Book 1

Bad Blood

Bad Blood

Vintage. 2018

NEW YORK TIMES BEST SELLER • NAMED ONE OF THE BEST BOOKS OF THE YEAR BY: NPR, The New York Times Book Review, Time, Wall Street Journal, Washington Post • The McKinsey Business Book of the Year The full inside story of the breathtaking rise and shocking collapse of Theranos, the one-time multibillion-dollar biotech startup founded by Elizabeth Holmes—now the subject of the HBO documentary The Inventor—by the prize-winning journalist who first broke the story and pursued it to the end. “The...

A Guide to Kernel Exploitation

A Guide to Kernel Exploitation

Elsevier. 2010

A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been patched, the foundational information provided will help hackers in writing a newer, better attack; or help pen...

Acid Test

Acid Test

Penguin. 2014

“A book that should start a long-overdue national conversation.” —Dave Barry With the F.D.A. agreeing to new trials to test MDMA (better known as Ecstasy) as a treatment for PTSD—which, if approved, could be available as a drug by 2021—Acid Test is leading the charge in an evolving conversation about psychedelic drugs. Despite their current illegality, many Americans are already familiar with their effects. Yet while LSD and MDMA have proven extraordinarily effective in treating anxiety...

Violent Python

Violent Python

Newnes. 2012

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using...

Popular Science

Popular Science

Popular Science gives our readers the information and tools to improve their technology and their world. The core belief that Popular Science and our readers share: The future is going to be better, and science and technology are the driving forces that will help make it better.