of the bitcoin network by illuminating bitcoin’s philosophical, social, and historical implications. As the internet has essentially transformed how people around the world interact and has permanently impacted our lives in ways we never could have imagined, bitcoin -- the internet of money -- is fundamentally changing our approach to solving social, political, and economic problems through decentralized technology.
The Great Convergence: Information Technology and the New Globalization
Richard Baldwin - 2016
Since then, that share has plummeted to where it was in 1900. As Richard Baldwin explains, this reversal of fortune reflects a new age of globalisation that is drastically different from the old.In the 1800s, globalisation leaped forward when steam power and international peace lowered the costs of moving goods across borders. This triggered a self-fueling cycle of industrial agglomeration and growth that propelled today's rich nations to dominance. That was the Great Divergence. The new globalisation is driven by information technology, which has radically reduced the cost of moving ideas across borders. This has made it practical for multinational firms to move labor-intensive work to developing nations. But to keep the whole manufacturing process in sync, the firms also shipped their marketing, managerial, and technical know-how abroad along with the offshored jobs. The new possibility of combining high tech with low wages propelled the rapid industrialisation of a handful of developing nations, the simultaneous deindustrialisation of developed nations, and a commodity supercycle that is only now petering out. The result is today's Great Convergence.Because globalisation is now driven by fast-paced technological change and the fragmentation of production, its impact is more sudden, more selective, more unpredictable, and more uncontrollable. As The Great Convergence shows, the new globalisation presents rich and developing nations alike with unprecedented policy challenges in their efforts to maintain reliable growth and social cohesion.
Accidental Empires
Robert X. Cringely - 1992
Accidental Empires is the trenchant, vastly readable history of that industry, focusing as much on the astoundingly odd personalities at its core—Steve Jobs, Bill Gates, Mitch Kapor, etc. and the hacker culture they spawned as it does on the remarkable technology they created. Cringely reveals the manias and foibles of these men (they are always men) with deadpan hilarity and cogently demonstrates how their neuroses have shaped the computer business. But Cringely gives us much more than high-tech voyeurism and insider gossip. From the birth of the transistor to the mid-life crisis of the computer industry, he spins a sweeping, uniquely American saga of creativity and ego that is at once uproarious, shocking and inspiring.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
The Dream Machine: J.C.R. Licklider and the Revolution That Made Computing Personal
M. Mitchell Waldrop - 2001
C. R. Licklider, whose visionary dream of a human-computer symbiosis transformed the course of modern science and led to the development of the personal computer. Reprint.
Privacy is Power: Reclaiming Democracy in the Digital Age
Carissa Véliz - 2020
Before you’ve even switched off your alarm, a whole host of organisations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your ‘suggested friends’ on Facebook, you continually compromise your privacy.Without your permission, or even your awareness, tech companies are harvesting your information, your location, your likes, your habits, and sharing it amongst themselves. They're not just selling your data. They’re selling the power to influence you. Even when you’ve explicitly asked them not to. And it's not just you. It's all your contacts too.Digital technology is stealing our personal data and with it our power to make free choices. To reclaim that power and democracy, we must protect our privacy.What can we do? So much is at stake. Our phones, our TVs, even our washing machines are spies in our own homes. We need new regulation. We need to pressure policy-makers for red lines on the data economy. And we need to stop sharing and to adopt privacy-friendly alternatives to Google, WhatsApp and other online platforms.Short, terrifying, practical: Privacy is Power highlights the implications of our laid-back attitudes to data, and sets out how we can reclaim control.
The Hype Machine: How Social Media Disrupts Our Elections, Our Economy, and Our Health--And How We Must Adapt
Sinan Aral - 2020
. . a lively, engaging masterpiece."--Erik Brynjolfsson, bestselling co-author of The Second Machine AgeMIT professor Sinan Aral isn't only one of the world's leading experts on social media--he's also an entrepreneur and investor, giving him an unparalleled 360-degree view of the technology's great promise as well as its outsize capacity to damage our politics, our economy, and even our personal health.Drawing on two decades of his own research and business experience, Aral goes under the hood of the biggest, most powerful social networks to tackle the critical question of just how much social media actually shapes our choices, for better or worse. Aral shows how the tech behind social media offers the same set of behavior-influencing levers to both Russian hackers and brand marketers--to everyone who hopes to change the way we think and act--which is why its consequences affect everything from elections to business, dating to health. Along the way, he covers a wide array of topics, including how network effects fuel Twitter's and Facebook's massive growth to the neuroscience of how social media affects our brains, the real consequences of fake news, the power of social ratings, and the impact of social media on our kids.In mapping out strategies for being more thoughtful consumers of social media, The Hype Machine offers the definitive guide to understanding and harnessing for good the technology that has redefined our world overnight.
Propaganda
Edward L. Bernays - 1928
Those who manipulate this unseen mechanism of society constitute an invisible government which is the true ruling power of our country.”—Edward Bernays, PropagandaA seminal and controversial figure in the history of political thought and public relations, Edward Bernays (1891–1995), pioneered the scientific technique of shaping and manipulating public opinion, which he famously dubbed “engineering of consent.” During World War I, he was an integral part of the U.S. Committee on Public Information (CPI), a powerful propaganda apparatus that was mobilized to package, advertise and sell the war to the American people as one that would “Make the World Safe for Democracy.” The CPI would become the blueprint in which marketing strategies for future wars would be based upon.Bernays applied the techniques he had learned in the CPI and, incorporating some of the ideas of Walter Lipmann, became an outspoken proponent of propaganda as a tool for democratic and corporate manipulation of the population. His 1928 bombshell Propaganda lays out his eerily prescient vision for using propaganda to regiment the collective mind in a variety of areas, including government, politics, art, science and education. To read this book today is to frightfully comprehend what our contemporary institutions of government and business have become in regards to organized manipulation of the masses.This is the first reprint of Propaganda in over 30 years and features an introduction by Mark Crispin Miller, author of The Bush Dyslexicon: Observations on a National Disorder.
CISSP Study Guide
Eric Conrad - 2010
The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. It also provides tips on how to prepare for the exam and take the exam. It also contains CISSP practice quizzes to test ones knowledge. The first domain provides information about risk analysis and mitigation. It also discusses security governance. The second domain discusses different techniques for access control, which is the basis for all the security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental for operating the system and software security components. Domain 6 is a critical domain in the Common Body of Knowledge, the Business Continuity Planning, and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domains 7, 8, and 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework in determining the laws about information system.
The Cluetrain Manifesto
Rick Levine - 2000
A rich tapestry of anecdotes, object lessons, parodies, insights, and predictions, The Cluetrain Manifesto illustrates how the Internet has radically reframed the seemingly immutable laws of business--and what business needs to know to weather the seismic aftershocks.
The Public Domain: Enclosing the Commons of the Mind
James Boyle - 2008
Boyle argues that just as every informed citizen needs to know at least something about the environment or civil rights, every citizen should also understand intellectual property law. Why? Because intellectual property rights mark out the ground rules of the information society, and today’s policies are unbalanced, unsupported by evidence, and often detrimental to cultural access, free speech, digital creativity, and scientific innovation.Boyle identifies as a major problem the widespread failure to understand the importance of the public domain—the realm of material that everyone is free to use and share without permission or fee. The public domain is as vital to innovation and culture as the realm of material protected by intellectual property rights, he asserts, and he calls for a movement akin to the environmental movement to preserve it. With a clear analysis of issues ranging from Jefferson’s philosophy of innovation to musical sampling, synthetic biology and Internet file sharing, this timely book brings a positive new perspective to important cultural and legal debates. If we continue to enclose the “commons of the mind,” Boyle argues, we will all be the poorer.
The Fate of Africa: A History of Fifty Years of Independence
Martin Meredith - 2005
As Europe's colonial powers withdrew, dozens of new states were launched amid much jubilation and to the world's applause. African leaders stepped forward with energy and enthusiasm to tackle the problems of development and nation-building, boldly proclaiming their hopes of establishing new societies that might offer inspiration to the world at large. The circumstances seemed auspicious. Independence came in the midst of an economic boom. On the world stage, African states excited the attention of the world's rival power blocs; in the Cold War era, the position that each newly independent state adopted in its relations with the West or the East was viewed as a matter of crucial importance. Africa was considered too valuable a prize to lose." "Today, Africa is spoken of only in pessimistic terms. The sum of its misfortunes - its wars, its despotisms, its corruption, its droughts - is truly daunting. No other area of the world arouses such a sense of foreboding. Few states have managed to escape the downward spiral: Botswana stands out as a unique example of an enduring multi-party democracy; South Africa, after narrowly avoiding revolution, has emerged in the post-apartheid era as a well-managed democratic state. But most African countries are effectively bankrupt, prone to civil strife, subject to dictatorial rule, weighted down by debt, and heavily dependent on Western assistance for survival." "So what went wrong? What happened to this vast continent, so rich in resources, culture and history, to bring it so close to destitution and despair in the space of two generations?" Focusing on the key personalities, events and themes of the independence era, Martin Meredith's narrative history seeks to explore and explain the myriad problems that Africa has faced in the past half-century, and faces still. The Fate of Africa is essential reading for anyone seeking to understand how it came to this — and what, if anything, is to be done.
The Geography of Thought: How Asians and Westerners Think Differently... and Why
Richard E. Nisbett - 2003
As a result, East Asian thought is “holistic”—drawn to the perceptual field as a whole and to relations among objects and events within that field. By contrast, Westerners focus on salient objects or people, use attributes to assign them to categories, and apply rules of formal logic to understand their behavior. From feng shui to metaphysics, from comparative linguistics to economic history, a gulf separates the children of Aristotle from the descendants of Confucius. At a moment in history when the need for cross-cultural understanding and collaboration have never been more important, The Geography of Thought offers both a map to that gulf and a blueprint for a bridge that will span it.
The Madness of Crowds: Gender, Race and Identity
Douglas Murray - 2019
He reveals the astonishing new culture wars playing out in our workplaces, universities, schools and homes in the names of social justice, identity politics and intersectionality.We are living through a postmodern era in which the grand narratives of religion and political ideology have collapsed. In their place have emerged a crusading desire to right perceived wrongs and a weaponization of identity, both accelerated by the new forms of social and news media. Narrow sets of interests now dominate the agenda as society becomes more and more tribal--and, as Murray shows, the casualties are mounting.
Rootkits: Subverting the Windows Kernel
Greg Hoglund - 2005
It is truly cutting-edge. As the only book on the subject,
Rootkits
will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks