The Second Nuclear Age: Strategy, Danger, and the New Power Politics


Paul Bracken - 2012
    It’s not just the threat of Iran getting the bomb or North Korea doing something rash; the whole complexion of global power politics is changing because of the reemergence of nuclear weapons as a vital element of statecraft and power politics. In short, we have entered the second nuclear age.In this provocative and agenda-setting book, Paul Bracken of Yale University argues that we need to pay renewed attention to nuclear weapons and how their presence will transform the way crises develop and escalate. He draws on his years of experience analyzing defense strategy to make the case that the United States needs to start thinking seriously about these issues once again, especially as new countries acquire nuclear capabilities. He walks us through war-game scenarios that are all too realistic, to show how nuclear weapons are changing the calculus of power politics, and he offers an incisive tour of the Middle East, South Asia, and East Asia to underscore how the United States must not allow itself to be unprepared for managing such crises.Frank in its tone and farsighted in its analysis, The Second Nuclear Age is the essential guide to the new rules of international politics.

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide


James Michael Stewart - 2015
    This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Four unique 250 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security

Hiding from the Internet: Eliminating Personal Online Information


Michael Bazzell - 2012
    Author Michael Bazzell has been well known in government circles for his ability to locate personal information about anyone through the internet. In Hiding from the Internet: Eliminating Personal Online Information, he exposes the resources that broadcast your personal details to public view. He has researched each source and identified the best method to have your private details removed from the databases that store profiles on all of us. This book will serve as a reference guide for anyone that values privacy. Each technique is explained in simple steps. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The author provides personal experiences from his journey to disappear from public view. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to force companies to remove you from their data collection systems. This book exposes loopholes that create unique opportunities for privacy seekers. Among other techniques, you will learn to: Remove your personal information from public databases and people search sites Create free anonymous mail addresses, email addresses, and telephone numbers Control your privacy settings on social networks and remove sensitive data Provide disinformation to conceal true private details Force data brokers to stop sharing your information with both private and public organizations Prevent marketing companies from monitoring your browsing, searching, and shopping habits Remove your landline and cellular telephone numbers from online websites Use a credit freeze to eliminate the worry of financial identity theft and fraud Change your future habits to promote complete privacy and anonymity Conduct a complete background check to verify proper information removalConfigure a home firewall with VPN Kill-SwitchPurchase a completely invisible home or vehicle

China Hands: Nine Decades of Adventure, Espionage, and Diplomacy in Asia


James R. Lilley - 2004
    Lilley spent much of his childhood in China and after a Yale professor took him aside and suggested a career in intelligence, it became clear that he would spend his adult life returning to China again and again. Lilley served for twenty-five years in the CIA in Laos, Tokyo, Hong Kong, and Taiwan before moving to the State Department in the early 1980s to begin a distinguished career as the U.S.'s top-ranking diplomat in Taiwan, ambassador to South Korea, and finally, ambassador to China. From helping Laotian insurgent forces assist the American efforts in Vietnam to his posting in Beijing during the Tiananmen Square crackdown, he was in a remarkable number of crucial places during challenging times as he spent his life tending to America's interests in Asia. In China Hands, he includes three generations of stories from an American family in the Far East, all of them absorbing, some of them exciting, and one, the loss of Lilley's much loved and admired brother, Frank, unremittingly tragic.China Hands is a fascinating memoir of America in Asia, Asia itself, and one especially capable American's personal history.

Exploding the Phone: The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell


Phil Lapsley - 2013
    Starting with Alexander Graham Bell's revolutionary "harmonic telegraph," by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. But the network had a billion-dollar flaw, and once people discovered it, things would never be the same.Exploding the Phone tells this story in full for the first time. It traces the birth of long-distance communication and the telephone, the rise of AT&T's monopoly, the creation of the sophisticated machines that made it all work, and the discovery of Ma Bell's Achilles' heel. Phil Lapsley expertly weaves together the clandestine underground of "phone phreaks" who turned the network into their electronic playground, the mobsters who exploited its flaws to avoid the feds, the explosion of telephone hacking in the counterculture, and the war between the phreaks, the phone company, and the FBI.The product of extensive original research, Exploding the Phone is a ground-breaking, captivating book.

Claws of the Panda: Beijing's Campaign of Influence and Intimidation in Canada


Jonathan Manthorpe - 2019
    In particular the book tells of Ottawa’s failure to recognize and confront the efforts by the Chinese Communist Party to infiltrate and influence Canadian politics, academia, and media, and to exert control over Canadians of Chinese heritage.Claws of the Panda gives a detailed description of the CCP’s campaign to embed agents of influence in Canadian business, politics, media and academia. The party’s aims are to be able to turn Canadian public policy to China’s advantage, to acquire useful technology and intellectual property, to influence Canada’s international diplomacy, and, most important, to be able to monitor and intimidate Chinese Canadians and others it considers dissidents.The book traces the evolution of the Canada-China relationship over nearly 150 years. It shows how Canadian leaders have constantly misjudged the reality and potential of the relationship while the CCP and its agents have benefited from Canadian naivete.

The Net Delusion: The Dark Side of Internet Freedom


Evgeny Morozov - 2010
    Yet for all the talk about the democratizing power of the Internet, regimes in Iran and China are as stable and repressive as ever. In fact, authoritarian governments are effectively using the Internet to suppress free speech, hone their surveillance techniques, disseminate cutting-edge propaganda, and pacify their populations with digital entertainment. Could the recent Western obsession with promoting democracy by digital means backfire?In this spirited book, journalist and social commentator Evgeny Morozov shows that by falling for the supposedly democratizing nature of the Internet, Western do-gooders may have missed how it also entrenches dictators, threatens dissidents, and makes it harder - not easier - to promote democracy. Buzzwords like "21st-century statecraft" sound good in PowerPoint presentations, but the reality is that "digital diplomacy" requires just as much oversight and consideration as any other kind of diplomacy.Marshaling compelling evidence, Morozov shows why we must stop thinking of the Internet and social media as inherently liberating and why ambitious and seemingly noble initiatives like the promotion of "Internet freedom" might have disastrous implications for the future of democracy as a whole.

On War


Carl von Clausewitz - 1832
    Its coherence and ambition are unmatched by other military literature. On War is full of sharp observation, biting irony, and memorable phrases, the most famous being, "War is a continuation of politics by other means."About the AuthorExcept for a brief stint in 1812 when he served in the Russian army, Clausewitz spent his whole career, from the age of twelve until his death in 1831, in the Prussian army. He fought in all the major Prussian campaigns against France, and his most fateful experience - the 1806 Battle of Jena-Auerstedt, in which Napoleon destroyed the Prussian army - inspired him to write On War.

Accidental Guerrilla: Fighting Small Wars in the Midst of a Big One


David Kilcullen - 2009
    Indeed, his vision of modern warfare powerfully influenced America'sdecision to rethink its military strategy in Iraq and implement the Surge, now recognized as a dramatic success. In The Accidental Guerrilla, Kilcullen provides a remarkably fresh perspective on the War on Terror. Kilcullen takes us on the ground to uncover the face of modern warfare, illuminating both the big global war (the War on Terrorism) and its relation to the associated small wars across theglobe: Iraq, Afghanistan, Indonesia, Thailand, the Pakistani tribal zones, East Timor and the horn of Africa. Kilcullen sees today's conflicts as a complex interweaving of contrasting trends--local insurgencies seeking autonomy caught up in a broader pan-Islamic campaign--small wars in the midst ofa big one. He warns that America's actions in the war on terrorism have tended to conflate these trends, blurring the distinction between local and global struggles and thus enormously complicating our challenges. Indeed, the US had done a poor job of applying different tactics to these verydifferent situations, continually misidentifying insurgents with limited aims and legitimate grievances--whom he calls accidental guerrillas--as part of a coordinated worldwide terror network. We must learn how to disentangle these strands, develop strategies that deal with global threats, avoidlocal conflicts where possible, and win them where necessary. Colored with gripping battlefield experiences that range from the jungles and highlands of Southeast Asia to the mountains of the Afghanistan-Pakistan border to the dusty towns of the Middle East, The Accidental Guerrilla will, quite simply, change the way we think about war. This book is amust read for everyone concerned about the war on terror.

The Pentester BluePrint: Starting a Career as an Ethical Hacker


Phillip L. Wylie - 2020
    Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement.Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing.Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you:The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties

The Pentagon's Brain: An Uncensored History of DARPA, America's Top-Secret Military Research Agency


Annie Jacobsen - 2015
    In the first-ever history about the organization, New York Times bestselling author Annie Jacobsen draws on inside sources, exclusive interviews, private documents, and declassified memos to paint a picture of DARPA, or "the Pentagon's brain," from its Cold War inception in 1958 to the present.This is the book on DARPA--a compelling narrative about this clandestine intersection of science and the American military and the often frightening results.

The Shield of Achilles: War, Peace, and the Course of History


Philip Bobbitt - 2002
    But now our world has changed irrevocably. What faces us in this era of fear and uncertainty? How do we protect ourselves against war machines that can penetrate the defenses of any state? Visionary and prophetic, The Shield of Achilles looks back at history, at the “Long War” of 1914-1990, and at the future: the death of the nation-state and the birth of a new kind of conflict without precedent.

Deep Black: Space Espionage and National Security


William E. Burrows - 1986
    They are spy satellites--the means by which the super-pwers keep tabs on each other in the deep black of space. Excellent . . . Highly recommended!--Booklist.

Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien"


Jeremy N. Smith - 2019
    When she arrived at MIT in the 1990s, Alien was quickly drawn to the school’s tradition of high‑risk physical trespassing: the original “hacking.” Within a year, one of her hallmates was dead and two others were arraigned. Alien’s adventures were only just beginning. After a stint at the storied, secretive Los Alamos National Laboratory, Alien was recruited by a top cybersecurity firm where she deployed her cache of virtual weapons—and the trespassing and social engineering talents she had developed while “hacking” at MIT. The company tested its clients’ security by every means possible—not just coding, but donning disguises and sneaking past guards and secretaries into the C‑suite. Alien now runs a boutique hacking outfit that caters to some of the world’s biggest and most vulnerable institutions—banks, retailers, government agencies. Her work combines devilish charm, old‑school deception, and next generation spycraft. In Breaking and Entering, cybersecurity finally gets the rich, character‑driven, fast-paced treatment it deserves.

Trade Wars Are Class Wars: How Rising Inequality Distorts the Global Economy and Threatens International Peace


Matthew C. Klein - 2020
    Klein and Michael Pettis show in this book, they are often the unexpected result of domestic political choices to serve the interests of the rich at the expense of workers and ordinary retirees.   Klein and Pettis trace the origins of today’s trade wars to decisions made by politicians and business leaders in China, Europe, and the United States over the past thirty years. Across the world, the rich have prospered while workers can no longer afford to buy what they produce, have lost their jobs, or have been forced into higher levels of debt. In this thought-provoking challenge to mainstream views, the authors provide a cohesive narrative that shows how the class wars of rising inequality are a threat to the global economy and international peace—and what we can do about it.