Definitive Guide to Squarespace

The Definitive Guide to Squarespace: Learn to Deliver Custom, Professional Web Experiences for Yourself and Your Clients

Published by Apress.com, 2017
By Sarah Martin

“Most up-to-date Squarespace book in the market to definitively cover every aspect of Squarespace development.”

“Teaches the principles of working with Squarespace’s tools and how to do advanced customizations not covered in any documentation.”

The Definitive Guide to Squarespace: Learn to Deliver Custom, Professional Web Experiences for Yourself and Your Clients Read More
Dawn of the Code War

Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat

“The inside story of how America’s enemies launched a cyber war against us-and how we’ve learned to fight back…”

Includes links to:

  • “The Lawfare Podcast: John Carlin on ‘Dawn of the Code War’“ by Jen Patja Howell. Saturday, November 24, 2018.

  • A discussion on responses to national security threats in cyberspace from the Department of Justice, featuring John P. Carlin, Former Assistant Attorney General, National Security Division; and John C. Demers, Assistant Attorney General, National Security Division, on Tuesday, January 15, 2019 at the Center for Strategic & International Studies.

  • John Carlin on “Stay Tuned with Preet” Dec. 4, 2018.

Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat Read More
Book Cover - Zucked

Zucked: Waking Up to the Facebook Catastrophe

“The New York Times bestseller about a noted tech venture capitalist, early mentor to Mark Zuckerberg, and Facebook investor, who wakes up to the serious damage Facebook is doing to our society – and sets out to try to stop it. “

Roger McNamee has been a Silicon Valley investor for 35 years. He co-founded successful funds in venture, crossover and private equity. His most recent fund, Elevation, included U2’s Bono as a co-founder. He holds a B.A. from Yale University and…

Zucked: Waking Up to the Facebook Catastrophe Read More
Data & Goliath

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

You are under surveillance right now.

Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you’re unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Read More
Secrets & Lies

Secrets & Lies: Digital Security in a Networked World

Welcome to the businessworld.com. It’s digital: Information is more readily accessible than ever. It’s inescapably connected: businesses are increasingly–if not totally–dependent on digital communications. But our passion for technology has a price: increased exposure to security threats. Companies around the world need to understand the risks associated with doing business electronically. The answer starts here.

Secrets & Lies: Digital Security in a Networked World Read More
Applied Cryptography

Applied Cryptography: Protocols, Algorithms, and Source Code in C

This second edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography — the technique of enciphering and deciphering messages — to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them in cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

Applied Cryptography: Protocols, Algorithms, and Source Code in C Read More

Hey Google, What’s a Moonshot?: How Silicon Valley Mocks Apollo

Communications of the ACM, January 2019
By Thomas Haigh

“Letting Silicon Valley steal the term “moonshot” for projects with quite different management styles, success criteria, scales, and styles of innovation hurts our collective ability to understand just what NASA achieved 50 years ago and why nothing remotely comparable is actually under way today at Google, or anywhere else.”

Hey Google, What’s a Moonshot?: How Silicon Valley Mocks Apollo Read More
Google Tech Talks

Hiding In Plain Sight – The Secret History of Silicon Valley

Presentation by Steve Blank, Dec. 2007 & Nov. 2008

Premise of “The Secret History of Silicon Valley” is that WWII was the First Electronic War and it was the wartime urgency combined with required secrecy to create systems to counter the threat of Nazi Germany that primarily lead to the development of what is known today as Silicon Valley. The point being that popular culture and history does not include this aspect in the history of Silicon Valley, but it is nonetheless important to know this history. Further, the projects that Mr. Blank outlines were conducted in plain sight.

Hiding In Plain Sight – The Secret History of Silicon Valley Read More

Tony’s Law

Communications of the ACM, February 2019
By Dror G. Feitelson

“Someone did not tighten the lid, and the ants got into the honey again. This can be prevented by placing the honey jar in a saucer of water, but it is a nuisance, occupies more counter space, and one must remember to replenish the water. So we try at least to remember to tighten the lid.

In the context of security, the software industry does not always tighten the lid. In some cases it fails to put the lid on at all, leaving the honey exposed and inviting.”

Tony’s Law Read More
The Real Super Tour, Photo: Kennan Harvey

The Real Super Tour

“A hard climbing philosopher, Josh is also a believer. “There’s nothing more pure and simple,” he states, “than launching into a big climb in the middle of winter. No other people, no mechanical sounds, no artificial colors; just rock and snow and breathing and the immensity of the mountains. A horizontal length of testy and mercurial ridgeline to be navigated before we can have some hot food and some rest. Doesn’t get much better than that.” It occurred to us that when you don’t have any protection, both ends of the rope are sharp, both partners are equal.”

The Real Super Tour Read More
I AM Dangerous (Danger, dangerous, stupid: Not all the same)

I AM Dangerous (Danger, dangerous, stupid: Not all the same)

Molly Absolon, writing for the Mountainside column of the Jackson Hole News & Guide, writes about being dangerous. She writes of her reaction to an essay that Drew Hardesty wrote titled “I AM Dangerous.” Drew Hardesty is a forecaster for the Utah Avalanche Center in the winter and a Grand Teton National Park climbing ranger in the summer. Drew had recently sent her an essay he’d written about danger. “The essay went on to explore the notion of danger, and, in the end, Drew embraced the idea that we are dangerous if we spend our lives in the mountains engaging in potentially risky behavior.”

I AM Dangerous (Danger, dangerous, stupid: Not all the same) Read More
13 Feet Deep: Lessons Learned from A Remarkable Companion Avalanche Rescue. Photo: Tim Banfield

13 Feet Deep: Lessons Learned from A Remarkable Companion Avalanche Rescue

“‘Little did I know what was coming,’ writes Tim Banfield in this eye-opening and brutally honest account of he and a partner’s successful rescue of a friend that was buried 13 feet deep in an avalanche. Banfield recounts this tale for one reason: to share what he learned from a truly remarkable avalanche rescue in the hope that this information can help save lives.”

13 Feet Deep: Lessons Learned from A Remarkable Companion Avalanche Rescue Read More