Coders: The Making of a New Tribe and the Remaking of the World

Coders: The Making of a New Tribe and the Remaking of the WorldFrom acclaimed tech writer Clive Thompson, a brilliant and immersive anthropological reckoning with the most powerful tribe in the world today, computer programmers where they come from, how they think, what makes for greatness in their world, and what should give us pause n nYou use software nearl

White-Hot Hack (Kate and Ian, #2)

White-Hot Hack (Kate and Ian, #2)Their love story began in Heart Shaped Hack Join Kate and Ian for the thrilling conclusion in White Hot Hack n nWhen cybercriminals doxed undercover hacker Ian Bradshaw and forced him to flee, he begged Kate Watts for forgiveness and vowed never to hurt her again He also convinced her to marry him,

Playing With Fire (#Hacker, #1)

Playing With Fire (#Hacker, #1)One brilliant young hacker n nOne experimental government aircraft n nOne chance to keep it all from going up in flames n nStill recovering from her troubled past, Farris is no stranger to change But when the military transfers her father across the country to an experimental aircraft squadron, settli

@War: The Rise of the Military-Internet Complex

@War: The Rise of the Military-Internet ComplexA surprising, page turning account of how the wars of the future are already being fought todayThe United States military currently views cyberspace as the fifth domain of warfare alongside land, air, sea, and space , and the Department of Defense, the National Security Agency, and the CIA all fi

Kill Process (Kill Chain, #1)

Kill Process (Kill Chain, #1)By day, Angie, a twenty year veteran of the tech industry, is a data analyst at Tomo, the world s largest social networking company by night, she exploits her database access to profile domestic abusers and kill the worst of them She can t change her own traumatic past, but she can save other wome

Black Dawn (Titan, #6)

Black Dawn (Titan, #6)Parker Black wants the one woman he shouldn t have his buddy s girl She s sweet and smart, but clueless about how deep Parker lives in Titan s virtual world Everything is controlled Chaos is mastered Black and white data and risk analysis That is the way he understands his world, how he plays h

Immoral Code

Immoral CodeFor Nari, aka Narioka Diane, aka hacker digital alter ego d0l0s, it s college and then a career at one of the big ones, like Google or Apple Keagan, her sweet, sensitive boyfriend, is happy to follow her wherever she may lead Reese is an ace aro visual artist with plans to travel the world Sa

Hacking with Smart Phones

Hacking with Smart PhonesAt a recent event I came across someone who had read both my previous books but was still unable to grasp anything about hacking The language and tasks discussed in my former books are very complex He asked me to write something basic that everyone can understand So, I thought to write about Hack

Threat Modeling: Designing for Security

Threat Modeling: Designing for SecurityThe only security book to be chosen as a Dr Dobbs Jolt Award Finalist since Bruce Schneier s Secrets and Lies and Applied Cryptography Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world Now, h

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing GuideRequiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end You will learn how to properly utilize and interpret the results of modern day hacking t

Zero Hour (Wired & Dangerous, #1)

Zero Hour (Wired & Dangerous, #1)The Fast and the Furious meets Mr Robot in USA Today bestselling author Megan Erickson s thrilling new romantic suspense series n nHacker extraordinaire Roarke Brennan lives each hour each breath to avenge his brother s murder His first move put together a team of the best coders he knows The

Hacking: The Art of Exploitation

Hacking: The Art of ExploitationA comprehensive introduction to the techniques of exploitation and creative problem solving methods commonly referred to as hacking It shows how hackers exploit programs and write exploits, instead of just how to run other people s exploits This book explains the technical aspects of hacking, in

The Girl Who Played with Fire (Millennium, #2)

The Girl Who Played with Fire (Millennium, #2)Part blistering espionage thriller, part riveting police procedural, and part piercing expos on social injustice, The Girl Who Played with Fire is a masterful, endlessly satisfying novel Mikael Blomkvist, crusading publisher of the magazine Millennium, has decided to run a story that will expose