You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom, and even democracy itself. Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development of Tor, the most important privacy tool on the net, and helped build cyberweapons that advanced US security wi...
At age seventeen, Shawn Fanning designed a computer program that transformed the Internet into an unlimited library of free music. Tens of millions of young people quickly signed on, Time magazine put Fanning on its cover, and his company, Napster, became a household name. It did not take long for the music industry to declare war, one that has now engulfed the biggest entertainment and technology companies on the planet. ForAll the Rave, top cyberculture journalist Joseph Menn gained unprecedented access to Fanning, other key Napster and music executives, reams of internal e-mails, unpublished court records, and other resources. The result is the definitive account of the Napster saga, for ...
Although only seventh among the states in total number of slaves in 1860, and tenth in the number of slaveholders, Louisiana was fourth among the number of slaveholders with fifty or more slaves. Moreover, Louisiana ranked first among the states with slaveholders having 70, 100, and 200 slaves. Originally published in 1961, this fascinating thesis, based upon the returns for Louisiana of the United States Eighth Census of 1860, today serves as a thorough examination of the economic aspects of slavery in pre-Civil War Louisiana. Detailed tables for each of the then forty-eight parishes of the state (except Bienville Parish, for which no returns were available) provide such information as the names of the slaveholders and the number of slaves owned, as well as what crops were produced in what quantities.
In 2004, a California computer whiz named Barrett Lyon uncovered the identity of a hacker running major assaults on business websites. Without fully grasping the repercussions, he set on an investigation that led him into the heart of the Russian mob. Cybercrime was evolving. No longer the domain of small-time thieves, it had been discovered by sophisticated gangs. They began by attacking corporate websites but increasingly stole financial data from consumers and defense secrets from governments. While Barrett investigated the cutting edge of technology crime, the U.S. government struggled to catch up. Britain, however, was a different story. In the late 1990s, the Queen herself had declared...
Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first century’s signature form of organized crime. The word spread through the hacking underground like some unstoppable new virus: Someone—some brilliant, audacious crook—had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down...
This book is a reader-friendly treatment of the Joseph story--one of the most popular tales in the Bible. Instead of the usual interpretation as an Horatio Alger success story, the text proposes that we are presented with a cautionary tale of high achievement and the pursuit of success. In the context of the larger biblical narrative, Joseph's short-term success leads to the enslavement of his descendants and the centuries-long derailment of the destiny of the Children of Israel. The self-limiting nature of the pursuit of power is just one of the themes illuminated in this work.
"Writing in a clear and comprehensive writing style, [the authors] show how the U.S. political, social, and economic environments make disinformation believable to large numbers of people and difficult to stop or prevent." - Library Journal, Starred Review "Everyone, whether they work in the public sector or are private citizens, will find this book invaluable.” - Booklist, Starred Review Disinformation made possible by rapid advances in cheap, digital technology, and promoted by organized networks, thrives in the toxic political environment that exists within the United States and around the world. In Lies that Kill, two noted experts take readers inside the world of disinformation campai...
The “rollicking” (The Economist), “masterfully written” (The Washington Post) account of the crypto delusion, and how Sam Bankman-Fried and a cast of fellow nerds and hustlers turned useless virtual coins into trillions of dollars—hailed by Ezra Klein in The New York Times as one of the “Books That Explain Where We Are” FINALIST: the Edgar Award (Fact Crime), the Macavity Award (Nonfiction), the Porchlight Business Book Award • A BEST BOOK OF THE YEAR: The New York Times DealBook, The Washington Post, Los Angeles Times, Financial Times, The Globe and Mail, Irish Examiner, Morningstar, The Verge, Wired In 2021 cryptocurrency went mainstream. Giant investment funds were buying ...
How did digital media happen ? Through a unique approach to digital documents, and detailed intricate histories of illicit internet piracy networks, The Digital Culture Industry goes beyond the Napster creation myth and illuminates the unseen individuals, code and events behind the turn to digital media.
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to launch intrusions. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.