Book picks similar to
Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy
psychology
non-fiction
security
social-engineering
The Distracted Mind: Ancient Brains in a High-Tech World
Adam Gazzaley - 2016
We pride ourselves on our ability to multitask--read work email, reply to a text, check Facebook, watch a video clip. Talk on the phone, send a text, drive a car. Enjoy family dinner with a glowing smartphone next to our plates. We can do it all, 24/7! Never mind the errors in the email, the near-miss on the road, and the unheard conversation at the table. In The Distracted Mind, Adam Gazzaley and Larry Rosen--a neuroscientist and a psychologist--explain why our brains aren't built for multitasking, and suggest better ways to live in a high-tech world without giving up our modern technology.The authors explain that our brains are limited in their ability to pay attention. We don't really multitask but rather switch rapidly between tasks. Distractions and interruptions, often technology-related--referred to by the authors as "interference"--collide with our goal-setting abilities. We want to finish this paper/spreadsheet/sentence, but our phone signals an incoming message and we drop everything. Even without an alert, we decide that we "must" check in on social media immediately.Gazzaley and Rosen offer practical strategies, backed by science, to fight distraction. We can change our brains with meditation, video games, and physical exercise; we can change our behavior by planning our accessibility and recognizing our anxiety about being out of touch even briefly. They don't suggest that we give up our devices, but that we use them in a more balanced way.
Scam Me If You Can: Simple Strategies to Outsmart Today's Ripoff Artists
Frank W. Abagnale - 2019
For the past four decades he's been working for the good guys, helping the FBI, financial institutions, corporations, and law enforcement avoid the kinds of scams that target Americans today. His new book is about the very latest tricks that today's scammers, hackers, and con-artists use to steal your money and personal information -- often online and over the phone. Using plain language and vivid examples, Abagnale reveals, for example... * The one type of photo you should never post on Facebook. * The only conditions under which you should use WiFi networks at the airport. * The best way to protect your phone from being hacked. * The only type of ATM you should use.Explaining his simple but counterintuitive rules to protect yourself, Abagnale also makes use of his insider intel to paint a picture of cybercrimes that haven't become widespread yet.
America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare
Joel Brenner - 2011
An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems.Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that.The structure and culture of the Internet favor spies over governments and corporations, and hackers over privacy, and we've done little to alter that balance. Brenner draws on his extraordinary background to show how to right this imbalance and bring to cyberspace the freedom, accountability, and security we expect elsewhere in our lives.In America the Vulnerable, Brenner offers a chilling and revelatory appraisal of the new faces of war and espionage-virtual battles with dangerous implications for government, business, and all of us.
Selfie: How We Became So Self-Obsessed and What It's Doing to Us
Will Storr - 2017
This is our culture’s image of the perfect self. We see this person everywhere: in advertising, in the press, all over social media. We’re told that to be this person you just have to follow your dreams, that our potential is limitless, that we are the source of our own success. But this model of the perfect self can be extremely dangerous. People are suffering under the torture of this impossible fantasy. Unprecedented social pressure is leading to increases in depression and suicide. Where does this ideal come from? Why is it so powerful? Is there any way to break its spell? To answer these questions, Selfie by Will Storr takes us from the shores of Ancient Greece, through the Christian Middle Ages, to the self-esteem evangelists of 1980s California, the rise of narcissism and the selfie generation, and right up to the era of hyper-individualistic neoliberalism in which we live now. It tells the extraordinary story of the person we all know so intimately – our self.
Power: Why Some People Have it and Others Don't
Jeffrey Pfeffer - 2010
The leading thinker on the topic of power, Pfeffer here distills his wisdom into an indispensable guide.” —Jim Collins, author of New York Times bestselling author Good to Great and How the Mighty FallSome people have it, and others don’t. Jeffrey Pfeffer explores why, in Power.One of the greatest minds in management theory and author or co-author of thirteen books, including the seminal business-school text Managing With Power, Jeffrey Pfeffer shows readers how to succeed and wield power in the real world.
Stealing Fire: How Silicon Valley, the Navy SEALs, and Maverick Scientists Are Revolutionizing the Way We Live and Work
Steven Kotler - 2017
Over the past decade, Silicon Valley executives like Eric Schmidt and Elon Musk, Special Operators like the Navy SEALs and the Green Berets, and maverick scientists like Sasha Shulgin and Amy Cuddy have turned everything we thought we knew about high performance upside down. Instead of grit, better habits, or 10,000 hours, these trailblazers have found a surprising short cut. They're harnessing rare and controversial states of consciousness to solve critical challenges and outperform the competition.New York Times bestselling author Steven Kotler and high performance expert Jamie Wheal spent four years investigating the leading edges of this revolution—from the home of SEAL Team Six to the Googleplex, the Burning Man festival, Richard Branson’s Necker Island, Red Bull’s training center, Nike’s innovation team, and the United Nations’ Headquarters. And what they learned was stunning: In their own ways, with differing languages, techniques, and applications, every one of these groups has been quietly seeking the same thing: the boost in information and inspiration that altered states provide.Today, this revolution is spreading to the mainstream, fueling a trillion dollar underground economy and forcing us to rethink how we can all lead richer, more productive, more satisfying lives. Driven by four accelerating forces—psychology, neurobiology, technology and pharmacology—we are gaining access to and insights about some of the most contested and misunderstood terrain in history. Stealing Fire is a provocative examination of what’s actually possible; a guidebook for anyone who wants to radically upgrade their life.
Coders at Work: Reflections on the Craft of Programming
Peter Seibel - 2009
As the words "at work" suggest, Peter Seibel focuses on how his interviewees tackle the day–to–day work of programming, while revealing much more, like how they became great programmers, how they recognize programming talent in others, and what kinds of problems they find most interesting. Hundreds of people have suggested names of programmers to interview on the Coders at Work web site: http://www.codersatwork.com. The complete list was 284 names. Having digested everyone’s feedback, we selected 16 folks who’ve been kind enough to agree to be interviewed:- Frances Allen: Pioneer in optimizing compilers, first woman to win the Turing Award (2006) and first female IBM fellow- Joe Armstrong: Inventor of Erlang- Joshua Bloch: Author of the Java collections framework, now at Google- Bernie Cosell: One of the main software guys behind the original ARPANET IMPs and a master debugger- Douglas Crockford: JSON founder, JavaScript architect at Yahoo!- L. Peter Deutsch: Author of Ghostscript, implementer of Smalltalk-80 at Xerox PARC and Lisp 1.5 on PDP-1- Brendan Eich: Inventor of JavaScript, CTO of the Mozilla Corporation - Brad Fitzpatrick: Writer of LiveJournal, OpenID, memcached, and Perlbal - Dan Ingalls: Smalltalk implementor and designer- Simon Peyton Jones: Coinventor of Haskell and lead designer of Glasgow Haskell Compiler- Donald Knuth: Author of The Art of Computer Programming and creator of TeX- Peter Norvig: Director of Research at Google and author of the standard text on AI- Guy Steele: Coinventor of Scheme and part of the Common Lisp Gang of Five, currently working on Fortress- Ken Thompson: Inventor of UNIX- Jamie Zawinski: Author of XEmacs and early Netscape/Mozilla hackerWhat you’ll learn:How the best programmers in the world do their jobWho is this book for?Programmers interested in the point of view of leaders in the field. Programmers looking for approaches that work for some of these outstanding programmers.
Stuff: Compulsive Hoarding and the Meaning of Things
Randy O. Frost - 2010
Now they explore the compulsion through a series of compelling case studies in the vein of Oliver Sacks. With vivid portraits that show us the traits by which you can identify a hoarder's piles on sofas and beds that make the furniture useless, houses that can be navigated only by following small paths called goat trails, vast piles of paper that the hoarders "churn" but never discard, even collections of animals and garbage; Frost and Steketee illuminate the pull that possessions exert on all of us. Whether we're savers, collectors, or compulsive cleaners, very few of us are in fact free of the impulses that drive hoarders to the extremes in which they live. For all of us with complicated relationships to our things, Stuff answers the question of what happens when our stuff starts to own us.
Mind Manipulation
Haha Lung - 2001
But the wise man had greater fear for their bloodless methods of domination, which the ninja mind masters preferred to crude physical violence. Ninja broke through their enemies' mental defenses using direct attack or stealth, comparing such operations to invading an enemy fortress.In this guided tour through the mysterious realm of the ninja, martial arts experts Dr. Haha Lung and Christopher B. Prowant reveal the secrets that will allow you to tell when someone is lying to you, implant false memories, tailor your attack by using the specific keys to each individual's mind, use verbal patterns and body language to earn your foe's utter trust, interrogate using unbeatable psychological methods and much more.You will also learn the terrifying truth behind modern mind-control, propaganda and brainwashing techniques used by cults (and our own government), as well as take a look ahead to the future of mass mind control.
How to Read a Person Like a Book
Gerard I. Nierenberg - 1971
How to Read a Person Like a Book teaches you how to “decode” and reply to nonverbal signals from strangers, friends, and business associates, allowing you to: gain command of business and social situations; sharpen your negotiating skills; recognize signals of affection and attraction; enrich your knowledge of body language; and much more!Learn the clues that make reading people easy. Gerard Nierenberg’s proven techniques for gaining control of negotiations, detecting lies, or recognizing signals of affection and sexual attraction will dramatically improve your understanding of others, giving you the advantage of added insight into all social and business situations.
The Like Switch: An Ex-FBI Agent's Guide to Influencing, Attracting, and Winning People Over
Jack Schafer - 2015
As a Special Agent for the FBI’s National Security Division’s Behavioral Analysis Program, Dr. Jack Schafer developed dynamic and breakthrough strategies for profiling terrorists and detecting deception. Now, Dr. Schafer has evolved his proven-on-the-battlefield tactics for the day-to-day, but no less critical battle of getting people to like you. In The Like Switch, he presents these techniques for how you can influence, attract, and win people over. Learn how to think and react like your favorite TV investigators from Criminal Minds or CSI as Dr. Schafer shows you how to improve your LQ (Likeability Quotient), “spot the lie” both in person and online, master nonverbal cues that influence how people perceive you, and turn up or turn down the intensity of a relationship. Dr. Schafer cracks the code on making great first impressions, building lasting relationships, and understanding others’ behavior to learn what they really think about you. With tips and techniques that hold the key to taking control of your communications, interactions, and relationships, The Like Switch shows you how to read others and get people to like you for a moment or a lifetime.
The Art of War for Women: Sun Tzu's Ancient Strategies and Wisdom for Winning at Work
Sun Tzu - 2002
This brilliant adaptation of the ancient masterpiece The Art of War shows women how to use Sun Tzu’s philosophy to win in every aspect of life.Would you like to transform your weaknesses into strengths? Succeed at work without compromising your ethics? Integrate your style and personal philosophy into every action you take? If so, this book is for you. In The Art of War for Women, bestselling author Chin-Ning Chu brings the eternal wisdom of philosopher-general Sun Tzu to women looking to gain a better understanding of who they are – and, more importantly, who they want to be. In the West, when we think of war, we imagine battle, casualties, brutality. But Sun Tzu, the man who wrote the Art of War some 2,500 years ago, was Chinese, and the Chinese think of war differently than we do in the West. In their view, war does not revolve around fighting. It is about determining the most efficient way of gaining victory with the least amount of conflict.That’s why Sun Tzu’s Art of War is particularly appropriate for women. Let’s face it, as intelligent and accomplished as we may be, there are very few of us who are comfortable with direct confrontation or situations where our triumph means someone else’s defeat. We are natural negotiators and problem solvers; most of us prefer win-win situations to those in which winner-takes-all.But there is another reason The Art of War is particularly appropriate for us. Although Sun Tzu’s book is about the application of strategies, every one of those strategies begins with having a deep understanding of the people and the world around us. They also require us to understand ourselves – our strengths and weaknesses, our goals and fears. In other words, the aim is not to apply a series of rules coldly and dispassionately, but rather to integrate ourselves and our unique talents into the strategies we will employ. This is not a feel-good book. (But you will feel good after reading it.) It is not a motivational book. (But you will be motivated to achieve what you want, once you are done.) Ultimately, its purpose it to provide women with the strategies we all need to overcome the obstacles that stand in the way of our goals and dreams. Sun Tzu’s Art of War is the most influential book on strategy ever published, selling tens of millions of copies worldwide in several editions. Written by one of today’s foremost authorities on Sun Tzu, The Art of War for Women is sure to become a classic in its own right.
The Culture Map: Breaking Through the Invisible Boundaries of Global Business
Erin Meyer - 2014
Renowned expert Erin Meyer is your guide through this subtle, sometimes treacherous terrain where people from starkly different backgrounds are expected to work harmoniously together.When you have Americans who precede anything negative with three nice comments; French, Dutch, Israelis, and Germans who get straight to the point (“your presentation was simply awful”); Latin Americans and Asians who are steeped in hierarchy; Scandinavians who think the best boss is just one of the crowd—the result can be, well, sometimes interesting, even funny, but often disastrous.Even with English as a global language, it’s easy to fall into cultural traps that endanger careers and sink deals when, say, a Brazilian manager tries to fathom how his Chinese suppliers really get things done, or an American team leader tries to get a handle on the intra-team dynamics between his Russian and Indian team members.In The Culture Map, Erin Meyer provides a field-tested model for decoding how cultural differences impact international business. She combines a smart analytical framework with practical, actionable advice for succeeding in a global world.
A Field Guide to Lies: Critical Thinking in the Information Age
Daniel J. Levitin - 2016
We are bombarded with more information each day than our brains can process—especially in election season. It's raining bad data, half-truths, and even outright lies. New York Times bestselling author Daniel J. Levitin shows how to recognize misleading announcements, statistics, graphs, and written reports revealing the ways lying weasels can use them.
It's becoming harder to separate the wheat from the digital chaff. How do we distinguish misinformation, pseudo-facts, distortions, and outright lies from reliable information? Levitin groups his field guide into two categories—statistical infomation and faulty arguments—ultimately showing how science is the bedrock of critical thinking. Infoliteracy means understanding that there are hierarchies of source quality and bias that variously distort our information feeds via every media channel, including social media. We may expect newspapers, bloggers, the government, and Wikipedia to be factually and logically correct, but they so often aren't. We need to think critically about the words and numbers we encounter if we want to be successful at work, at play, and in making the most of our lives. This means checking the plausibility and reasoning—not passively accepting information, repeating it, and making decisions based on it. Readers learn to avoid the extremes of passive gullibility and cynical rejection. Levitin's charming, entertaining, accessible guide can help anyone wake up to a whole lot of things that aren't so. And catch some lying weasels in their tracks!
Beautiful Security: Leading Security Experts Explain How They Think (Theory In Practice, #28)
Andy Oram - 2009
Criminals succeed by exercising enormous creativity, and those defending against them must do the same.Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include:The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their prey How social networking, cloud computing, and other popular trends help or hurt our online security How metrics, requirements gathering, design, and law can take security to a higher level The real, little-publicized history of PGP This book includes contributions from:Peiter "Mudge" Zatko Jim Stickley Elizabeth Nichols Chenxi Wang Ed Bellis Ben Edelman Phil Zimmermann and Jon Callas Kathy Wang Mark Curphey John McManus James Routh Randy V. Sabett Anton Chuvakin Grant Geyer and Brian Dunphy Peter Wayner Michael Wood and Fernando Francisco All royalties will be donated to the Internet Engineering Task Force (IETF).