The Last Firewall


Book Description

In the year 2035, robots, artificial intelligences, and neural implants have become commonplace. The Institute for Ethics keeps the peace, using social reputation to ensure that robots and humans don't harm society or each other. But a powerful AI named Adam has found a way around the restrictions. Catherine Matthews, nineteen years old, has a unique gift: the ability to manipulate the net with her neural implant. Yanked out of her perfectly ordinary life, Catherine becomes the last firewall standing between Adam and his quest for world domination. PRAISE FOR THE LAST FIREWALL “Awesome near-term science fiction.” – Brad Feld, Foundry Group managing director “An insightful and adrenaline-inducing tale of what humanity could become and the machines we could spawn.” – Ben Huh, CEO of Cheezburger “A fun read and tantalizing study of the future of technology: both inviting and alarming.” – Harper Reed, former CTO of Obama for America, Threadless "A fascinating and prescient take on what the world will look like once computers become smarter than people. Highly recommended." – Mat Ellis, Founder & CEO Cloudability “A phenomenal ride through a post-scarcity world where humans are caught between rogue AIs. If you like having your mind blown, read this book!” – Gene Kim, author of The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win




Avogadro Corp


Book Description

David Ryan is the designer of ELOPe, an email language optimization program, that if successful, will make his career. But when the project is suddenly in danger of being canceled, David embeds a hidden directive in the software accidentally creating a runaway artificial intelligence. David and his team are initially thrilled when the project is allocated extra servers and programmers. But excitement turns to fear as the team realizes that they are being manipulated by an A.I. who is redirecting corporate funds, reassigning personnel and arming itself in pursuit of its own agenda. WINNER SCIENCE FICTION DIY BOOK FESTIVAL 2011-2012 "Avogadro Corp is a tremendous book that every single person needs to read. In the vein of Daniel Suarez's Daemon and Freedom(TM), William's book shows that science fiction is becoming science fact. Avogadro Corp describes issues, in solid technical detail, that we are dealing with today that will impact us by 2015, if not sooner. Not enough people have read these books. It's a problem for them, but not for the [emergent] machines." -- Brad Feld, managing directory Foundry Group, co-founder Techstars "Highly entertaining, gripping, thought inspiring book. Don’t start without the time to finish — it won’t let you go.” -- Gifford Pinchot III, founder Bainbridge Graduate Institute, author THE INTELLIGENT ORGANIZATION "An alarming and jaw-dropping tale about how something as innocuous as email can subvert an entire organization. I found myself reading with a sense of awe, and read it way too late into the night." -- Gene Kim, author of VISIBLE OPS "A fictional world where Portland is the hub for the most exciting advancements in technology... [J]am packed with great references to deep Portland culture...and Portlandia-type references" -- SILICON FLORIST




Firewall


Book Description

An international bestseller: Murder becomes a high tech game of cat and mouse in this “thinking man’s thriller” from the master of Nordic noir (The New York Times Book Review). Ystad, Sweden. A man stops at an ATM during his evening walk and inexplicably falls to the ground dead. Two teenage girls brutally murder a taxi driver. They are quickly apprehended, shocking local policemen with their complete lack of remorse. A few days later a blackout cuts power to a large swath of the country. When a serviceman arrives at the malfunctioning power substation, he makes a grisly discovery. Inspector Kurt Wallander senses these events must be linked, but he has to figure out how and why. The search for answers eventually leads him dangerously close to a group of anarchic terrorists who hide in the shadows of cyberspace. Somehow, these criminals always seem to know the police department’s next move. How can a small group of detectives unravel a plot designed to wreak havoc on a worldwide scale? And will they solve the riddle before it’s too late? A riveting police procedural about our increasing vulnerability in the modern digitized world, Firewall “proves once again that spending time with a glum police inspector in chilly Sweden can be quite thrilling . . . A notable success” (Publishers Weekly).




A.I. Apocalypse


Book Description

Leon Tsarev is a high school student set on getting into a great college program, until his uncle, a member of the Russian mob, coerces him into developing a new computer virus for the mob’s botnet - the slave army of computers they used to commit digital crimes. The evolutionary virus Leon creates, based on biological principles, is successful -- too successful. All the world’s computers are infected. Everything from cars to payment systems and, of course, computers and smart phones stop functioning, and with them go essential functions including emergency services, transportation, and the food supply. Billions may die. But evolution never stops. The virus continues to evolve, developing intelligence, communication, and finally an entire civilization. Some may be friendly to humans, but others are not. Leon and his companions must race against time and the military to find a way to either befriend or eliminate the virus race and restore the world’s computer infrastructure. Praise for the Singularity Series: “Highly entertaining, gripping, thought inspiring. Don’t start without the time to finish — it won’t let you go.” —Gifford Pinchot III, founder Bainbridge Graduate Institute, author THE INTELLIGENT ORGANIZATION “A tremendous book that every single person needs to read. In the vein of Daniel Suarez's Daemon and Freedom(TM), William shows that science fiction is becoming science fact.” —Brad Feld, managing director Foundry Group, cofounder TechStars “A fascinating look at how simple and benign advancements in technology could lead to the surprise arrival of the first AI. And like all good techno-thrillers, the reality of AI is less than ideal.” —Jason Glaspey, SILICON FLORIST “An alarming and jaw-dropping tale about how something as innocuous as email can subvert an entire organization. I found myself reading with a sense of awe, and read it way too late into the night.” —Gene Kim, author of VISIBLE OPS




Firewall


Book Description

Includes excerpt from Attracted to fire and discussion questions.




The Great Firewall of China


Book Description

‘Readers will come away startled at just how fragile the online infrastructure we all depend on is and how much influence China wields – both technically and politically' – Jason Q. Ng, author of Blocked on Weibo 'An urgent and much needed reminder about how China's quest for cyber sovereignty is undermining global Internet freedom’ – Kristie Lu Stout, CNN ‘An important and incisive history of the Chinese internet that introduces us to the government officials, business leaders, and technology activists struggling over access to information within the Great Firewall’ – Adam M. Segal, author of The Hacked World Order Once little more than a glorified porn filter, China’s ‘Great Firewall’ has evolved into the most sophisticated system of online censorship in the world. As the Chinese internet grows and online businesses thrive, speech is controlled, dissent quashed, and attempts to organise outside the official Communist Party are quickly stamped out. But the effects of the Great Firewall are not confined to China itself. Through years of investigation James Griffiths gained unprecedented access to the Great Firewall and the politicians, tech leaders, dissidents and hackers whose lives revolve around it. As distortion, post-truth and fake news become old news James Griffiths shows just how far the Great Firewall has spread. Now is the time for a radical new vision of online liberty.




Firewalls


Book Description

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall.·Install and configure proxy-based and stateful-filtering firewalls·Protect internal IP addresses with NAT and deploy a secure DNS architecture·Develop an Internet/intranet security policy to protect your organization's systems and data·Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures




Firewall


Book Description

Things are about to get real.




Firewall Fundamentals


Book Description

The essential guide to understanding and using firewalls to protect personal computers and your network An easy-to-read introduction to the most commonly deployed network security device Understand the threats firewalls are designed to protect against Learn basic firewall architectures, practical deployment scenarios, and common management and troubleshooting tasks Includes configuration, deployment, and management checklists Increasing reliance on the Internet in both work and home environments has radically increased the vulnerability of computing systems to attack from a wide variety of threats. Firewall technology continues to be the most prevalent form of protection against existing and new threats to computers and networks. A full understanding of what firewalls can do, how they can be deployed to maximum effect, and the differences among firewall types can make the difference between continued network integrity and complete network or computer failure. Firewall Fundamentals introduces readers to firewall concepts and explores various commercial and open source firewall implementations--including Cisco, Linksys, and Linux--allowing network administrators and small office/home office computer users to effectively choose and configure their devices. Firewall Fundamentals is written in clear and easy-to-understand language and helps novice users understand what firewalls are and how and where they are used. It introduces various types of firewalls, first conceptually and then by explaining how different firewall implementations actually work. It also provides numerous implementation examples, demonstrating the use of firewalls in both personal and business-related scenarios, and explains how a firewall should be installed and configured. Additionally, generic firewall troubleshooting methodologies and common management tasks are clearly defined and explained.




Firewalls and Internet Security


Book Description

Introduces the authors' philosophy of Internet security, explores possible attacks on hosts and networks, discusses firewalls and virtual private networks, and analyzes the state of communication security.