Book picks similar to
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door by Brian Krebs
non-fiction
technology
nonfiction
crime
Physics of the Future: How Science Will Shape Human Destiny and Our Daily Lives by the Year 2100
Michio Kaku - 2011
The result is the most authoritative and scientifically accurate description of the revolutionary developments taking place in medicine, computers, artificial intelligence, nanotechnology, energy production, and astronautics.In all likelihood, by 2100 we will control computers via tiny brain sensors and, like magicians, move objects around with the power of our minds. Artificial intelligence will be dispersed throughout the environment, and Internet-enabled contact lenses will allow us to access the world's information base or conjure up any image we desire in the blink of an eye.Meanwhile, cars will drive themselves using GPS, and if room-temperature superconductors are discovered, vehicles will effortlessly fly on a cushion of air, coasting on powerful magnetic fields and ushering in the age of magnetism.Using molecular medicine, scientists will be able to grow almost every organ of the body and cure genetic diseases. Millions of tiny DNA sensors and nanoparticles patrolling our blood cells will silently scan our bodies for the first sign of illness, while rapid advances in genetic research will enable us to slow down or maybe even reverse the aging process, allowing human life spans to increase dramatically.In space, radically new ships—needle-sized vessels using laser propulsion—could replace the expensive chemical rockets of today and perhaps visit nearby stars. Advances in nanotechnology may lead to the fabled space elevator, which would propel humans hundreds of miles above the earth's atmosphere at the push of a button.But these astonishing revelations are only the tip of the iceberg. Kaku also discusses emotional robots, antimatter rockets, X-ray vision, and the ability to create new life-forms, and he considers the development of the world economy. He addresses the key questions: Who are the winner and losers of the future? Who will have jobs, and which nations will prosper?All the while, Kaku illuminates the rigorous scientific principles, examining the rate at which certain technologies are likely to mature, how far they can advance, and what their ultimate limitations and hazards are. Synthesizing a vast amount of information to construct an exciting look at the years leading up to 2100, Physics of the Future is a thrilling, wondrous ride through the next 100 years of breathtaking scientific revolution. (From the Hardcover Edition)(Duration: 15:39:15)
Griftopia: Bubble Machines, Vampire Squids, and the Long Con That Is Breaking America
Matt Taibbi - 2010
The stunning rise, fall, and rescue of Wall Street in the bubble-and-bailout era was the coming-out party for the network of looters who sit at the nexus of American political and economic power. The grifter class—made up of the largest players in the financial industry and the politicians who do their bidding—has been growing in power for a generation, transferring wealth upward through increasingly complex financial mechanisms and political maneuvers. The crisis was only one terrifying manifestation of how they’ve hijacked America’s political and economic life.Rolling Stone’s Matt Taibbi here unravels the whole fiendish story, digging beyond the headlines to get into the deeper roots and wider implications of the rise of the grifters. He traces the movement’s origins to the cult of Ayn Rand and her most influential—and possibly weirdest—acolyte, Alan Greenspan, and offers fresh reporting on the backroom deals that decided the winners and losers in the government bailouts. He uncovers the hidden commodities bubble that transferred billions of dollars to Wall Street while creating food shortages around the world, and he shows how finance dominates politics, from the story of investment bankers auctioning off America’s infrastructure to an inside account of the high-stakes battle for health-care reform—a battle the true reformers lost. Finally, he tells the story of Goldman Sachs, the “vampire squid wrapped around the face of humanity.” Taibbi has combined deep sources, trailblazing reportage, and provocative analysis to create the most lucid, emotionally galvanizing, and scathingly funny account yet written of the ongoing political and financial crisis in America. This is essential reading for anyone who wants to understand the labyrinthine inner workings of politics and finance in this country, and the profound consequences for us all.
Inside Cyber Warfare: Mapping the Cyber Underworld
Jeffrey Carr - 2009
You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and PalestineDiscover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nationsRead about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survivalFind out why many attacks originate from servers in the United States, and who's responsibleLearn how hackers are "weaponizing" malware to attack vulnerabilities at the application level
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Jack Koziol - 2004
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site features downloadable code files
Alan Turing: The Enigma
Andrew Hodges - 1983
His breaking of the German U-boat Enigma cipher in World War II ensured Allied-American control of the Atlantic. But Turing's vision went far beyond the desperate wartime struggle. Already in the 1930s he had defined the concept of the universal machine, which underpins the computer revolution. In 1945 he was a pioneer of electronic computer design. But Turing's true goal was the scientific understanding of the mind, brought out in the drama and wit of the famous "Turing test" for machine intelligence and in his prophecy for the twenty-first century.Drawn in to the cockpit of world events and the forefront of technological innovation, Alan Turing was also an innocent and unpretentious gay man trying to live in a society that criminalized him. In 1952 he revealed his homosexuality and was forced to participate in a humiliating treatment program, and was ever after regarded as a security risk. His suicide in 1954 remains one of the many enigmas in an astonishing life story.
So You've Been Publicly Shamed
Jon Ronson - 2015
The shamed are people like us - people who, say, made a joke on social media that came out badly, or made a mistake at work. Once their transgression is revealed, collective outrage circles with the force of a hurricane and the next thing they know they're being torn apart by an angry mob, jeered at, demonized, sometimes even fired from their job. People are using shame as a form of social control.
David and Goliath: Underdogs, Misfits, and the Art of Battling Giants
Malcolm Gladwell - 2013
Now he looks at the complex and surprising ways the weak can defeat the strong, the small can match up against the giant, and how our goals (often culturally determined) can make a huge difference in our ultimate sense of success. Drawing upon examples from the world of business, sports, culture, cutting-edge psychology, and an array of unforgettable characters around the world, David and Goliath is in many ways the most practical and provocative book Malcolm Gladwell has ever written.
Hacking Exposed: Network Security Secrets & Solutions
Joel Scambray - 2003
Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc."For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." Patrick Heim, CISO, Kaiser Permanente"The definitive resource to understanding the hacking mindset and the defenses against it." Vince Rossi, CEO & President, St. Bernard Software"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." Bill Loesch, CTO, Guard ID Systems"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." Kip Boyle, CISO, PEMCO Mutual Insurance Company"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," Jeff Moss, Founder of the popular Black Hat Security ConferenceMeet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.New and updated material:
New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking
Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits
The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits
New wireless and RFID security tools, including multilayered encryption and gateways
All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices
Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage
VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking
Fully updated chapters on hacking the Internet user, web hacking, and securing code
Ten Lessons for a Post-Pandemic World
Fareed Zakaria - 2020
CNN host and best-selling author Fareed Zakaria helps readers to understand the nature of a post-pandemic world: the political, social, technological, and economic impacts that may take years to unfold.In the form of ten straightforward “lessons,” covering topics from globalization and threat-preparedness to inequality and technological advancement, Zakaria creates a structure for readers to begin thinking beyond the immediate impacts of COVID-19. Ten Lessons for a Post-Pandemic World speaks to past, present, and future, and, while urgent and timely, is sure to become an enduring staple.
A World Without Email: Reimagining Work in an Age of Communication Overload
Cal Newport - 2021
Their days are defined by a relentless barrage of incoming messages and back-and-forth digital conversations--a state of constant, anxious chatter in which nobody can disconnect, and so nobody has the cognitive bandwidth to perform substantive work. There was a time when tools like email felt cutting edge, but a thorough review of current evidence reveals that the hyperactive hive mind workflow they helped create has become a productivity disaster, reducing profitability and perhaps even slowing overall economic growth. Equally worrisome, it makes us miserable. Humans are simply not wired for constant digital communication.We have become so used to an inbox-driven workday that it's hard to imagine alternatives. But they do exist. Drawing on years of investigative reporting, author and computer science professor Cal Newport makes the case that our current approach to work is broken, then lays out a series of principles and concrete instructions for fixing it. In A World without Email, he argues for a workplace in which clear processes--not haphazard messaging--define how tasks are identified, assigned and reviewed. Each person works on fewer things (but does them better), and aggressive investment in support reduces the ever-increasing burden of administrative tasks. Above all else, important communication is streamlined, and inboxes and chat channels are no longer central to how work unfolds.The knowledge sector's evolution beyond the hyperactive hive mind is inevitable. The question is not whether a world without email is coming (it is), but whether you'll be ahead of this trend. If you're a CEO seeking a competitive edge, an entrepreneur convinced your productivity could be higher, or an employee exhausted by your inbox, A World Without Email will convince you that the time has come for bold changes, and will walk you through exactly how to make them happen.
Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance
Julia Angwin - 2014
We are being watched.We see online ads from websites we've visited, long after we've moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what's in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines.In Dragnet Nation, award-winning investigative journalist Julia Angwin reports from the front lines of America's surveillance economy, offering a revelatory and unsettling look at how the government, private companies, and even criminals use technology to indiscriminately sweep up vast amounts of our personal data. In a world where we can be watched in our own homes, where we can no longer keep secrets, and where we can be impersonated, financially manipulated, or even placed in a police lineup, Angwin argues that the greatest long-term danger is that we start to internalize the surveillance and censor our words and thoughts, until we lose the very freedom that makes us unique individuals. Appalled at such a prospect, Angwin conducts a series of experiments to try to protect herself, ranging from quitting Google to carrying a "burner" phone, showing how difficult it is for an average citizen to resist the dragnets' reach.Her book is a cautionary tale for all of us, with profound implications for our values, our society, and our very selves.
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
T.J. O'Connor - 2012
Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
The Big Nine: How the Tech Titans and Their Thinking Machines Could Warp Humanity
Amy Webb - 2019
We like to think that we are in control of the future of "artificial" intelligence. The reality, though, is that we -- the everyday people whose data powers AI -- aren't actually in control of anything. When, for example, we speak with Alexa, we contribute that data to a system we can't see and have no input into -- one largely free from regulation or oversight. The big nine corporations -- Amazon, Google, Facebook, Tencent, Baidu, Alibaba, Microsoft, IBM and Apple--are the new gods of AI and are short-changing our futures to reap immediate financial gain. In this book, Amy Webb reveals the pervasive, invisible ways in which the foundations of AI -- the people working on the system, their motivations, the technology itself -- is broken. Within our lifetimes, AI will, by design, begin to behave unpredictably, thinking and acting in ways which defy human logic. The big nine corporations may be inadvertently building and enabling vast arrays of intelligent systems that don't share our motivations, desires, or hopes for the future of humanity. Much more than a passionate, human-centered call-to-arms, this book delivers a strategy for changing course, and provides a path for liberating us from algorithmic decision-makers and powerful corporations.
The Tangled Web: A Guide to Securing Modern Web Applications
Michal Zalewski - 2011
Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.In The Tangled Web, Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You'll learn how to:Perform common but surprisingly complex tasks such as URL parsing and HTML sanitization Use modern security features like Strict Transport Security, Content Security Policy, and Cross-Origin Resource Sharing Leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs Build mashups and embed gadgets without getting stung by the tricky frame navigation policy Embed or host user-supplied content without running into the trap of content sniffing For quick reference, "Security Engineering Cheat Sheets" at the end of each chapter offer ready solutions to problems you're most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications that stand the test of time.
Reality is Broken: Why Games Make Us Better and How They Can Change the World
Jane McGonigal - 2010
The average young person in the UK will spend 10,000 hours gaming by the age of twenty-one. What's causing this mass exodus? According to world-renowned game designer Jane McGonigal the answer is simple: videogames are fulfilling genuine human needs. Drawing on positive psychology, cognitive science and sociology, Reality is Broken shows how game designers have hit on core truths about what makes us happy, and utilized these discoveries to astonishing effect in virtual environments. But why, McGonigal asks, should we use the power of games for escapist entertainment alone? In this groundbreaking exploration of the power and future of gaming, she reveals how gamers have become expert problem solvers and collaborators, and shows how we can use the lessons of game design to socially positive ends, be it in our own lives, our communities or our businesses. Written for gamers and non-gamers alike, Reality is Broken sends a clear and provocative message: the future will belong to those who can understand, design and play games.