information security

back to index

description: protecting information by mitigating information risks

229 results

Extremely Hardcore: Inside Elon Musk's Twitter

by Zoë Schiffer  · 13 Feb 2024  · 343pp  · 92,693 words

Davis and Michael Montano, the head of engineering, as he began to reshape the executive ranks. The following month, Rinki Sethi, the company’s chief information security officer, and Peiter “Mudge” Zatko, the head of security, were also cut. The company said Mudge was fired “for ineffective leadership and poor performance,” but

are you?” he asked. Then he pinged a few higher-ups to see what he should do. They told him that Stanley, who worked in Information Security at SpaceX, was part of Musk’s inner circle. “If he says we have to do this, we have to do this,” one explained. Doherty

order, Twitter needed to have a designated owner for each of its privacy controls, which included database safeguards for sensitive user data and policies around information security. Unfortunately, Twitter no longer had anyone responsible for about 37 percent of Twitter’s privacy program controls, according to Damien Kieran, then the chief privacy

officer, per a deposition with the FTC. Lea Kissner, then the chief information security officer, said that half the controls in the information security program did not have a designated owner. Kissner told the Department of Justice that the layoffs impaired Twitter’s ability to

helped build Twitter’s security apparatus, it was confounding. “Twitter folks, seriously, I left some design docs somewhere,” wrote Lea Kissner, Twitter’s former chief information security officer, on Bluesky. “Please use them.” CHAPTER 61 “Did Your Brain Fall Out of Your Head?” Before Musk bought Twitter, the company’s commitment to

“Information disaggregated by ‘each department, division, and/or team,’ regardless of whether the work done by these units had anything to do with privacy or information security.” Twitter responded by asking a US District Court in San Francisco to end the consent order. “The Court should not permit the FTC to continue

’s takeover, the project was set to roll out in the fall of 2022. Then Musk laid off half the company, and Twitter’s chief information security officer, Lea Kissner, resigned. Seven months later, it still wasn’t done. “Twitter is unable to automatically erase/scrub the entirety of a user’s

Kieran’s claim: “Product and engineering teams plan, develop, and launch new products or changes to existing products’ functionalities without review from legal, privacy, and information security teams, which could result in legal or regulatory fines and penalties and direct violation of the FTC Consent Order.” Even the shutdown of the Sacramento

. Engineers posted frantic updates in Slack. “FYI some large creators complaining because rate limit affecting paid subscription posts,” one said. Christopher Stanley, the head of information security, wrote with dismay that rate limits could apply to people refreshing the app to get news about a mass shooting or a major weather event

,” CNN, March 8, 2023, cnn.com/2023/03/08/tech/ftc-twitter-privacy-investigation/index.html. GO TO NOTE REFERENCE IN TEXT “with privacy or information security”: “The Weaponization of the Federal Trade Commission: An Agency’s Overreach to Harass Elon Musk’s Twitter,” Committee on the Judiciary and the Select Subcommittee

Money in the Metaverse: Digital Assets, Online Identities, Spatial Computing and Why Virtual Worlds Mean Real Business

by David G. W. Birch and Victoria Richardson  · 28 Apr 2024  · 249pp  · 74,201 words

not be your best friend. Arvind Narayanan, a computer science professor at Princeton, wrote on social media about asking ChatGPT some basic questions related to information security that he had posed to students in an exam. The bot responded with answers that sounded plausible but were actually nonsense, and, as he pointed

Beautiful security

by Andy Oram and John Viega  · 15 Dec 2009  · 302pp  · 82,233 words

The Single Machine Is Here Connecting People, Process, and Technology: The Potential for Business Process Management Social Networking: When People Start Communicating, Big Things Change Information Security Economics: Supercrunching and the New Rules of the Grid Platforms of the Long-Tail Variety: Why the Future Will Be Different for Us All Conclusion

of the organization’s implementation of controls that protect the security of IT assets. Here are some sample questions: • Does the organization have formally documented information security policies and procedures? • Are employees required to follow these policies and procedures? • Does the organization have an identity and access management process that governs

very little incentive structure to reward good behavior. The impact of reward structure on improving performance is well understood. It is perhaps time for the information security community to stop relying solely on compliance and start investigating how we can improve overall data protection competency by rewarding good behavior. This should include

merchant and only for the authorized amount of the recurring charge. This mitigates a great deal of fraud. Broken Incentives A common economic issue in information security involves broken incentives. Incentives are a critical factor in any system dealing with multiple parties, particularly where that system depends on people with free choice

rules in place to address market failures such as monopolies, pollution, lack of alignment with the “greater good,” or in this case a lack of information security. Forms of regulation in this area include the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Financial Services Modernization Act (GLBA), the

debate ethical medical research and cry foul about how human cloning could change the planet, but they may well be focused on the wrong problem. Information security and its relationship with technology, of course, dates back through history. The Egyptians carved obfuscated hieroglyphs into monuments; the Spartans used sticks and wound

programs. 148 CHAPTER NINE analyze DNA for complex patterns of hereditary diseases, predicting entire populations’ hereditary probability to inherit genetic traits. In stark contrast, the information security management programs that are supposed to protect trillions of dollars of assets, keep trade secrets safe from corporate espionage, and hide military plans from the

People, Process, and Technology: The Potential for Business Process Management” on page 154 • “Social Networking: When People Start Communicating, Big Things Change” on page 158 • “Information Security Economics: Supercrunching and the New Rules of the Grid” on page 162 • “Platforms of the Long-Tail Variety: Why the Future Will Be Different for

, and business activity monitoring tools—will dramatically change both the ways we need to view the security of modern business software and how we approach information security management itself. Diffuse Security in a Diffuse World In a flat world, workforces are decentralized. Instead of being physically connected in offices or factories

commonly dehydrated and rehydrated as technologies evolve to automatically discover new services. The complexity and impact of this way of working will only increase. For information security, of course, this brings significant new challenges. Over thousands of years, humans have associated security with physical location. They have climbed hills, built castles

include rocket science in its future), but it’s doing just that: realigning technology to support the business. In addition to offering radical improvements to information security by opening new markets, BPM can deliver even more powerful changes through its effects on the evolution of the science behind security. The Business Process

with what I see as its most important potential effects on security: 1. Understand and Document the Process Security effect: Implement a structured and effective information security program 2. Understand Metrics and Objectives Security effect: Understand success criteria and track their effectiveness 3. Model and Automate Process Security effect: Improve efficiency and

and objectives; model and automate your process; understand and implement your process; and optimize and improve the process, you will implement a structured and effective information security program, understand the success criteria and track effectiveness, improve efficiency and reduce cost, produce fast and accurate compliance, audit data, and ultimately do more with

less and reduce the cost of security. This is significant! While the topic of BPM for information security could of course fill a whole book—when you consider business process modeling, orchestration, business rules design, and business activity modeling—it would be remiss

platforms like these really offer little for corporations today, let alone for security professionals, but this will change. And when it changes, the implications for information security could be significant. If social networking today is about people-to-people networking, social networking tomorrow may well be about business-to-business. For several

formed all over the world to serve more specific purposes. But in the grand scheme of things, business-to-business social networking is very limited. Information security is rarely a competitive advantage (in fact, studies of stock price trends after companies have suffered serious data breaches indicate a surprisingly low correlation, so

long tails and idea viruses Decentralized connectivity Trading platform Business intelligence Business peer groups Aligned to business goals Platform that connects people, process, and technology Information security as a business discipline Useful business-oriented services Focus on the whole space (information) and not just IT security Facilitate and allow modern business models

exploit niche products and services previously thought to be uneconomical include iTunes, WordPress, YouTube, Facebook, and many other Internet economy trends. I fundamentally believe that information security is a long-tail market, and I offer three criteria to support this statement: • Every business has multiple processes. • Processes that are similar in

(more knowledgeable and more in tune) than an observer. Much as blogging tools have democratized publishing and GarageBand has democratized music production, tools will democratize information security. In fact, blogging has already had a significant effect, allowing thousands of security professionals to offer opinions and data. The most far-reaching change will

are key components of what is called the reputation economy. These filters help people find things and present them in a contextually useful way. Few information security tools today attempt to provide contextually useful information. What we will likely see are tools that merge their particular contributions with reputation mechanisms. A code

best products and services possible, and it is time we took the security element seriously and clearly faced up to the risks of not doing information security properly. I strongly believe that a well-designed and consistently implemented system development lifecycle applied to all projects will provide significant benefits in improved security

projects in a “proof of concept” mode. This is a common approach that companies take when starting a secure software program. But Acme’s chief information security officer (yours truly) read a book (Software Security: Building Security In, published by Addison-Wesley) on software security written by a recognized authority, Gary

of law involving responsibility and negligence, including legal analysis, risk assessment, and liability exposure, necessarily involve balance. As is often the case, the balance in information security tends to focus on competing factors that contribute to an overall security calculus. Unlike other areas of risk assessment (such as life insurance or medical

insurance, where actuarial data allows strong corollaries to be calculated), information security cannot draw on a significant amount of historical information. This is especially true when considering the legal aspects of security. Nevertheless, we can still take

Code) places requirements on any “business that conducts business in California” that “owns † See http://www.abanet.org/scitech/ec/isc. ‡ See American Bar Association, Information Security Committee, Section of Science and Technology Law, Digital Signature Guidelines, available at http://www.abanet.org/scitech/ec/isc/digital_signature.html (Aug. 1, 1996

unreported. How can this be? The embarrassment of disclosure that a company or agency was “hacked,” or the fear of lost business based upon shoddy information security practices being disclosed overrides the need to inform the affected persons. In other instances, credit card issuers, telephone companies and internet service providers, along with

implementing security. Depending on whom you ask, the passage of infosecurity laws and regulations can be viewed as one of the most important trends affecting information security or, conversely, the cause of the dangerous misperception that compliance equals security. This double-edged sword can wind up perpetuating unwarranted complacency. Although regulatory

compliance certainly is a driver that must be taken into account in the implementation of your information security plan, it should be a result, not a goal. Imagine back to the days before SOX, HIPAA, GLBA, and data breach disclosure laws. Numerous

nonregulatory sources of guidance and several information security standards provided the direction needed for most information security professionals. Various events, however, led to the passage of the aforementioned laws. From a glass-half-full perspective, the laws have

has arguably improved security over the previous status quo. For companies outside those silos, state laws requiring data breach notification and reasonable security measures brought information security to the forefront. Thus, regulation can be viewed as the catalyst needed to get many organizations focused on security. Hence, more regulation is purportedly

Pragmatic security approaches recognize the value proposition in maintaining a secure network, understand the consequences of not having adequate security, and embrace the implementation of information security from the top of the organization down. In effect, pragmatic security creates a culture of security. A similar pragmatic recognition of compliance and ethics exists

of business units. These assets include Orbitz, CheapTickets, eBookers, Away.com, HotelClub, RatesToGo, AsiaHotels, and Orbitz for Business. With over 16 years of experience in information security and technology, Ed has been involved in protecting information assets at several Fortune 500 companies. Prior to joining Orbitz, Ed served as VP of Corporate

book author. He cowrote Security Warrior (http: //oreilly.com/catalog/9780596005450/index.html) (O’Reilly) and contributed to Know Your Enemy, Second Edition (Addison-Wesley), Information Security Management Handbook (Auerbach), Hacker’s Challenge 3 (McGraw-Hill), PCI Compliance (Syngress), OSSEC HIDS (Syngress), and other books. Anton also publishes numerous papers on a

Nath & Rosenthal LLP, where he is a member of the Internet, Communications & Data Protection practice group and the Venture Technology Group. He counsels clients on information security, privacy, IT licensing, and patents, dealing with such issues as Public Key Infrastructure (PKI), digital and electronic signatures, federated identity, HIPAA, GrammLeach-Bliley, Sarbanes-

Oxley, state and federal information security laws, identity theft, and security breaches. Randy was a commissioner on the Commission on Cyber Security for the 44th Presidency and has been recognized as

Club, 50 backend control systems, 18–20 backward compatibility LANMAN password encoding, 6 learned helplessness and, 2 legacy systems, 7 PGP issues, 117 balance in information security, 202–207 banking industry (see financial institutions) banking trojans, 141, 249 banner ads exploit-laden, 89–92, 143 honeyclients and, 143 banner farms, 98,

Business Process Management (see BPM) Business Process Management Initiative (BPMI), 157 business rules engines, 157 C California AB 1950, 207 California SB 1386 balance in information security, 203–205 on data sharing, 36, 38 on reporting breaches, 55 passage of, 207 call options, 40 Callas, Jon, 107–130 Capture-HPC honeyclient,

affiliate network, 102 Commission on Cyber Security for the 44th Presidency, 201 Common Vulnerabilities and Exposures (CVE) database, 131 communication cyber underground infrastructure, 65, 66 information security and, 207–211 Comprehensive National Cybersecurity Initiative (CNCI), 202 Computer Fraud and Abuse Act (CFAA), 207 confidentiality of data, 85 confirmation traps defined, 10 intelligence

certificates, 110 directionality, 227 distributed denial of service (see DDoS) distribution channels, 166 DKIM email-authentication, 124 Dobbertin, Hans, 119 doing the right thing in information security, 211– 212 drop accounts, 70 Drucker, Peter, 163 DSG (Digital Signature Guidelines), 202–203 DSW Shoe Warehouse, 50 Dublin City University, 144 Dunphy, Brian,

227 SQL Slammer worm, 225 InCtrl change tracker, 92 information dealers defined, 64 IRC data exchange, 67 malware producers and, 64 sources of information, 68 information security as long tail market, 165–167 balance in, 202–207 basic concepts, 200 cloud computing, 150–154 communication considerations, 207–211 connecting people and processes

and, 158–162 strict scrutiny, 252–254 suggested practices, 257 supercrunching, 153, 162–164 taking a security history, 44–46 web services, 150–154 Information Security Economics, 162–164 Information Security Group, 168 injected iFrames, 69 International Data Encryption Algorithm (IDEA), 117, 118 International Tariff on Arms Regulations (ITAR), 3 Internet Explorer exploit-based

-commerce security and, 74 end-of-life upgrades, 2, 7 password security and, 4–6 legal considerations balance in information security, 202–207 communication and information security, 207– 211 doing the right thing, 211–212 information security concepts, 200 log handling, 223 organizational culture, 200–202 value of logs, 214 Levy, Steven, 119 LinkShare affiliate

Dark Mirror: Edward Snowden and the Surveillance State

by Barton Gellman  · 20 May 2020  · 562pp  · 153,825 words

badge for a blue one, and received agency identification number 2339176. He was a full-time employee now, soon to be deployable as a telecommunications information security officer. The official designation was TISO, but agency folk, old-timers especially, called the job “commo.” Snowden swallowed a five-figure pay cut to take

” in an effort to elicit information about the NSA documents, or to steal the digital files. The two of us talked through a well-known information security scenario known as the evil maid attack, which relies on brief physical access to a computer to steal its encryption credentials. The Snowden files, as

taught a Princeton class called “Secrecy, Accountability, and the National Security State.” Most of my guest speakers—including Mike Levin, a former NSA chief of information security who had once called me a “traitor” on film—agreed by the end of our three-hour seminars that there might be circumstances in which

Director of National Intelligence, March 30, 2012, https://perma.cc/M9W2-SY3Z. For a slightly more user-friendly guide, see “Marking Classified National Security Information,” Information Security Oversight Office, Revision 4, January 2018, https://perma.cc/6N2K-2SZB. surveillance program created by Dick Cheney: See Gellman, Angler, chapters 11 and 12. “Wish

://arstechnica.com/civis/viewtopic.php?f=10&t=868906&p=16121406#p16121406. The wish came true: Family confidant, interview with author, December 10, 2015. telecommunications information security officer: For the contemporary CIA job description, see https://web.archive.org/web/20100324173658/https://www.cia.gov/careers/opportunities/support-professional/copy_of_telecommunications

Real Edward Snowden.” Runa Sandvik: Snowden (as “Cincinnatus”) to Sandvik, Novmber 18, 2012, copy on file with author. At this writing, Sandvik is chief of information security at the New York Times. Her personal website is https://encrypted.cc. the Tor Project: I discussed Tor in chapters 1 and 2. See www

“no foreign distribution.” The designation X1 was a claim of exemption from automatic declassification review after ten years. The governing rule at the time was Information Security Oversight Office, “ISOO Directive No. 1,” October 13, 1995, archived at https://fas.org/sgp/isoo/isoodir1.html. Updated rules, which ended the X-series

exemptions, came in Information Security Oversight Office, “Marking Classified National Security Information,” December 2010, at www.archives.gov/files/isoo/training/marking-booklet.pdf. I am indebted to Steven Aftergood

The Future of the Internet: And How to Stop It

by Jonathan Zittrain  · 27 May 2009  · 629pp  · 142,393 words

, to some, this is progress. It allows scholars and companies alike to say that the user has been put on notice of privacy practices. Personal information security is another area of inquiry, and there have been some valuable policy innovations in this sphere. For example, a 2003 California law requires firms that

–5, 222, 233–34; and industry self-regulation, 203; involuntary celebrities, 210–14; “just deal with it,” 111–12; and peer production, 206–16; personal information security, 203–4; Privacy 1.0, 201–5, 208, 215, 216, 222, 232; Privacy 2.0, 205–34; as proxies for other limitations, 112; public vs

Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks

by Scott J. Shapiro  · 523pp  · 154,042 words

would buy only from vendors who had received a high enough security rating from the NSA. In no other way, the military thought, could their information security needs be met. The story of the VAX VMM Security Kernel demonstrates the pitfalls of this strategy. In 1979, Major Roger Schell led a team

first Lord of the Rings movie was released three months after 9/11.) American demands for physical security had led to a loss in their information security. Trustworthy Computing In 2002, Bill Gates penned another memo, titled “Trustworthy Computing,” in which he expressed anxiety about the loss of consumer confidence in Microsoft

of applications and services. There is no such thing as “solving” the “problem” of cybersecurity. There are only trade-offs between different aspects of our information security, and between our information and physical securities. We have to balance the costs and benefits before we decide whether and how to patch upcode. For

always been able to do. Rather, they are novel because they can do what bombs have never been able to do, namely, to affect the information security of the target. Malware can steal data; it can change data; it can block data. Fancy Bear implanted X-Agent on DNC servers, not Novichok

tried to kill double agent Sergei Skripal. Fancy Bear was trying to steal information. Because cyberweapons enjoy a functional duality—they can affect physical and information security—it would be a mistake to apply the laws of war to all forms of cyber-conflict. If a state uses malware to produce destructive

eye. Homo sapiens have had 150,000 years to think through rules for protecting physical security. Now our species must turn to developing rules for information security, which will take generations more to hammer out. Once we reject solutionism, we will see how much political work is left to do. In 1929

upcode controls downcode, and not only because downcode uses the data generated by upcode. We need to deliberate and debate the rules that regulate our information security because we are morally autonomous agents. We contain our own code, but we also put it there. Unlike the 20 billion digital devices in the

Quarterly 33, no. 5 (2016): 890–911; Ross Anderson et al., “Measuring the Changing Cost of Cybercrime.” The 18th Annual Workshop on the Economics of Information Security, 2019, https://www.repository.cam.ac.uk/handle/1810/294492. $600 billion to $6 trillion: Compare James Lewis, “Economic Impact of Cybercrime—No Slowing Down

pass through. When the Morris worm hit, military administrators disconnected those bridges, thereby containing the damage. provide logical proofs: MacKenzie and Pottinger, “Mathematics, Technology,” 46. information security needs: See, e.g., Michael Warner, “Cybersecurity: A Pre-history,” Intelligence and National Security, 2012; Stephen B. Lipner, “The Birth and Death of the Orange

-making-of-the-first-computer-virus-the-pakistani-brain-32296. doing doctoral research: As Cohen describes his eureka moment: “I was in Len Adleman’s information security class at USC when the proverbial light bulb turned on. I immediately knew that a virus could penetrate and be used to exploit any connected

a “reflection” attack. See generally Todd Booth and Karl Andersson, “Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks,” Journal of Internet Services and Information Security 5, no. 3 (2015), 58–79. murderous organization’s website: Tim Lee, “The New York Times Web Site Was Taken Down by DNS Hijacking. Here

Pandey, and Damon McCoy, “Booted: An Analysis of a Payment Intervention on a DDoS-for-Hire Service” (presented at the Workshop on the Economics of Information Security, California, June 2017), 5, http://damonmccoy.com/papers/vdos.pdf. no technical knowledge required: In 2010, researchers discovered that twelve out of the top twenty

. See, e.g., Gabriella Coleman, Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous (London: Verso, 2014). Economic analysis: See, e.g., Ross Anderson, “Why Information Security Is Hard—An Economic Perspective,” Proceedings 17th Annual Computer Security Applications Conference, 2001, https://www.acsac.org/2001/papers/110.pdf. Sociology: Jonathan Lusthaus, The

?,” Justice Quarterly 33, no. 5 (2016): 890–911; Ross Anderson et al., “Measuring the Changing Cost of Cybercrime,” 18th Annual Workshop on the Economics of Information Security, 2019. Under international law: States often sign mutual legal assistance treaties that obligate them to assist each other in criminal prosecutions. See also the Council

Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World

by Don Tapscott and Alex Tapscott  · 9 May 2016  · 515pp  · 126,820 words

Athens. They wouldn’t have been able to transfer their drachmas into bitcoins to hedge against the plummeting fiat currency. Computer scientist Nick Szabo and information security expert Andreas Antonopoulos both argued that robust infrastructure matters and can’t be bootstrapped during catastrophes. Antonopoulos said that Greece’s blockchain infrastructure was lacking

Secrets and Lies: Digital Security in a Networked World

by Bruce Schneier  · 1 Jan 2000  · 470pp  · 144,455 words

also have the duty to tell individuals about the reason for the information collection, to provide access and correct inaccurate information, and to keep that information secure from access by unauthorized parties. Individuals have a right to see their own personal data that has been collected and have inaccuracies corrected. Individuals also

The Best of 2600: A Hacker Odyssey

by Emmanuel Goldstein  · 28 Jul 2008  · 889pp  · 433,897 words

, California. Last Thursday, March 2, I presented my written and verbal testimony to the United States Senate Governmental Affairs Committee that described how to increase information security within government agencies. Wow. On The Inside “Doing time” is a strange thing. When you’re on the inside, you can’t look out—you

Trading and Exchanges: Market Microstructure for Practitioners

by Larry Harris  · 2 Jan 2003  · 1,164pp  · 309,327 words

or other relationship of trust and confidence, while in possession of material, nonpublic information about the security. Insider trading violations may also include “tipping” such information, securities trading by the person “tipped” and securities trading by those who misappropriate such information. Examples of insider trading cases that have been brought by the

Smart Grid Standards

by Takuro Sato  · 17 Nov 2015

Beyond the Random Walk: A Guide to Stock Market Anomalies and Low Risk Investing

by Vijay Singal  · 15 Jun 2004  · 369pp  · 128,349 words

Mastering Blockchain: Unlocking the Power of Cryptocurrencies and Smart Contracts

by Lorne Lantz and Daniel Cawrey  · 8 Dec 2020  · 434pp  · 77,974 words

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

by Nicole Perlroth  · 9 Feb 2021  · 651pp  · 186,130 words

The Age of Surveillance Capitalism

by Shoshana Zuboff  · 15 Jan 2019  · 918pp  · 257,605 words

Digital Accounting: The Effects of the Internet and Erp on Accounting

by Ashutosh Deshmukh  · 13 Dec 2005

Gray Day: My Undercover Mission to Expose America's First Cyber Spy

by Eric O'Neill  · 1 Mar 2019  · 299pp  · 88,375 words

Black Code: Inside the Battle for Cyberspace

by Ronald J. Deibert  · 13 May 2013  · 317pp  · 98,745 words

Adaptive Markets: Financial Evolution at the Speed of Thought

by Andrew W. Lo  · 3 Apr 2017  · 733pp  · 179,391 words

The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom?

by David Brin  · 1 Jan 1998  · 205pp  · 18,208 words

Take the Money and Run: Sovereign Wealth Funds and the Demise of American Prosperity

by Eric C. Anderson  · 15 Jan 2009  · 264pp  · 115,489 words

Click Here to Kill Everybody: Security and Survival in a Hyper-Connected World

by Bruce Schneier  · 3 Sep 2018  · 448pp  · 117,325 words

Fateful Triangle: The United States, Israel, and the Palestinians (Updated Edition) (South End Press Classics Series)

by Noam Chomsky  · 1 Apr 1999

Cyber War: The Next Threat to National Security and What to Do About It

by Richard A. Clarke and Robert Knake  · 15 Dec 2010  · 282pp  · 92,998 words

The Fugitive Game: Online With Kevin Mitnick

by Jonathan Littman  · 1 Jan 1996

The Truth Machine: The Blockchain and the Future of Everything

by Paul Vigna and Michael J. Casey  · 27 Feb 2018  · 348pp  · 97,277 words

Hacker, Hoaxer, Whistleblower, Spy: The Story of Anonymous

by Gabriella Coleman  · 4 Nov 2014  · 457pp  · 126,996 words

Active Measures: The Secret History of Disinformation and Political Warfare

by Thomas Rid

The New Digital Age: Transforming Nations, Businesses, and Our Lives

by Eric Schmidt and Jared Cohen  · 22 Apr 2013  · 525pp  · 116,295 words

Chinese Spies: From Chairman Mao to Xi Jinping

by Roger Faligot  · 30 Jun 2019  · 615pp  · 187,426 words

Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems

by Heather Adkins, Betsy Beyer, Paul Blankinship, Ana Oprea, Piotr Lewandowski and Adam Stubblefield  · 29 Mar 2020  · 1,380pp  · 190,710 words

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

by Bruce Schneier  · 2 Mar 2015  · 598pp  · 134,339 words

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

by Kim Zetter  · 11 Nov 2014  · 492pp  · 153,565 words

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It

by Marc Goodman  · 24 Feb 2015  · 677pp  · 206,548 words

The Tangled Web: A Guide to Securing Modern Web Applications

by Michal Zalewski  · 26 Nov 2011  · 570pp  · 115,722 words

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age

by Steven Levy  · 15 Jan 2002  · 468pp  · 137,055 words

The Black Box Society: The Secret Algorithms That Control Money and Information

by Frank Pasquale  · 17 Nov 2014  · 320pp  · 87,853 words

Engineering Security

by Peter Gutmann

The Wealth of Networks: How Social Production Transforms Markets and Freedom

by Yochai Benkler  · 14 May 2006  · 678pp  · 216,204 words

The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats

by Richard A. Clarke and Robert K. Knake  · 15 Jul 2019  · 409pp  · 112,055 words

The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics

by Ben Buchanan  · 25 Feb 2020  · 443pp  · 116,832 words

The Secret World: A History of Intelligence

by Christopher Andrew  · 27 Jun 2018

Hands-On RESTful API Design Patterns and Best Practices

by Harihara Subramanian  · 31 Jan 2019  · 422pp  · 86,414 words

The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World From Cybercrime

by Renee Dudley and Daniel Golden  · 24 Oct 2022  · 392pp  · 114,189 words

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

by Michal Zalewski  · 4 Apr 2005  · 412pp  · 104,864 words

The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

by David E. Sanger  · 18 Jun 2018  · 394pp  · 117,982 words

Messing With the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News

by Clint Watts  · 28 May 2018  · 324pp  · 96,491 words

Dark Territory: The Secret History of Cyber War

by Fred Kaplan  · 1 Mar 2016  · 383pp  · 105,021 words

Mastering Blockchain, Second Edition

by Imran Bashir  · 28 Mar 2018

CIOs at Work

by Ed Yourdon  · 19 Jul 2011  · 525pp  · 142,027 words

Spies, Lies, and Algorithms: The History and Future of American Intelligence

by Amy B. Zegart  · 6 Nov 2021

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

by Kevin Mitnick, Mikko Hypponen and Robert Vamosi  · 14 Feb 2017  · 305pp  · 93,091 words

Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat

by John P. Carlin and Garrett M. Graff  · 15 Oct 2018  · 568pp  · 164,014 words

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

by Kevin Mitnick  · 14 Aug 2011

Digital Empires: The Global Battle to Regulate Technology

by Anu Bradford  · 25 Sep 2023  · 898pp  · 236,779 words

Top Secret America: The Rise of the New American Security State

by Dana Priest and William M. Arkin  · 5 Sep 2011  · 328pp  · 100,381 words

There's a War Going on but No One Can See It

by Huib Modderkolk  · 1 Sep 2021  · 295pp  · 84,843 words

How Everything Became War and the Military Became Everything: Tales From the Pentagon

by Rosa Brooks  · 8 Aug 2016  · 548pp  · 147,919 words

The Brussels Effect: How the European Union Rules the World

by Anu Bradford  · 14 Sep 2020  · 696pp  · 184,001 words

Demystifying Smart Cities

by Anders Lisdorf

Data and the City

by Rob Kitchin,Tracey P. Lauriault,Gavin McArdle  · 2 Aug 2017

The Controlled Demolition of the American Empire

by Jeff Berwick and Charlie Robinson  · 14 Apr 2020  · 491pp  · 141,690 words

How the City Really Works: The Definitive Guide to Money and Investing in London's Square Mile

by Alexander Davidson  · 1 Apr 2008  · 368pp  · 32,950 words

Jenkins Continuous Integration Cookbook

by Alan Berg  · 15 Mar 2012  · 372pp  · 67,140 words

Cryptoassets: The Innovative Investor's Guide to Bitcoin and Beyond: The Innovative Investor's Guide to Bitcoin and Beyond

by Chris Burniske and Jack Tatar  · 19 Oct 2017  · 416pp  · 106,532 words

The Seventh Sense: Power, Fortune, and Survival in the Age of Networks

by Joshua Cooper Ramo  · 16 May 2016  · 326pp  · 103,170 words

Independent Diplomat: Dispatches From an Unaccountable Elite

by Carne Ross  · 25 Apr 2007  · 212pp  · 68,690 words

The Age of Turbulence: Adventures in a New World (Hardback) - Common

by Alan Greenspan  · 14 Jun 2007

The One Device: The Secret History of the iPhone

by Brian Merchant  · 19 Jun 2017  · 416pp  · 129,308 words

The Driver in the Driverless Car: How Our Technology Choices Will Create the Future

by Vivek Wadhwa and Alex Salkever  · 2 Apr 2017  · 181pp  · 52,147 words

Infomocracy: A Novel

by Malka Older  · 7 Jun 2016  · 346pp  · 102,666 words

Infonomics: How to Monetize, Manage, and Measure Information as an Asset for Competitive Advantage

by Douglas B. Laney  · 4 Sep 2017  · 374pp  · 94,508 words

Army of None: Autonomous Weapons and the Future of War

by Paul Scharre  · 23 Apr 2018  · 590pp  · 152,595 words

Rebooting India: Realizing a Billion Aspirations

by Nandan Nilekani  · 4 Feb 2016  · 332pp  · 100,601 words

Big Data Analytics: Turning Big Data Into Big Money

by Frank J. Ohlhorst  · 28 Nov 2012  · 133pp  · 42,254 words

Masterminds of Programming: Conversations With the Creators of Major Programming Languages

by Federico Biancuzzi and Shane Warden  · 21 Mar 2009  · 496pp  · 174,084 words

The Teeth of the Tiger

by Tom Clancy  · 2 Jan 1998  · 553pp  · 151,139 words

Israel & the Palestinian Territories Travel Guide

by Lonely Planet

The Industries of the Future

by Alec Ross  · 2 Feb 2016  · 364pp  · 99,897 words

Facebook: The Inside Story

by Steven Levy  · 25 Feb 2020  · 706pp  · 202,591 words

The Precariat: The New Dangerous Class

by Guy Standing  · 27 Feb 2011  · 209pp  · 89,619 words

Blockchain: Blueprint for a New Economy

by Melanie Swan  · 22 Jan 2014  · 271pp  · 52,814 words

The Zero Marginal Cost Society: The Internet of Things, the Collaborative Commons, and the Eclipse of Capitalism

by Jeremy Rifkin  · 31 Mar 2014  · 565pp  · 151,129 words

API Marketplace Engineering: Design, Build, and Run a Platform for External Developers

by Rennay Dorasamy  · 2 Dec 2021  · 328pp  · 77,877 words

Wired for War: The Robotics Revolution and Conflict in the 21st Century

by P. W. Singer  · 1 Jan 2010  · 797pp  · 227,399 words

Likewar: The Weaponization of Social Media

by Peter Warren Singer and Emerson T. Brooking  · 15 Mar 2018

Mastering Ethereum: Building Smart Contracts and DApps

by Andreas M. Antonopoulos and Gavin Wood Ph. D.  · 23 Dec 2018  · 960pp  · 125,049 words

Dead in the Water: A True Story of Hijacking, Murder, and a Global Maritime Conspiracy

by Matthew Campbell and Kit Chellel  · 2 May 2022  · 363pp  · 98,496 words

Data Mining: Concepts and Techniques: Concepts and Techniques

by Jiawei Han, Micheline Kamber and Jian Pei  · 21 Jun 2011

A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back

by Bruce Schneier  · 7 Feb 2023  · 306pp  · 82,909 words

The Nature of Software Development: Keep It Simple, Make It Valuable, Build It Piece by Piece

by Ron Jeffries  · 14 Aug 2015  · 444pp  · 118,393 words

When McKinsey Comes to Town: The Hidden Influence of the World's Most Powerful Consulting Firm

by Walt Bogdanich and Michael Forsythe  · 3 Oct 2022  · 689pp  · 134,457 words

The Wires of War: Technology and the Global Struggle for Power

by Jacob Helberg  · 11 Oct 2021  · 521pp  · 118,183 words

Unit X: How the Pentagon and Silicon Valley Are Transforming the Future of War

by Raj M. Shah and Christopher Kirchhoff  · 8 Jul 2024  · 272pp  · 103,638 words

Every Nation for Itself: Winners and Losers in a G-Zero World

by Ian Bremmer  · 30 Apr 2012  · 234pp  · 63,149 words

Snowden's Box: Trust in the Age of Surveillance

by Jessica Bruder and Dale Maharidge  · 29 Mar 2020  · 159pp  · 42,401 words

Zucked: Waking Up to the Facebook Catastrophe

by Roger McNamee  · 1 Jan 2019  · 382pp  · 105,819 words

Hacking Exposed: Network Security Secrets and Solutions

by Stuart McClure, Joel Scambray and George Kurtz  · 15 Feb 2001  · 260pp  · 40,943 words

Liars and Outliers: How Security Holds Society Together

by Bruce Schneier  · 14 Feb 2012  · 503pp  · 131,064 words

The Defence of the Realm

by Christopher Andrew  · 2 Aug 2010  · 1,744pp  · 458,385 words

Predictive Analytics: The Power to Predict Who Will Click, Buy, Lie, or Die

by Eric Siegel  · 19 Feb 2013  · 502pp  · 107,657 words

A Manual for Writers of Research Papers, Theses, and Dissertations, Eighth Edition: Chicago Style for Students and Researchers

by Kate L. Turabian  · 14 Apr 2007  · 863pp  · 159,091 words

Dark Pools: The Rise of the Machine Traders and the Rigging of the U.S. Stock Market

by Scott Patterson  · 11 Jun 2012  · 356pp  · 105,533 words

The Singularity Is Near: When Humans Transcend Biology

by Ray Kurzweil  · 14 Jul 2005  · 761pp  · 231,902 words

Cybersecurity: What Everyone Needs to Know

by P. W. Singer and Allan Friedman  · 3 Jan 2014  · 587pp  · 117,894 words

Flask Web Development: Developing Web Applications With Python

by Miguel Grinberg  · 12 May 2014  · 420pp  · 61,808 words

The Hacker Crackdown

by Bruce Sterling  · 15 Mar 1992  · 345pp  · 105,722 words

Going Dark: The Secret Social Lives of Extremists

by Julia Ebner  · 20 Feb 2020  · 309pp  · 79,414 words

Designing Social Interfaces

by Christian Crumlish and Erin Malone  · 30 Sep 2009  · 518pp  · 49,555 words

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

by Dafydd Stuttard and Marcus Pinto  · 30 Sep 2007  · 1,302pp  · 289,469 words

Americana: A 400-Year History of American Capitalism

by Bhu Srinivasan  · 25 Sep 2017  · 801pp  · 209,348 words

Red Flags: Why Xi's China Is in Jeopardy

by George Magnus  · 10 Sep 2018  · 371pp  · 98,534 words

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

by Justin Schuh  · 20 Nov 2006  · 2,054pp  · 359,149 words

Bean Counters: The Triumph of the Accountants and How They Broke Capitalism

by Richard Brooks  · 23 Apr 2018  · 398pp  · 105,917 words

The Enablers: How the West Supports Kleptocrats and Corruption - Endangering Our Democracy

by Frank Vogl  · 14 Jul 2021  · 265pp  · 80,510 words

Docker in Action

by Jeff Nickoloff and Stephen Kuenzli  · 10 Dec 2019  · 629pp  · 109,663 words

The Three-Body Problem (Remembrance of Earth's Past)

by Cixin Liu  · 11 Nov 2014  · 420pp  · 119,928 words

Elon Musk

by Walter Isaacson  · 11 Sep 2023  · 562pp  · 201,502 words

Gray Hat Python: Python Programming for Hackers and Reverse Engineers

by Justin Seitz  · 15 Feb 2009  · 312pp  · 52,762 words

The Founders: The Story of Paypal and the Entrepreneurs Who Shaped Silicon Valley

by Jimmy Soni  · 22 Feb 2022  · 505pp  · 161,581 words

System Error: Where Big Tech Went Wrong and How We Can Reboot

by Rob Reich, Mehran Sahami and Jeremy M. Weinstein  · 6 Sep 2021

Working in Public: The Making and Maintenance of Open Source Software

by Nadia Eghbal  · 3 Aug 2020  · 1,136pp  · 73,489 words

The Infinite Machine: How an Army of Crypto-Hackers Is Building the Next Internet With Ethereum

by Camila Russo  · 13 Jul 2020  · 349pp  · 102,827 words

Wars, Guns, and Votes: Democracy in Dangerous Places

by Paul Collier  · 9 Feb 2010  · 264pp  · 74,313 words

The Numerati

by Stephen Baker  · 11 Aug 2008  · 265pp  · 74,000 words

Coders: The Making of a New Tribe and the Remaking of the World

by Clive Thompson  · 26 Mar 2019  · 499pp  · 144,278 words

Chaos Monkeys: Obscene Fortune and Random Failure in Silicon Valley

by Antonio Garcia Martinez  · 27 Jun 2016  · 559pp  · 155,372 words

Originals: How Non-Conformists Move the World

by Adam Grant  · 2 Feb 2016  · 410pp  · 101,260 words

Age of Discovery: Navigating the Risks and Rewards of Our New Renaissance

by Ian Goldin and Chris Kutarna  · 23 May 2016  · 437pp  · 113,173 words

The Snowden Files: The Inside Story of the World's Most Wanted Man

by Luke Harding  · 7 Feb 2014  · 266pp  · 80,018 words

The Techno-Human Condition

by Braden R. Allenby and Daniel R. Sarewitz  · 15 Feb 2011

Applied Artificial Intelligence: A Handbook for Business Leaders

by Mariya Yao, Adelyn Zhou and Marlene Jia  · 1 Jun 2018  · 161pp  · 39,526 words

Algorithms of Oppression: How Search Engines Reinforce Racism

by Safiya Umoja Noble  · 8 Jan 2018  · 290pp  · 73,000 words

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

by Andy Greenberg  · 5 Nov 2019  · 363pp  · 105,039 words

Breaking News: The Remaking of Journalism and Why It Matters Now

by Alan Rusbridger  · 14 Oct 2018  · 579pp  · 160,351 words

Nobody's Fool: Why We Get Taken in and What We Can Do About It

by Daniel Simons and Christopher Chabris  · 10 Jul 2023  · 338pp  · 104,815 words

Reskilling America: Learning to Labor in the Twenty-First Century

by Katherine S. Newman and Hella Winston  · 18 Apr 2016  · 338pp  · 92,465 words

AI 2041: Ten Visions for Our Future

by Kai-Fu Lee and Qiufan Chen  · 13 Sep 2021

Pax Technica: How the Internet of Things May Set Us Free or Lock Us Up

by Philip N. Howard  · 27 Apr 2015  · 322pp  · 84,752 words

Applied Cryptography: Protocols, Algorithms, and Source Code in C

by Bruce Schneier  · 10 Nov 1993

Attack of the 50 Foot Blockchain: Bitcoin, Blockchain, Ethereum & Smart Contracts

by David Gerard  · 23 Jul 2017  · 309pp  · 54,839 words

Forge Your Future with Open Source

by VM (Vicky) Brasseur  · 266pp  · 79,297 words

Dirty Wars: The World Is a Battlefield

by Jeremy Scahill  · 22 Apr 2013  · 1,117pp  · 305,620 words

Delete: The Virtue of Forgetting in the Digital Age

by Viktor Mayer-Schönberger  · 1 Jan 2009  · 263pp  · 75,610 words

PostgreSQL Cookbook

by Chitij Chauhan  · 30 Jan 2015

Empire: How Britain Made the Modern World

by Niall Ferguson  · 1 Jan 2002  · 469pp  · 146,487 words

Alpha Girls: The Women Upstarts Who Took on Silicon Valley's Male Culture and Made the Deals of a Lifetime

by Julian Guthrie  · 15 Nov 2019

Young Money: Inside the Hidden World of Wall Street's Post-Crash Recruits

by Kevin Roose  · 18 Feb 2014  · 269pp  · 83,307 words

Architecting Modern Data Platforms: A Guide to Enterprise Hadoop at Scale

by Jan Kunigk, Ian Buss, Paul Wilkinson and Lars George  · 8 Jan 2019  · 1,409pp  · 205,237 words

Whiplash: How to Survive Our Faster Future

by Joi Ito and Jeff Howe  · 6 Dec 2016  · 254pp  · 76,064 words

Tech Titans of China: How China's Tech Sector Is Challenging the World by Innovating Faster, Working Harder, and Going Global

by Rebecca Fannin  · 2 Sep 2019  · 269pp  · 70,543 words

Reset

by Ronald J. Deibert  · 14 Aug 2020

Practical Doomsday: A User's Guide to the End of the World

by Michal Zalewski  · 11 Jan 2022  · 337pp  · 96,666 words

Aiming High: Masayoshi Son, SoftBank, and Disrupting Silicon Valley

by Atsuo Inoue  · 18 Nov 2021  · 295pp  · 89,441 words

The Internet of Money

by Andreas M. Antonopoulos  · 28 Aug 2016  · 200pp  · 47,378 words

The Raging 2020s: Companies, Countries, People - and the Fight for Our Future

by Alec Ross  · 13 Sep 2021  · 363pp  · 109,077 words

Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World

by Joseph Menn  · 3 Jun 2019  · 302pp  · 85,877 words

Stories Are Weapons: Psychological Warfare and the American Mind

by Annalee Newitz  · 3 Jun 2024  · 251pp  · 68,713 words

Permanent Record

by Edward Snowden  · 16 Sep 2019  · 324pp  · 106,699 words

America at the Crossroads: Democracy, Power, and the Neoconservative Legacy

by Francis Fukuyama  · 20 Mar 2007  · 214pp  · 57,614 words

Habeas Data: Privacy vs. The Rise of Surveillance Tech

by Cyrus Farivar  · 7 May 2018  · 397pp  · 110,222 words

Tribe of Mentors: Short Life Advice From the Best in the World

by Timothy Ferriss  · 14 Jun 2017  · 579pp  · 183,063 words

Ansible Playbook Essentials

by Gourav Shah  · 29 Jul 2015  · 178pp  · 33,275 words

Flash Boys: A Wall Street Revolt

by Michael Lewis  · 30 Mar 2014  · 250pp  · 87,722 words

HBase: The Definitive Guide

by Lars George  · 29 Aug 2011

The Blue Cascade: A Memoir of Life After War

by Mike Scotti  · 14 May 2012  · 287pp  · 92,118 words

The Zenith Angle

by Bruce Sterling  · 27 Apr 2004  · 342pp  · 95,013 words

Squeezed: Why Our Families Can't Afford America

by Alissa Quart  · 25 Jun 2018  · 320pp  · 90,526 words

Uberland: How Algorithms Are Rewriting the Rules of Work

by Alex Rosenblat  · 22 Oct 2018  · 343pp  · 91,080 words

Global Catastrophic Risks

by Nick Bostrom and Milan M. Cirkovic  · 2 Jul 2008

Chaos Engineering: System Resiliency in Practice

by Casey Rosenthal and Nora Jones  · 27 Apr 2020  · 419pp  · 102,488 words

An Ugly Truth: Inside Facebook's Battle for Domination

by Sheera Frenkel and Cecilia Kang  · 12 Jul 2021  · 372pp  · 100,947 words

This Will Make You Smarter: 150 New Scientific Concepts to Improve Your Thinking

by John Brockman  · 14 Feb 2012  · 416pp  · 106,582 words

Character Limit: How Elon Musk Destroyed Twitter

by Kate Conger and Ryan Mac  · 17 Sep 2024

The Currency Cold War: Cash and Cryptography, Hash Rates and Hegemony

by David G. W. Birch  · 14 Apr 2020  · 247pp  · 60,543 words

Super Pumped: The Battle for Uber

by Mike Isaac  · 2 Sep 2019  · 444pp  · 127,259 words

Anathem

by Neal Stephenson  · 25 Aug 2009  · 1,087pp  · 325,295 words

@War: The Rise of the Military-Internet Complex

by Shane Harris  · 14 Sep 2014  · 340pp  · 96,149 words

This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers

by Andy Greenberg  · 12 Sep 2012  · 461pp  · 125,845 words

The Organized Mind: Thinking Straight in the Age of Information Overload

by Daniel J. Levitin  · 18 Aug 2014  · 685pp  · 203,949 words

Insane Mode: How Elon Musk's Tesla Sparked an Electric Revolution to End the Age of Oil

by Hamish McKenzie  · 30 Sep 2017  · 307pp  · 90,634 words

Web Scraping With Python: Collecting Data From the Modern Web

by Ryan Mitchell  · 14 Jun 2015  · 255pp  · 78,207 words

When Things Start to Think

by Neil A. Gershenfeld  · 15 Feb 1999  · 238pp  · 46 words

Raw Data Is an Oxymoron

by Lisa Gitelman  · 25 Jan 2013

Brexit, No Exit: Why in the End Britain Won't Leave Europe

by Denis MacShane  · 14 Jul 2017  · 308pp  · 99,298 words

The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win

by Gene Kim, Kevin Behr and George Spafford  · 14 Jul 2013  · 395pp  · 110,994 words

AIQ: How People and Machines Are Smarter Together

by Nick Polson and James Scott  · 14 May 2018  · 301pp  · 85,126 words

Recoding America: Why Government Is Failing in the Digital Age and How We Can Do Better

by Jennifer Pahlka  · 12 Jun 2023  · 288pp  · 96,204 words

Battle for the Bird: Jack Dorsey, Elon Musk, and the $44 Billion Fight for Twitter's Soul

by Kurt Wagner  · 20 Feb 2024  · 332pp  · 127,754 words

The Mysterious Mr. Nakamoto: A Fifteen-Year Quest to Unmask the Secret Genius Behind Crypto

by Benjamin Wallace  · 18 Mar 2025  · 431pp  · 116,274 words

The Code Book: The Science of Secrecy From Ancient Egypt to Quantum Cryptography

by Simon Singh  · 1 Jan 1999

Pattern Breakers: Why Some Start-Ups Change the Future

by Mike Maples and Peter Ziebelman  · 8 Jul 2024  · 207pp  · 65,156 words

Cuckoo's Egg

by Clifford Stoll  · 2 Jan 1989  · 440pp  · 117,978 words

Team Topologies: Organizing Business and Technology Teams for Fast Flow

by Matthew Skelton and Manuel Pais  · 16 Sep 2019

Spam Nation: The Inside Story of Organized Cybercrime-From Global Epidemic to Your Front Door

by Brian Krebs  · 18 Nov 2014  · 252pp  · 75,349 words

Network Security Through Data Analysis: Building Situational Awareness

by Michael S Collins  · 23 Feb 2014  · 446pp  · 102,421 words

Intrusion Detection With Snort, Apache, Mysql, Php, and Acid

by Rafeeq Ur Rehman  · 7 May 2003  · 257pp  · 64,973 words

Digital Bank: Strategies for Launching or Becoming a Digital Bank

by Chris Skinner  · 27 Aug 2013  · 329pp  · 95,309 words

The Start-Up of You: Adapt to the Future, Invest in Yourself, and Transform Your Career

by Reid Hoffman and Ben Casnocha  · 14 Feb 2012  · 176pp  · 55,819 words

The Future of Technology

by Tom Standage  · 31 Aug 2005

Days of Fire: Bush and Cheney in the White House

by Peter Baker  · 21 Oct 2013

Bold: How to Go Big, Create Wealth and Impact the World

by Peter H. Diamandis and Steven Kotler  · 3 Feb 2015  · 368pp  · 96,825 words

Stake Hodler Capitalism: Blockchain and DeFi

by Amr Hazem Wahba Metwaly  · 21 Mar 2021  · 80pp  · 21,077 words

Gaza: An Inquest Into Its Martyrdom

by Norman Finkelstein  · 9 Jan 2018  · 578pp  · 170,758 words

Nuclear War: A Scenario

by Annie Jacobsen  · 25 Mar 2024  · 444pp  · 105,807 words

Enshittification: Why Everything Suddenly Got Worse and What to Do About It

by Cory Doctorow  · 6 Oct 2025  · 313pp  · 94,415 words

Apple in China: The Capture of the World's Greatest Company

by Patrick McGee  · 13 May 2025  · 377pp  · 138,306 words

Coding Freedom: The Ethics and Aesthetics of Hacking

by E. Gabriella Coleman  · 25 Nov 2012  · 398pp  · 107,788 words

Python Web Penetration Testing Cookbook

by Cameron Buchanan, Terry Ip, Andrew Mabbitt, Benjamin May and Dave Mound  · 28 Jun 2015  · 224pp  · 45,431 words

Team of Teams: New Rules of Engagement for a Complex World

by General Stanley McChrystal, Tantum Collins, David Silverman and Chris Fussell  · 11 May 2015  · 409pp  · 105,551 words

Becoming Data Literate: Building a great business, culture and leadership through data and analytics

by David Reed  · 31 Aug 2021  · 168pp  · 49,067 words

The Great Tax Robbery: How Britain Became a Tax Haven for Fat Cats and Big Business

by Richard Brooks  · 2 Jan 2014  · 301pp  · 88,082 words

Culture Warlords: My Journey Into the Dark Web of White Supremacy

by Talia Lavin  · 14 Jul 2020  · 231pp  · 71,299 words

The Unclaimed: Abandonment and Hope in the City of Angels

by Pamela Prickett and Stefan Timmermans  · 11 Mar 2024  · 405pp  · 113,895 words

Bitcoin Billionaires: A True Story of Genius, Betrayal, and Redemption

by Ben Mezrich  · 20 May 2019  · 304pp  · 91,566 words

Programming Scala

by Unknown  · 2 Jan 2010  · 448pp  · 71,301 words

Political Ponerology (A Science on the Nature of Evil Adjusted for Political Purposes)

by Andrew M. Lobaczewski  · 1 Jan 2006  · 396pp  · 116,332 words

The Radium Girls

by Moore, Kate  · 17 Apr 2017

SAM: One Robot, a Dozen Engineers, and the Race to Revolutionize the Way We Build

by Jonathan Waldman  · 7 Jan 2020  · 277pp  · 91,698 words

Searches: Selfhood in the Digital Age

by Vauhini Vara  · 8 Apr 2025  · 301pp  · 105,209 words

Big Bang

by Simon Singh  · 1 Jan 2004  · 492pp  · 149,259 words

Kings of Crypto: One Startup's Quest to Take Cryptocurrency Out of Silicon Valley and Onto Wall Street

by Jeff John Roberts  · 15 Dec 2020  · 226pp  · 65,516 words

Think Like a Freak

by Steven D. Levitt and Stephen J. Dubner  · 11 May 2014  · 240pp  · 65,363 words

The Evolution of Everything: How New Ideas Emerge

by Matt Ridley  · 395pp  · 116,675 words

Bitcoin Internals: A Technical Guide to Bitcoin

by Chris Clark  · 16 Jun 2013  · 52pp  · 13,257 words

Google AdWords

by Anastasia Holdren  · 4 Nov 2011

Korea--Culture Smart!

by Culture Smart!  · 15 Jun 201  · 124pp  · 37,476 words

The World According to Physics

by Jim Al-Khalili  · 10 Mar 2020  · 198pp  · 57,703 words

Mastering Ember.js

by Mitchel Kelonye  · 19 Oct 2014  · 266pp  · 38,397 words