Here are 100 books that Code and Other Laws of Cyberspace fans have personally recommended if you like
Code and Other Laws of Cyberspace.
Book DNA is a community of 12,000+ authors and super readers sharing their favorite books with the world.
I am a professor of International Communication at Tel Aviv University. I am fascinated by the complex relationship between information and power. In my studies I often use cross-national comparisons to understand how information helps us to develop identities and cultures. I am also very interested in technology: What are the latest technological developments? How do people use them to gain power? What are the consequences of technology use on our lives? In my books, I try to share this passion with the readers and address these questions with the hope of making our world a more equal and peaceful place.
People often believe that algorithms are neutral. This book does a wonderful job of showing that this is a wrong belief. Through numerous examples it reveals how algorithms perpetuate and sometimes intensify racial and gender stereotypes.
I found this book to be very thought-provoking, particularly when it comes to the power of algorithms to deepen social inequalities. It presents a major problem that we increasingly face today, as people rely on AI algorithms, but it also offers some possible remedies through education and legislation.
A revealing look at how negative biases against women of color are embedded in search engine results and algorithms
Run a Google search for "black girls"-what will you find? "Big Booty" and other sexually explicit terms are likely to come up as top search terms. But, if you type in "white girls," the results are radically different. The suggested porn sites and un-moderated discussions about "why black women are so sassy" or "why black women are so angry" presents a disturbing portrait of black womanhood in modern society.
In Algorithms of Oppression, Safiya Umoja Noble challenges the idea that search…
It is April 1st, 2038. Day 60 of China's blockade of the rebel island of Taiwan.
The US government has agreed to provide Taiwan with a weapons system so advanced that it can disrupt the balance of power in the region. But what pilot would be crazy enough to run…
I am a professor of International Communication at Tel Aviv University. I am fascinated by the complex relationship between information and power. In my studies I often use cross-national comparisons to understand how information helps us to develop identities and cultures. I am also very interested in technology: What are the latest technological developments? How do people use them to gain power? What are the consequences of technology use on our lives? In my books, I try to share this passion with the readers and address these questions with the hope of making our world a more equal and peaceful place.
As promised by its title, this book indeed reveals the DNA of big tech companies. I learned about the strategies that helped them to rise to power and transform our economic and social landscape. It unveils their sophisticated manipulations that affect every aspect of our daily life. Reading this book changed the way I think about tech companies ever since!
For all that's been written about the Four over the last two decades, no one has captured their power and staggering success as insightfully as Scott Galloway.
Instead of buying the myths these compa nies broadcast, Galloway asks fundamental questions. How did the Four infiltrate our lives so completely that they're almost impossible to avoid (or boycott)? Why does the stock market forgive them for sins that would destroy other firms? And as they race to become the world's first trillion-dollar company, can anyone chal lenge them?
I am a professor of International Communication at Tel Aviv University. I am fascinated by the complex relationship between information and power. In my studies I often use cross-national comparisons to understand how information helps us to develop identities and cultures. I am also very interested in technology: What are the latest technological developments? How do people use them to gain power? What are the consequences of technology use on our lives? In my books, I try to share this passion with the readers and address these questions with the hope of making our world a more equal and peaceful place.
This book focuses on the story of the rise of Google. Reading it helped me realize how massive its influence is on our lives in every possible way.
One concept that particularly captured my attention was the “Database of Intentions.” By searching in Google, we feed its algorithms with our identity, wishes, and desires. Eventually, the algorithm is designed to predict or even tell us who we are and what we would like. Although it was written in 2006, the recent rise of AI technologies makes those claims relevant more than ever before.
The rise of Google is one of the most amazing stories of our time. Jumping into the search industry long after Yahoo!, AltaVista, Lycos, and other competitors, Google offered a radical new approach to search, redefined the idea of viral marketing, and in just seven years became the largest IPO in the history of Silicon Valley. Google's enormous impact straddles the worlds of technology, marketing, finance, media, culture, dating, job-hunting, and just about every other sphere of human interest. And no one is better qualified to explain this entire phenomenon than John Battelle, the acclaimed Silicon Valley journalist who co-founded…
A Duke with rigid opinions, a Lady whose beliefs conflict with his, a long disputed parcel of land, a conniving neighbour, a desperate collaboration, a failure of trust, a love found despite it all.
Alexander Cavendish, Duke of Ravensworth, returned from war to find that his father and brother had…
I am a professor of International Communication at Tel Aviv University. I am fascinated by the complex relationship between information and power. In my studies I often use cross-national comparisons to understand how information helps us to develop identities and cultures. I am also very interested in technology: What are the latest technological developments? How do people use them to gain power? What are the consequences of technology use on our lives? In my books, I try to share this passion with the readers and address these questions with the hope of making our world a more equal and peaceful place.
I like this book because it offers a systematic account of the ways search engines affect our lives. From the way we organize our thoughts using search engines, through the economic sphere and the markets sphere to the political sphere, it analyzes in simple language various examples of how our lives have changed once search engines were introduced and become part of our daily lives.
Search engines have become a key part of our everyday lives. Yet there is growing concern with how algorithms, which run just beneath the surface of our interactions online, are affecting society. This timely new edition of Search Engine Society enlightens readers on the forms of bias that algorithms introduce into our knowledge and social spaces, drawing on recent changes to technology, industries, policies, and research. It provides an introduction to the social place of the search engine and addresses crucial questions such as:
How have search engines changed the way we organize our thoughts about the world, and how…
I became enthused about using mathematical models to understand the natural world as an undergraduate, got trained to do so, and spent my career working on a wide variety of applications. Most recently, I translated ideas from disease modeling to understand cyber variability and security.
To maximize success when applying mathematics to the natural or (for cyber) operational world, one needs to master the appropriate mathematical tools and have a deep knowledge of the subject matter. My recommendations are three really great books that will help you gain proficiency in the needed mathematical tools and how to apply them, and two equally great books on cyber systems.
This is one of two books (the other is Cyberspace in Peace and War) that I think anybody seriously interested in cyber security (which should be everybody) should have on their shelf.
It is filled with insights on a wide range of topics. I refer to it many times in my book, including why biology is a better metaphor for cyber defense than war, how people new to analytical thinking about cyber systems should approach the topic, the general meaning of cyber security, what it means for a cyber system to be resilient, and the need for operational cyber drills (analogous to experiments in biology).
The writing in this book is accessible, and it is both fun to read and really informative.
Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear…
Being able to understand and change reality through our knowledge and skill is literal magic. We’re building systems with so many exciting and unexpected properties that can be exploited and repurposed for both good and evil. I want to keep some of that magic and help people engineer – build great systems that make people’s lives better. I’ve been securing (and breaking) systems, from operating rooms to spaceships, from banks to self-driving cars for over 25 years. The biggest lesson I’ve learned is that if security is not infused from the start, we’re forced to rely on what ought to be our last lines of defense. This list helps you infuse security into your systems.
When I worked in application security at Microsoft, we still had products that shipped every few years. I learned to scale application security in that world, but many people live in a different world now. AAS helped me understand which of our approaches translated well, which had to be transformed, and which needed to be discarded or replaced. I regularly refer back to it, even a few years later.
Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of agile development. To help bridge the divide between these two worlds, this practical guide introduces several security tools and techniques adapted specifically to integrate with agile development.
Written by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences with…
The Duke's Christmas Redemption
by
Arietta Richmond,
A Duke who has rejected love, a Lady who dreams of a love match, an arranged marriage, a house full of secrets, a most unneighborly neighbor, a plot to destroy reputations, an unexpected love that redeems it all.
Lady Charlotte Wyndham, given in an arranged marriage to a man she…
I am an information architect, writer, and community organizer on a mission to make information architecture education accessible to everybody. I started practicing IA in pure pursuit of stronger visual design, but in the two decades since have developed an insatiable appetite for understanding and teaching the practical skills that make people better sensemakers, regardless of their role or medium. The books I chose for this list are all foundational to me becoming the sensemaker that I am today. I offer them as suggestions because they are not the books you will find should you search for “Information Architecture” yet they have all become my go-to recommendations for helping others to strengthen their own sensemaking.
You might not think of excitement when you hear the words “Digital Governance” but I can assure you that this book is a real page-turner…especially if your job involves managing large-scale information messes. There is a special kind of chaos that only information and knowledge workers can understand and this book paints a picture so many of us have seen in practice but in a way that leaves the reader inspired to fight another day, instead of wallowing in a sea of information-induced self-pity.
I recommend this book because I have seen too many information architecture efforts die on the vine due to a lack of good governance. The frameworks and recommendations in this book mean I always have a playbook to hand to teams in need.
Few organizations realize a return on their digital investment. They’re distracted by political infighting and technology-first solutions. To reach the next level, organizations must realign their assets—people, content, and technology—by practicing the discipline of digital governance. Managing Chaos inspires new and necessary conversations about digital governance and its transformative power to support creativity, real collaboration, digital quality, and online growth.
I have worked in IT for over 25 years, creating and securing software. I am completely obsessed with ensuring that our software is more reliable, that its integrity can be trusted, and that it keeps our secrets safe. I am not only a computer scientist but an ethical hacker who works hard to create a dialogue between software developers and all of the people who work in our security industry. I am a teacher, a community leader, and a computer nerd who shares messages and lessons wherever she goes.
This book is set in the same universe as The Phoenix Project and The Unicorn Project, but it's at a new company named investments unlimited.
It's also a fictitious story, but with all brand new characters, and brand new problems! In this book they cover security much more deeply than any of the other previous books, talking about how compliance and audit can work together with the information security and DevOps teams.
They talk about common problems that I have faced in many organizations, and a lot of the stories feel so familiar I wonder if the authors have followed me around throughout my career.
Although of course they save the day in the end, there are many parts of the book where we're not quite sure if they're going to make it or not with various characters learning to see things in new ways, so that they can make…
In the vein of the bestselling The Phoenix Project and The Unicorn Project, Investments Unlimited radically rethinks how organizations can handle the audit, compliance, and security of their software systems-even in highly regulated industries. By introducing concepts, tools, and ideas to reimagine governance, Investments Unlimited catalyzes a more humane way to enable high-velocity software delivery that is inherently more secure.
Investments Unlimited, Inc. has accomplished what many other firms in their industry have failed to do: they have successfully navigated the transition from legacy ways of working to the digital frontier. With the help of DevOps practices, Investments Unlimited delivers…
I’ve spent more than a decade working on infrastructure, from my early days at LinkedIn, where we had to do a massive DevOps transformation to save the company, to co-founding Gruntwork, where I had the opportunity to work with hundreds of companies on their software delivery practices. From all of this, I can say the following with certainty: the DevOps best practices that a handful of the top tech companies have figured out are not filtering down to the rest of the industry. This is making the entire software industry slower, less effective, and less secure—and I see it as my mission to fix that.
This book felt like a chance to sit with a few experienced Ops people and hear their war stories.
The book is full of concrete, actionable learnings that are essential for running software, including operational requirements (e.g., configuration, draining, hot swaps, feature toggles, graceful degradation, etc.), software architecture (e.g., three-tier web service, four-tier web service, load balancing models etc.), scaling patterns (e.g., horizontal duplication, service splits, caching, etc.), resiliency patterns (software vs hardware resiliency, spare capacity, failure domains, etc.), and much more.
I loved being able to pick up decades of experience and hard-won knowledge by just flipping through a few pages of a book!
"There's an incredible amount of depth and thinking in the practices described here, and it's impressive to see it all in one place."
-Win Treese, coauthor of Designing Systems for Internet Commerce
The Practice of Cloud System Administration, Volume 2, focuses on "distributed" or "cloud" computing and brings a DevOps/SRE sensibility to the practice of system administration. Unsatisfied with books that cover either design or operations in isolation, the authors created this authoritative reference centered on a comprehensive approach.
Case studies and examples from Google, Etsy, Twitter, Facebook, Netflix, Amazon, and other industry giants are explained in practical ways that…
This book follows the journey of a writer in search of wisdom as he narrates encounters with 12 distinguished American men over 80, including Paul Volcker, the former head of the Federal Reserve, and Denton Cooley, the world’s most famous heart surgeon.
In these and other intimate conversations, the book…
I love computers, and especially computer systems. I’m interested in how different pieces of hardware and software, like processors, operating systems, compilers, and linkers, work together to get things done. Early in my career, as a software security tester, I studied how different components interacted to find vulnerabilities. Now that I work on compilers, I focus on the systems that transform source code into a running program. I’m also interested in how computer systems are shaped by the people who build and use them—I believe that creating safer, more reliable software is a social problem as much as a technical one.
One of the best ways to understand how software works is to study how it fails. When I was just starting my career in software security, I read this book to learn about binary exploits like buffer overflows. It’s been a long time since I’ve written a binary exploit, but digging into the nitty-gritty, low-level details of how software runs on a real system has helped with everything I’ve done as an engineer since.
A lot has changed since this book was published in 2008 (and running the accompanying Live CD has gotten trickier), but the fundamental concepts are as relevant as ever.
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a…