You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A “brisk and interesting” exploration of exposing misconduct in America—from the Revolutionary War era to the Trump years (Jill Lepore, The New Yorker). PROSE Award winner in the Government, Policy and Politics category Misconduct by those in high places is always dangerous to reveal. Whistleblowers thus face conflicting impulses: by challenging and exposing transgressions by the powerful, they perform a vital public service—yet they always suffer for it. This episodic history brings to light how whistleblowing, an important but unrecognized cousin of civil disobedience, has held powerful elites accountable in America. Analyzing a range of whistleblowing episodes, from the corrupt Re...
Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges Humankind’s efforts to explain the origin of the cosmos birthed disciplines such as physics and chemistry. Scientists conceived of the cosmic ‘Big Bang’ as an explosion of particles—everything in the universe centered around core elements and governed by laws of matter and gravity. In the modern era of digital technology, we are experiencing a similar explosion of ones and zeros, an exponentially expanding universe of bits of data centered around the core elements of speed and connectivity. One of the disciplines to emerge from our efforts to make...
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East, including cyber attacks that result in the physical destruction of the target and the pairing of cognitive with maneuver warfare. Inside Cyber Warfare features an exclusive deep dive into the wartime operations of an offensive cyber unit of Ukraine's Ministry of Defense as it works to defend the nation against Russian forces, p...
You make critical strategic and leadership decisions in real-time. You need clear, concise, timely information to meet goals, improve performance, and increase profitability. With threats, technology, and competition changing the game at cyber-speed you, as a corporate leader and strategist, are constantly faced with life-or-death business challenges. Leading international military strategists who have learned survival lessons the hard way on the front lines and yet emerged victoriously can be your guides to winning strategies. The Corporate Warrior is a practical book loaded with direct, actionable strategies. Thanks to James Farwell's direct relationships and experiences working with these well-known military leaders, you will learn powerful strategies and tactics to enable your enterprise to confront insurmountable challenges and conquer competition while winning valuable customer recognition and support for your brand!
The author found himself in places and times to closely observe significant events and noteworthy personalities in 20th century science. Variously, he interacted with such notables as Richard Feynman, S. Chandrasekhar, Edward Teller, Ya. B. Zel'dovich, John Wheeler, James Watson, Julian Schwinger, Fred Hoyle, Martin Rees, Stephen Hawking, Freeman Dyson, Ed Witten, and many others. His Ph.D. advisor, Kip Thorne, and his Ph.D. student, Adam Riess, each won Nobel Prizes-for discoveries that he helped them start. Later, he worked with (or for) not just scientists, but also technology capitalists and billionaires, admirals and generals, and political leaders including two U.S. presidents. His memoir is rich in stories about these people and events.
Like most aspects of modern existence, more and more of our financial lives have migrated to the digital realm. With the benefits of ease that our Internet allows us, that transition also raises numerous – and dangerous – threats to national security, our money, and the systems we use to store and transfer it. In TheUnhackable Internet, financial services and technology expert Thomas P. Vartanian exposes the vulnerabilities of the many networks that we rely on today as well as the threats facing the integrity of our national security and financial services sector. From cyberattacks by foreign adversaries like China and Russia, the explosion of cryptocurrency, the advancement of ransomwar...
"State sponsored hacktivism" constitutes a wholly new alternative to conventional armed conflict. This book explores the ethical and legal dimensions of this "soft" mode warfare grounded in a broad revisionist approach to military ethics and "just war theory" that results in a new code of ethics for today's "cyber warriors."
A riveting account of espionage for the digital age, from one of America’s leading intelligence experts Spying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution ...
Grime music has been central to British youth culture since the beginning of the 21st century. Performed by MCs and DJs, it is an Afrodiasporic form that developed on street corners, on pirate radio and at raves. Level Up: Live Performance and Creative Process in Grime Music offers the first long-form ethnographic study of grime practice; it questions how and why artists do what they do; and it asks what this can tell us about creative process and improvisation more widely. Based on research conducted in London’s grime scene—facilitated by the author’s long-standing role as a DJ and broadcaster—this book explores the form’s emergence before taking a magnifying glass to the contemporary scene and its performance protocol, exploring the practice of key artists and their crews living and working in the city. The resultant model of creative interaction provides a comprehensive mapping of collective social learning in London’s informal cityscape, offering new ways to conceptualise improvisatory practice within ensembles.
Explore how cyberspace works, analyze how state and non-state actors exploit vulnerabilities, and discover ways to improve cybersecurity.