Here are 79 books that Data and Goliath fans have personally recommended if you like
Data and Goliath.
Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.
I have been an information technology and cybersecurity professional for over two decades. I’ve learned over and over again that “people are the weakest link.” You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via “social engineering” – to trick a human being into giving you the access you need, rather than trying to hack the systemitself. The books on this list will help the reader lower their chances of being exploited like this.
Cybersecurity is Everybody’s Business is a great book that focuses not only on the how to keep your data safe, but on the very critical why this is important. Author Scott Schober suffered a grievous cyberattack in a previous business, and he brings his experience to the forefront in this guide. Joined by his brother as co-author, they focus on cybersecurity for the home and small business – environments that are unlikely to employ full-time cybersecurity professionals. (That’s why these places are often targets for the bad guys!)
Since publication of his first book, HACKED AGAIN, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes. Now joined by his brother Craig, the two have set their sights on the biggest target of all, small businesses.
There are 30 million small businesses currently operating in the United States. Some of them are single owner/operated while others collectively employ hundreds of millions. This book is for all of them and anyone who makes it their business to stay safe…
It is April 1st, 2038. Day 60 of China's blockade of the rebel island of Taiwan.
The US government has agreed to provide Taiwan with a weapons system so advanced that it can disrupt the balance of power in the region. But what pilot would be crazy enough to run…
I have been an information technology and cybersecurity professional for over two decades. I’ve learned over and over again that “people are the weakest link.” You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via “social engineering” – to trick a human being into giving you the access you need, rather than trying to hack the systemitself. The books on this list will help the reader lower their chances of being exploited like this.
This book focuses on cybersecurity for parents and teenagers, specifically focusing on social media. As a parent of a teenager myself, I know how critical this area really is. Teens are often using social networks and communication channels that their parents are mostly or completely unfamiliar with. Due to that lack of familiarity, parents have a hard time monitoring or setting appropriate limits on the ways their children use social media. Author Effie Manolas wrote this book for both parents and teens, enabling an open conversation on both the benefits and the risks of social media.
Do you feel your child isn’t using social media correctly?
Social media is a powerful platform that can either make the world better–or more dangerous. When a person doesn’t know how to use social media the right way, they can break relationships, disseminate false information, or even tarnish their own reputation.
As a parent, the last thing you want is for your child to be using social media in a way that can hurt them. But parents can hardly help their children if they themselves remain oblivious to the repercussions of their behavior on social media.
I have been an information technology and cybersecurity professional for over two decades. I’ve learned over and over again that “people are the weakest link.” You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via “social engineering” – to trick a human being into giving you the access you need, rather than trying to hack the systemitself. The books on this list will help the reader lower their chances of being exploited like this.
SafeCyberHome focuses on understanding how corporations and governments collect and use our personal data. The book also gives strategies for opting out of this data collection whenever possible. And, where it is not possible to opt-out, the book gives clear explanations on why we should be as restrictive with our personal data as possible. Vancannon uses an example similar to one from my own book: if someone is really determined to get your data, they will. But if they’re just looking for an easy target, and you’re not one, they’ll move on. Same reason you lock your front door – a determined master thief can defeat even the best lock, if they really want to – but do you want to make your house the easiest target on the block?
Online security and data privacy is one of the most pressing yet misunderstood issues of our time.
Today we use the internet to shop, work, learn, and be entertained. At the same time, we leave a trail that others can use to steal from us, assume our identity to commit crimes in our names, and hack our computers. If you ever felt helpless because governments and corporations can’t protect themselves with all their resources, then this book is for you. The vast majority of fraud and cybercrime can be stopped with basic knowledge about how your data is collected and…
A Duke with rigid opinions, a Lady whose beliefs conflict with his, a long disputed parcel of land, a conniving neighbour, a desperate collaboration, a failure of trust, a love found despite it all.
Alexander Cavendish, Duke of Ravensworth, returned from war to find that his father and brother had…
I have been an information technology and cybersecurity professional for over two decades. I’ve learned over and over again that “people are the weakest link.” You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via “social engineering” – to trick a human being into giving you the access you need, rather than trying to hack the systemitself. The books on this list will help the reader lower their chances of being exploited like this.
Kevin Mitnick is often called the “world’s most famous hacker,” and he spent years in prison for his crimes. However, he’s since reformed, and now advises individuals and corporations on how to protect their data. In this book, he talks about strategies that we can all use to better protect our data from exploitation by corporations and governments. Although it’s never possible to be truly “invisible” (despite the title of his book) he presents some great strategies to lower your risk profile.
Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and…
I am a scientist and technologist, trained in theoretical quantum physics, who became an Emeritus Professor of Network Technology from Oslo’s metropolitan university. I’ve strenuously tried to communicate the wonder of science to students and industry throughout my career. I’m also a long-standing fan of science fiction who grew up with heroes in both fact and fiction. The idea of future society has haunted me my whole life. I’m an optimist, who looks to the darker tales as warnings of futures we hope to avoid. Read these tales with a determination for us all to do better.
This book is not fiction, but rather a popular book about the direction of technology.
It was part of the original source inspiration for my own book. Written in 2003, it looked into the research about how mobile devices were beginning to change society, and redraw the lines to lead to modern tribalism. The book is now dated, as we have lived through twenty years of experience and much has changed.
Nevertheless, as a portrait of a moment in history, eminently readable, this book is an eye-opener.
How the convergence of mobile communications and computing is driving the next social revolution-transforming the ways in which people meet, mate, work, buy, sell, govern, and create. When Howard Rheingold sneaks off down an untrodden trail, everyone else follows. He is always onto something marvelous no one has seen before. An ever-considerate guide, he navigates this new world with ease, compassion, and grace, and gives you the inside story, with no punches pulled. Tech talk? Howard could get your mother to understand. }From Tokyo to Helsinki, Manhattan to Manila, Howard Rheingold takes us on a journey around the world for…
Ever since touching my first computer (the Apple IIC) in 1985, broadcasting a radio show in 1988, logging onto the world wide web in 1991, launching my first podcast in 2004 or producing the highly viewed YouTube show The Download in 2020 I've been interested in what Marshall McLuhan has dubbed, "The Medium is the Message." Not only how media and technology are used but how it intersects with humanity, education, entertainment, marketing and popular culture to drive word of mouth. To me, marketing isn't just about the technology or the quantified metrics but about how it shapes long lasting impressions on people and leads to sustained behavioral change.
Shirky explained the fascination with how everyone becomes media long before TikTok was even a gleam in the eye of its founder Zhang Yiming. In this world that becomes louder, faster, and where attention is harder to come by we might think that it becomes every person for themselves. Not so. Communities become stronger and we enter the age of "We" rather than the age of "Me." A fascinating read on the power of organizations that don't rely on traditional organization hierarchies. If you want to know how good ideas spread in the 21st Century, this is a good book to read.
“A fascinating survey of the digital age . . . An eye-opening paean to possibility.” —The Boston Globe
“Mr. Shirky writes cleanly and convincingly about the intersection of technological innovation and social change.” —New York Observer
An extraordinary exploration of how technology can empower social and political organizers
For the first time in history, the tools for cooperating on a global scale are not solely in the hands of governments or institutions. The spread of the internet and mobile phones are changing how people come together and get things done—and sparking a revolution that, as Clay Shirky shows, is changing…
The Duke's Christmas Redemption
by
Arietta Richmond,
A Duke who has rejected love, a Lady who dreams of a love match, an arranged marriage, a house full of secrets, a most unneighborly neighbor, a plot to destroy reputations, an unexpected love that redeems it all.
Lady Charlotte Wyndham, given in an arranged marriage to a man she…
Joanne McNeil has written about internet culture for over fifteen years. Her book considers the development of the internet from a user's perspective since the launch of the World Wide Web. Her interest in digital technology spans from the culture that enabled the founding of major companies in Silicon Valley to their reception in broader culture.
Beginning with Stewart Brand’s influence through his projects like The Whole Earth Catalog, the WELL, and Wired magazine, this book examines the unique culture of Silicon Valley. An essential history and one that clarifies the tech industry’s seemingly contradictory values of revolution and corporate power.
In "From Counterculture to Cyberculture", Fred Turner details the previously untold story of a highly influential group of San Francisco Bay Area entrepreneurs: Stewart Brand and the Whole Earth network. Between 1968 and 1998, via such familiar venues as the National Book Award - winning "Whole Earth Catalog", the computer-conferencing system known as WELL, and, ultimately, the launch of the wildly successful Wired magazine, Brand and his colleagues brokered a long-running collaboration between San Francisco flower power and the emerging technological hub of Silicon Valley. Thanks to their vision, counterculturalists and technologists alike joined together to reimagine computers as tools…
I have worked in IT for over 25 years, creating and securing software. I am completely obsessed with ensuring that our software is more reliable, that its integrity can be trusted, and that it keeps our secrets safe. I am not only a computer scientist but an ethical hacker who works hard to create a dialogue between software developers and all of the people who work in our security industry. I am a teacher, a community leader, and a computer nerd who shares messages and lessons wherever she goes.
Accelerate is a book about data. The authors used data collected during their PhD projects in order to prove The DevOps is effective.
They have all sorts of different ways to measure DevOps, it sufficiency, and the fact that way more projects succeed when you do DevOps, rather than waterfall methodology.
The book essentially show can be used as evidence of return on investment when modernizing your IT department. I am a person who loves data, and thus I absolutely love this book. Also, if you listen to the audiobook version, one of the authors reads it to you and her personality really shines through in a fun way.
I really enjoyed listening to Nicole read a book about to me about data!
Accelerate your organization to win in the marketplace.
How can we apply technology to drive business value? For years, we've been told that the performance of software delivery teams doesn't matter that it can't provide a competitive advantage to our companies. Through four years of groundbreaking research to include data collected from the State of DevOps reports conducted with Puppet, Dr. Nicole Forsgren, Jez Humble, and Gene Kim set out to find a way to measure software delivery performance and what drives it using rigorous statistical methods. This book presents both the findings and…
I’m a professor of Chinese studies, and I’m especially interested in what the close study of culture can reveal about aspects of contemporary Chinese life that are usually dominated by the perspectives of historians, sociologists, anthropologists, and political scientists. I’m fascinated not so much by how cultural practices reflect social change but by how they sometimes make it happen, particularly in societies where overt political action is blocked. As my book picks show, I’m intrigued by the inventiveness and drive of people who create culture, often new forms of culture, under conditions of oppression, exploitation, and duress.
This book made a big impact on me because it shifts the study of culture in working-class China from familiar genres such as poetry to the vast domain of the digital.
Qiu argues that a working-class network society has taken firm shape in 21st-century China, made up of migrants, laid-off workers, retired people, young people, and small-scale entrepreneurs. In one sense, these people are the “information have-less” because they belong to the social classes typically on the wrong side of the digital divide.
But Qiu’s book shows that cheap internet access and extensive cell phone penetration in China have enabled the “have-less” to create class identity through their use of information technology. From community-building to memory-making, the book really nuanced my understanding of digital networks as a transformatively cultural force.
An examination of how the availability of low-end information and communication technology has provided a basis for the emergence of a working-class network society in China.
The idea of the “digital divide,” the great social division between information haves and have-nots, has dominated policy debates and scholarly analysis since the 1990s. In Working-Class Network Society, Jack Linchuan Qiu describes a more complex social and technological reality in a newly mobile, urbanizing China. Qiu argues that as inexpensive Internet and mobile phone services become available and are closely integrated with the everyday work and life of low-income communities, they provide a…
This book follows the journey of a writer in search of wisdom as he narrates encounters with 12 distinguished American men over 80, including Paul Volcker, the former head of the Federal Reserve, and Denton Cooley, the world’s most famous heart surgeon.
In these and other intimate conversations, the book…
I'm an author, advisor, speaker, podcaster, and citizen concerned about humanity’s relationship with advanced artificial intelligence. After following developments in AI for many years, I noticed a disconnect between the rapid rate of progress in AI and the public’s understanding of what was happening. The AI issue affects everyone, so I want everyone to be empowered to learn more about how AI will have a large impact on their lives. As a senior policy advisor and a member of the Board of Advisors for Canada's leading safety and governance network, books such as these help me stay informed about the latest developments in advanced artificial intelligence. I hope my recommendations will help you to critically consider how humans should co-exist with this revolutionary technology.
AI algorithms are increasingly used to decide what you see, if you’re hired, and who you match with socially or romantically.
There is much cause for concern because many of these algorithms are biased and return responses that indicate some degree of sexism or racism.
The main value of this book is that all those issues are recognized, but so is the notion that when an algorithm is biased, it is much easier to discover that and correct it than with a person.
Consequently, reforming algorithms likely presents a better option to reduce bias when people or things are sorted or assessed.
Much has been written about the challenges tech presents to equality and democracy. But we can either criticize big data and automation or steer it to do better. Lobel makes a compelling argument that while we cannot stop technological development, we can direct its course according to our most fundamental values.
With provocative insights in every chapter, Lobel masterfully shows that digital technology frequently has a comparative advantage over humans in detecting discrimination, correcting historical exclusions, subverting long-standing stereotypes, and addressing the world's thorniest problems: climate, poverty, injustice, literacy, accessibility, speech, health, and safety.