Jeffrey D. Simon tells the gripping story of the forgotten terrorist group the
Galleanists, a fiery brand of Italian anarchists in the United States during
the early 1900s, many of whose tactics are still used today.
"From Anders Breivik in Norway, who murdered scores of young people in a bombing and mass-shooting attack, to Omar Mateen, the Orlando killer who perpetrated the worst mass shooting in American history, lone wolves have demonstrated that they can be as dangerous as organized terrorist groups. Who are these terrorists and what can be done about them? An internationally renowned terrorism expert presents the first comprehensive treatment of this important issue. After delving into the diversity in motivations and backgrounds of lone wolf terrorists, Simon makes the following key points about this growing threat: lone wolves have proven to be more creative and dangerous than many terrorist groups; lone wolves are not just Islamist extremists but can be found among all types of political and religious ideologies; the Internet has provided the perfect breeding ground for isolated individuals with terrorist tendencies, but it may also prove to be their undoing; there are few women in this category, but this is likely to change in the coming years; and the common perception that nothing can be done about lone wolves is wrong. In fact, innovative strategies and policies can be developed to both prevent and respond to this type of terrorism. Drawing on his more than twenty-five years of experience studying terrorism, Simon has produced an insightful book that is essential reading for anyone concerned about the potential terrorist threats from violence-prone individuals in our midst. This paperback edition contains a new preface by the author, which reviews lone-wolf incidents since the publication of the original edition."--Publisher information
Few social historians had examined the popular religious beliefs of the 1500s
at the time Thomas published Religion and the Decline of Magic in 1971. His
analysis of how deeply held beliefs in witchcraft, spirits, and magic evolved
during the Reformation remains one of the great works of post-war scholarship.
Fairies are inextricably part of the British and Irish Isles and sightings go
back at least as far as the time of Shakespeare. Digitisation of local
historical records has suddenly opened up a treasure trove of new sightings
and information, which is gathered for the first time in this book
iCon takes a look at the most astounding figure in a business era noted for its mavericks, oddballs, and iconoclasts. Drawing on a wide range of sources, Jeffrey Young and William Simon provide new perspectives on the legendary creation of Apple, detail Jobs’s meteoric rise, and the devastating plunge that left him not only out of Apple, but out of the computer-making business entirely. This unflinching and completely unauthorized portrait reveals both sides of Jobs’s role in the remarkable rise of the Pixar animation studio, also re-creates the acrimony between Jobs and Disney’s Michael Eisner, and examines Jobs’s dramatic his rise from the ashes with his recapture of Apple. The authors examine the takeover and Jobs’s reinvention of the company with the popular iMac and his transformation of the industry with the revolutionary iPod. iCon is must reading for anyone who wants to understand how the modern digital age has been formed, shaped, and refined by the most influential figure of the age–a master of three movies, music, and computers.
Hacker extraordinaire Kevin Mitnick delivers an explosive follow-up to his bestselling work, focusing on aiding businesses and governments in combating data thieves and cybervandals. In his previous book, Mitnick illustrated how savvy hackers use "social engineering" to breach even the most secure systems through fictionalized case studies. Now, he presents real-life stories of computer break-ins, revealing how victims could have prevented these incidents. Mitnick's credibility within the hacker community allowed him to gain insights from the perpetrators, sharing their exploits for the first time. Among the stories are a group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines, two teenagers manipulated by terrorists to hack Lockheed Martin's systems, convicts who became hackers inside a Texas prison, and a "Robin Hood" hacker who accessed prominent companies' systems and informed them of their vulnerabilities. With gripping descriptions of actual break-ins, essential security tips for professionals, and Mitnick's sharp commentary, this book is poised to capture a broad audience, drawing interest from law enforcement and the media alike.