Jeffrey D. Simon tells the gripping story of the forgotten terrorist group the
Galleanists, a fiery brand of Italian anarchists in the United States during
the early 1900s, many of whose tactics are still used today.
Few social historians had examined the popular religious beliefs of the 1500s
at the time Thomas published Religion and the Decline of Magic in 1971. His
analysis of how deeply held beliefs in witchcraft, spirits, and magic evolved
during the Reformation remains one of the great works of post-war scholarship.
First history of 'real' fairies sighted throughout history as recorded in
historical sources, by the world's two leading fairy historians. Historical
fairies are not sweet like Tinkerbell but mostly dangerous and best avoided.
iCon takes a look at the most astounding figure in a business era noted for its mavericks, oddballs, and iconoclasts. Drawing on a wide range of sources, Jeffrey Young and William Simon provide new perspectives on the legendary creation of Apple, detail Jobs’s meteoric rise, and the devastating plunge that left him not only out of Apple, but out of the computer-making business entirely. This unflinching and completely unauthorized portrait reveals both sides of Jobs’s role in the remarkable rise of the Pixar animation studio, also re-creates the acrimony between Jobs and Disney’s Michael Eisner, and examines Jobs’s dramatic his rise from the ashes with his recapture of Apple. The authors examine the takeover and Jobs’s reinvention of the company with the popular iMac and his transformation of the industry with the revolutionary iPod. iCon is must reading for anyone who wants to understand how the modern digital age has been formed, shaped, and refined by the most influential figure of the age–a master of three movies, music, and computers.
Hacker extraordinaire Kevin Mitnick delivers an explosive follow-up to his bestselling work, focusing on aiding businesses and governments in combating data thieves and cybervandals. In his previous book, Mitnick illustrated how savvy hackers use "social engineering" to breach even the most secure systems through fictionalized case studies. Now, he presents real-life stories of computer break-ins, revealing how victims could have prevented these incidents. Mitnick's credibility within the hacker community allowed him to gain insights from the perpetrators, sharing their exploits for the first time. Among the stories are a group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines, two teenagers manipulated by terrorists to hack Lockheed Martin's systems, convicts who became hackers inside a Texas prison, and a "Robin Hood" hacker who accessed prominent companies' systems and informed them of their vulnerabilities. With gripping descriptions of actual break-ins, essential security tips for professionals, and Mitnick's sharp commentary, this book is poised to capture a broad audience, drawing interest from law enforcement and the media alike.
The world's most infamous hacker provides an insider's perspective on low-tech threats to high-tech security. Kevin Mitnick's exploits as a fugitive led to one of the most extensive FBI manhunts in history, inspiring numerous articles, films, and documentaries. Since his release from prison in 1998, he has transformed his life and become a highly sought-after computer security expert. In this work, Mitnick emphasizes the human factors in information security, arguing that firewalls and encryption alone cannot thwart a determined grifter or a disgruntled employee. Through captivating true stories of successful attacks on businesses and government, he demonstrates the vulnerability of even the most secure systems to a skilled con artist posing as an authority figure. By narrating from both the attackers' and victims' perspectives, he reveals the reasons behind each attack's success and how they could have been avoided, all in an engaging style reminiscent of true crime. Most importantly, Mitnick offers practical advice for preventing social engineering hacks through effective security protocols, training programs, and manuals that focus on the human element of security.
From the inception of game-changing products like the Apple II and the Macintosh, to his fall from grace, and his rebirth at the helm of Apple as he developed the iPod, iPhone and iPad, this title presents Steve Jobs' leadership challenges and triumphs, showing readers how to apply these principles to their lives and careers.