Book review

Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts

Author: Nitesh Dhanjani Pages: 296 Publisher: O'Reilly Media ISBN: 1491902337

A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.

Nitesh Dhanjani is a well known security researcher, author, and speaker. He is currently Executive Director, Cybersecurity, at Ernst & Young, where he advises C-suite executives at the largest Fortune 100 corporations on how to establish and execute complex multimillion-dollar cybersecurity programs.

Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World by Bruce Schneier

Norton, 2015 ISBN-13: 978-0393244816 ISBN-10: 0393244814

Within a remarkably short period of time-- less than two decades-- all of us have become immersed in a sea of electronic data collection. Our purchases, communications, Internet searches, and even our movements all generate collectible traces that can be recorded, packaged, and sold or exploited.

Before we have had a chance to collectively think about what this phenomenal growth in data production and collection means, and to decide what to do about it, it threatens to become an irreversible feature of our lives.

In his new book Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World (Norton, 2015), author and security technologist Bruce Schneier aims to forestall that outcome, and to help recover the possibility of personal privacy before it is lost or forgotten.

"Privacy is not a luxury that we can only afford in times of safety," he writes. "Instead, it's a value to be preserved. It's essential for liberty, autonomy, and human dignity."

Digital Forensics with Open Source Tools by Cory Altheide & Harlan Carvey

ISBN: 978-1-59749-586-8 Published April 2011 | Paperback | 270 pages ISBN: 978-1-59749-586-8 Published April 2011

Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools.

The book is a technical procedural guide, and explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. Both well known and novel forensic methods are demonstrated using command-line and graphical open source computer forensic tools for examining a wide range of target systems and artifacts.

Written by world-renowned forensic practitioners Covers open source forensic tools for all major systems: Windows, Mac and Linux Uses the most current examination and analysis techniques in the field (source: help net security)

Kingpin by Kevin Poulsen

Hardcover; 288 pages ISBN: 978-0-307-58868-5; www.Kingpin.cc

*Yeah, I gave it a dramatic blurb, but you know what? That book’s pretty darn good!

“Kevin Poulsen gets so close to these paranoid, shadowy people that you can smell the sweat on the keyboards and hear the handcuffs clack shut. No other book can match this intimate, expert portrait of a truly modern criminal underworld.” — Bruce Sterling, Hugo Award-winning novelist and futurist

“A fascinating depiction of a cybercriminal underworld frightening in its complexity and its potential for harm, and a society shockingly vulnerable to cybercrime. Poulsen renders the hacker world with such virtual reality that readers will have difficultly logging off until the very end.” — Publishers Weekly

The Shallows: How the Internet Is Changing the Way We Think, Read and Remember by Nicholas Carr

Hardcover; 288 pages ISBN: 978-0-307-58868-5; www.Kingpin.cc

*Yeah, I gave it a dramatic blurb, but you know what? That book’s pretty darn good!
“Kevin Poulsen gets so close to these paranoid, shadowy people that you can smell the sweat on the keyboards and hear the handcuffs clack shut. No other book can match this intimate, expert portrait of a truly modern criminal underworld.” — Bruce Sterling, Hugo Award-winning novelist and futurist
“A fascinating depiction of a cybercriminal underworld frightening in its complexity and its potential for harm, and a society shockingly vulnerable to cybercrime. Poulsen renders the hacker world with such virtual reality that readers will have difficultly logging off until the very end.” — Publishers Weekly

Mining the Social Web: Analyzing Data from Facebook, Twitter, LinkedIn, and Other Social Media Sites by Matthew A. Russell

Pages: 360; Publisher: O'Reilly; ISBN: 1449388345

The only way you could have missed the fact that the social networking boom has led to huge amounts of social data becoming available to knowledgeable searchers is if you haven't been using a computer and the Internet at all. This book will show you how to discover who's talking to whom, what about and where they are located in the real world - in short, how to mine useful data from the social networks, blogs and email.
About the author
Matthew Russell, Vice President of Engineering at Digital Reasoning Systems and Principal at Zaffra, is a computer scientist who is passionate about data mining, open source, and web application technologies.
Inside the book
If you pick up this book, it is very desirable that you know something about programming in general and programming in Python in particular, otherwise, I guarantee you, you won't understand most of what you are meant to. (help net security)

Rise of the Machines: A Cybernetic History by Thomas Rid

ISBN-13: 978-0393286007
ISBN-10: 0393286002

As lives offline and online merge even more, it’s easy to forget how we got here. Rise of the Machines reclaims the spectacular story of cybernetics, a control theory of man and machine. In a history that unpacks one of the twentieth century’s pivotal ideas, Thomas Rid delivers a thought-provoking portrait of our technology-enraptured era.