Black Hat Python: Python Programming for Hackers and Pentesters


Justin Seitz - 2014
    But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:Create a trojan command-and-control using GitHubDetect sandboxing and automate common malware tasks, like keylogging and screenshottingEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machineExtend the popular Burp Suite web-hacking toolAbuse Windows COM automation to perform a man-in-the-browser attackExfiltrate data from a network most sneakilyInsider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python."

Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses


Edward Skoudis - 2005
    I asked other people and they didn't seem to know how these things work, or at least they couldn't explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!" --Stephen Northcutt, CEO, SANS Institute "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "Ed Skoudis is a rare individual. He knows the innards of all the various systems, knows all the latest exploits and defenses, and yet is able to explain everything at just the right level. The first edition of Counter Hack was a fascinating read. It's technically intriguing and very clear. . . . A book on vulnerabilities, though, will get out of date, and so we definitely needed this updated and significantly rewritten second edition. This book is a wonderful overview of the field." --From the Foreword by Radia Perlman, series editor, The Radia Perlman Series in Computer Networking and Security; author of Interconnections; and coauthor of Network Security: Private Communications in a Public World "What a great partnership! Ed Skoudis and Tom Liston share an uncanny talent for explaining even the most challenging security concepts in a clear and enjoyable manner. Counter Hack Reloaded is an indispensable resource for those who want to improve their defenses and understand the mechanics of computer attacks." --Lenny Zeltser, coauthor of Malware: Fighting Malicious Code "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "In addition to having breadth of knowledge about and probing insights into network security, Ed Skoudis's real strength is in his ability to show complex topics in an understandable form. By the time he's done, what started off as a hopeless conglomeration of acronyms starts to sound comfortable and familiar. This book is your best source for understanding attack strategies, attack tools, and the defenses against both." --William Stearns, network security expert, www.stearns.org "This book is a must-have for anyone in the Internet security game. It covers everything from the basic principles to the fine details of online attack methods and counter-strategies and is very engagingly written." --Warwick Ford, coauthor of Secure Electronic Commerce For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks.For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You'll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.Important features of this new edition includeAll-new "anatomy-of-an-attack" scenarios and tools An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more Fully updated coverage of reconnaissance tools, including Nmap port scanning and "Google hacking" New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit New information on dangerous, hard-to-detect, kernel-mode rootkits

Hello World: Being Human in the Age of Algorithms


Hannah Fry - 2018
    It’s time we stand face-to-digital-face with the true powers and limitations of the algorithms that already automate important decisions in healthcare, transportation, crime, and commerce. Hello World is indispensable preparation for the moral quandaries of a world run by code, and with the unfailingly entertaining Hannah Fry as our guide, we’ll be discussing these issues long after the last page is turned.

The End of Average: How We Succeed in a World That Values Sameness


Todd Rose - 2016
    We’re a little taller or shorter than the average, our salary is a bit higher or lower than the average, and we wonder about who it is that is buying the average-priced home. All around us, we think, are the average people—with the average height, the average salary and the average house.But the average doesn’t just influence how we see ourselves—our entire social system has been built around this average-size-fits-all model. Schools are designed for the average student. Healthcare is designed for the average patient. Employers try to fill average job descriptions with employees on an average career trajectory. Our government implements programs and initiatives to serve the average person. For more than a century, we’ve believed that the best way to run our institutions is by focusing on the average person. But when you actually drill down into the numbers, you find an amazing fact: no one is average—which means that our society built for everyone is actually serving no one.In the 1950s, the American Air Force found itself with a massive problem—performance in expensive, custom-made planes was suffering terribly, with crashes peaking at seventeen in a single day. Since the state-of-the-art planes they were flying had been meticulously crafted to fit the average pilot, pilot error was assumed to be at fault. Until, that is, the Air Force investigated just how many of their pilots were actually average. The shocking answer: out of thousands of active-duty pilots, exactly zero were average. Not one. This discovery led to simple solutions (like adjustable seats) that dramatically reduced accidents, improved performance, and expanded the pool of potential pilots. It also led to a huge change in thinking: planes didn’t need to be designed for everyone—they needed to be designed so they could adapt to suit the individual flying them.The End of Average shows how success lies in customizing to our individual needs in all aspects of our lives, from the way we mark tests to the medical treatment we receive. Using principles from The Science of the Individual, it shows how we can break down the average to create individualized success that benefits everyone in the long run. It's time we stopped settling for average, and in The End of Average, Todd Rose will show you how.

Trust Me, I'm Lying: Confessions of a Media Manipulator


Ryan Holiday - 2012
    A malicious online rumor costs a company millions. A political sideshow derails the national news cycle and destroys a candidate. Some product or celebrity zooms from total obscurity to viral sensation. What you don't know is that someone is responsible for all this. Usually, someone like me.I'm a media manipulator. In a world where blogs control and distort the news, my job is to control blogs--as much as any one person can. In today's culture... 1) Blogs like "Gawker," "Buzzfeed" and the "Huffington Post" drive the media agenda. 2) Bloggers are slaves to money, technology, and deadlines. 3) Manipulators wield these levers to shape everything you read, see and watch--online and off.Why am I giving away these secrets? Because I'm tired of a world where blogs take indirect bribes, marketers help write the news, reckless journalists spread lies, and no one is accountable for any of it. I'm pulling back the curtain because I don't want anyone else to get blindsided. I'm going to explain exactly how the media "really" works. What you choose to do with this information is up to you.

Turing's Cathedral: The Origins of the Digital Universe


George Dyson - 2012
    In Turing’s Cathedral, George Dyson focuses on a small group of men and women, led by John von Neumann at the Institute for Advanced Study in Princeton, New Jersey, who built one of the first computers to realize Alan Turing’s vision of a Universal Machine. Their work would break the distinction between numbers that mean things and numbers that do things—and our universe would never be the same. Using five kilobytes of memory (the amount allocated to displaying the cursor on a computer desktop of today), they achieved unprecedented success in both weather prediction and nuclear weapons design, while tackling, in their spare time, problems ranging from the evolution of viruses to the evolution of stars. Dyson’s account, both historic and prophetic, sheds important new light on how the digital universe exploded in the aftermath of World War II. The proliferation of both codes and machines was paralleled by two historic developments: the decoding of self-replicating sequences in biology and the invention of the hydrogen bomb. It’s no coincidence that the most destructive and the most constructive of human inventions appeared at exactly the same time.  How did code take over the world? In retracing how Alan Turing’s one-dimensional model became John von Neumann’s two-dimensional implementation, Turing’s Cathedral offers a series of provocative suggestions as to where the digital universe, now fully three-dimensional, may be heading next.

Cryptanalysis: A Study of Ciphers and Their Solution


Helen Fouche Gaines - 1939
    Nihilist, grille, U. S. Army, key-phrase, multiple-alphabet, Gronsfeld, Porta, Beaufort, periodic ciphers, and more. Simple and advanced methods. 166 specimens to solve — with solutions.

Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy


Cathy O'Neil - 2016
    Increasingly, the decisions that affect our lives--where we go to school, whether we can get a job or a loan, how much we pay for health insurance--are being made not by humans, but by machines. In theory, this should lead to greater fairness: Everyone is judged according to the same rules.But as mathematician and data scientist Cathy O'Neil reveals, the mathematical models being used today are unregulated and uncontestable, even when they're wrong. Most troubling, they reinforce discrimination--propping up the lucky, punishing the downtrodden, and undermining our democracy in the process.

Extra Lives: Why Video Games Matter


Tom Bissell - 2010
    He is also an obsessive gamer who has spent untold hours in front of his various video game consoles, playing titles such as Far Cry 2, Left 4 Dead, BioShock, and Oblivion for, literally, days. If you are reading this flap copy, the same thing can probably be said of you, or of someone you know. Until recently, Bissell was somewhat reluctant to admit to his passion for games. In this, he is not alone. Millions of adults spend hours every week playing video games, and the industry itself now reliably outearns Hollywood. But the wider culture seems to regard video games as, at best, well designed if mindless entertainment. Extra Lives is an impassioned defense of this assailed and misunderstood art form. Bissell argues that we are in a golden age of gaming—but he also believes games could be even better. He offers a fascinating and often hilarious critique of the ways video games dazzle and, just as often, frustrate. Along the way, we get firsthand portraits of some of the best minds (Jonathan Blow, Clint Hocking, Cliff Bleszinski, Peter Molyneux) at work in video game design today, as well as a shattering and deeply moving final chapter that describes, in searing detail, Bissell’s descent into the world of Grand Theft Auto IV, a game whose themes mirror his own increasingly self-destructive compulsions. Blending memoir, criticism, and first-rate reportage, Extra Lives is like no other book on the subject ever published. Whether you love video games, loathe video games, or are merely curious about why they are becoming the dominant popular art form of our time, Extra Lives is required reading.

Superintelligence: Paths, Dangers, Strategies


Nick Bostrom - 2014
    The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. If machine brains surpassed human brains in general intelligence, then this new superintelligence could become extremely powerful--possibly beyond our control. As the fate of the gorillas now depends more on humans than on the species itself, so would the fate of humankind depend on the actions of the machine superintelligence.But we have one advantage: we get to make the first move. Will it be possible to construct a seed Artificial Intelligence, to engineer initial conditions so as to make an intelligence explosion survivable? How could one achieve a controlled detonation?

Blue Team Field Manual (BTFM)


Alan J. White - 2017
    Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow and commands to use when preparing for, working through and recovering from a Cyber Security Incident.

Lab Rats: How Silicon Valley Made Work Miserable for the Rest of Us


Dan Lyons - 2018
    Why did work become so miserable? Who is responsible? And does any company have a model for doing it right?For two years, Lyons ventured in search of answers. From the innovation-crazed headquarters of the Ford Motor Company in Detroit, to a cult-like "Holocracy" workshop in San Francisco, and to corporate trainers who specialize in ... Legos, Lyons immersed himself in the often half-baked and frequently lucrative world of what passes for management science today. He shows how new tools, workplace practices, and business models championed by tech's empathy-impaired power brokers have shattered the social contract that once existed between companies and their employees. These dystopian beliefs--often masked by pithy slogans like "We're a Team, Not a Family"--have dire consequences: millions of workers who are subject to constant change, dehumanizing technologies--even health risks. A few companies, however, get it right. With Lab Rats, Lyons makes a passionate plea for business leaders to understand this dangerous transformation, showing how profit and happy employees can indeed coexist.

Getting Started with OAuth 2.0


Ryan Boyd - 2011
    This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users’ data—such as user profiles, photos, videos, and contact lists—to improve their experience of your application.Through code examples, step-by-step instructions, and use-case examples, you’ll learn how to apply OAuth 2.0 to your server-side web application, client-side app, or mobile app. Find out what it takes to access social graphs, store data in a user’s online filesystem, and perform many other tasks.Understand OAuth 2.0’s role in authentication and authorizationLearn how OAuth’s Authorization Code flow helps you integrate data from different business applicationsDiscover why native mobile apps use OAuth differently than mobile web appsUse OpenID Connect and eliminate the need to build your own authentication system

The Information: A History, a Theory, a Flood


James Gleick - 2011
    The story of information begins in a time profoundly unlike our own, when every thought and utterance vanishes as soon as it is born. From the invention of scripts and alphabets to the long-misunderstood talking drums of Africa, Gleick tells the story of information technologies that changed the very nature of human consciousness. He provides portraits of the key figures contributing to the inexorable development of our modern understanding of information: Charles Babbage, the idiosyncratic inventor of the first great mechanical computer; Ada Byron, the brilliant and doomed daughter of the poet, who became the first true programmer; pivotal figures like Samuel Morse and Alan Turing; and Claude Shannon, the creator of information theory itself. And then the information age arrives. Citizens of this world become experts willy-nilly: aficionados of bits and bytes. And we sometimes feel we are drowning, swept by a deluge of signs and signals, news and images, blogs and tweets. The Information is the story of how we got here and where we are heading.

Talking to Strangers: What We Should Know About the People We Don’t Know


Malcolm Gladwell - 2019
    He was also producing for the ear. In the audiobook version of Talking to Strangers, you'll hear the voices of people he interviewed--scientists, criminologists, military psychologists. Court transcripts are brought to life with re-enactments. You actually hear the contentious arrest of Sandra Bland by the side of the road in Texas. As Gladwell revisits the deceptions of Bernie Madoff, the trial of Amanda Knox, and the suicide of Sylvia Plath, you hear directly from many of the players in these real-life tragedies. There's even a theme song - Janelle Monae's "Hell You Talmbout."Something is very wrong, Gladwell argues, with the tools and strategies we use to make sense of people we don't know. And because we don't know how to talk to strangers, we are inviting conflict and misunderstanding in ways that have a profound effect on our lives and our world.