top of page

BOOKS

Kindle Cover.jpg

"A wise and easy-to-read manual for thriving in Ivy admissions and beyond.

Huang presents a how-to guide for college-bound students applying to Ivy League schools.

From the introduction, the author makes it clear that his book is aimed at prospective university students who wish to “present themselves in their best, most brilliant light without coming across as egotistical, entitled, or just unpleasant to be around.” In a separate letter to parents, he notes that the Ivy League schools aren’t a good fit for everyone, and that he won’t be providing the typical recommendations for extracurriculars and AP classes that other guides do.

 

What Huang offers instead is the perspective of an admission reader—the “tired, overworked, bleary-eyed” person speed-reading through digital records of thousands of students. Given the nature of modern-day admissions, he advises teens to start early by developing their “personal brand,” ensuring that their actions and choices reflect the persona they wish to convey in essays, resumés, and recommendation letters. In the book’s second section, Huang breaks down his advice into easily applicable “tactics, techniques, and procedures.”

 

Throughout, his tone is honest, sometimes hard-nosed, and intended for the student (or parent) who wants to understand how the process really works. Huang offers personal anecdotes about former clients he’s helped, including a student who applied to the top 17 schools in the United States and had to create a spreadsheet to keep track of the 57 supplemental essays they had to write as a result: “We identified 13 major themes, and then sorted the 57 essays into their respective themes….In several cases we were able to reduce, reuse, and recycle.”

 

This focus on direct, practical advice, taken from experience, effectively extends beyond the college application process. Reflecting on the benefits of having a job as a teenager, he advises, “If you are working at a retail store, pay attention to how it runs so you could be qualified to manage the store, don’t just clock in and clock out.” In the end, the book not only prepares one for acceptance into top colleges, but also provides tools for succeeding in the larger world."

-- Kirkus Reviews

PDF Cover Front 7x10 copy.jpg

"... Huang and Menders wrote a manual that “gets right to the point,” with the style set to continue how “Practical Cyber Security” had a plethora of resources, examples, websites, a term glossary, and more — all to further illustrate the material of the chapters."

-- U.S.1 News

It’s time to regain control of your privacy.


Since you are reading this description, we are going to infer that you have been thinking about privacy issues, likely your own but perhaps also that of people whom you care about.

GET LOST: Personal Privacy Strategies for Extremely Busy People provides a comprehensive framework to give you significant control over your privacy, what information you choose to share with the outside world, and what information you choose to keep secure and protected. GET LOST provides concise and actionable tactics, techniques, and procedures that you can employ right now to protect yourself.

Filled with concise, easy-to-follow instructions and helpful visuals, learn how to protect yourself from threat actors including stalkers, criminals, online harassers and trolls, as well as the highly-invasive companies and interest groups that seek to profit from your information.

There are invisible threats to our privacy that every person should be aware of, such as governments, criminals, interest groups, and a wide spectrum of for-profit industries and companies. More directly and immediately, extreme personal privacy may be fundamentally necessary to protect lives from abusive former partners, disgruntled employees, stalkers, internet trolls, or any other number of focused and determined threat actors that may seek to inflict personal harm.

Companion Courses banner.png
Kindle 7x10 LR.jpg

For every working professional, it’s important to balance the demands of their income-generating, outward-facing, social persona against their irreplaceable, valuable private life. 


Whether you are a rising associate or a C-level executive, separating and insulating your personal life from your public one is critically important so you can protect yourself, your loved ones, and the many non-work aspects of your life that you hold dear and precious. After all, what’s the point of working so hard on our careers if we allow the personal aspects of our life to be harmed, violated, or exploited?
 

Personal Privacy for Professionals provides actionable strategies and practical tactics you can employ to protect your private life immediately.
 

Regardless of why, how, or when it occurs, we do know for a fact that victims never expect it to happen and are often blindsided when their privacy does get violated.
 

We want to prevent that from happening to you.
 

Personal Privacy for Professionals covers both your physical world privacy and online privacy with clear, easy-to-understand directions that you can begin employing immediately. We intentionally avoid jargon or lengthy technical discussions and instead get to the guts of the matters fast.

Amazon Link.jpg
Companion Courses banner.png
Snapshot v1 copy.png
Casebook v1 Front LR.jpg

"NOWHERE TO HIDE: Open Source Intelligence Gathering by Daniel Farber Huang is fairly recent, and shows the FBI’s investigative and OSINT techniques used to pursue the hundreds of thousands of leads the FBI received from the general public after the Capitol riots. NOWHERE TO HIDE is filled with real world case studies, specific resources and practical “how to” guides to equip both beginner and seasoned OSINT investigators with the right tools for their OSINT toolboxes."

-- OSINT Central

Reviews:

 

OSINT Central: Recommended OSINT Books

 

FeedSpot: 25 Best OSINT Blogs and Websites

NOWHERE TO HIDE: Open Source Intelligence Gathering provides practical insight into the investigative tools and open source intelligence gathering (commonly known as “OSINT”) used by law enforcement, the media, and the general public to identify individuals involved in the events of January 6, 2021, at the U.S. Capitol Building in Washington, DC.

NOWHERE TO HIDE retraces the FBI’s investigative techniques – some using cutting-edge technology and others using old fashioned, knocking-on-doors detective work – used to pursue the hundreds of thousands of leads received from the general public. NOWHERE TO HIDE is filled with real world case studies, specific resources and practical “how to” guides to equip both beginner and seasoned OSINT investigators with the right tools for their OSINT toolboxes.

This insightful volume includes 36 case studies that follow the FBI’s investigations of individual persons of interest, including the tactics, techniques, and procedures used by law enforcement, the media, and public sleuths to track down, identify, and – most importantly – verify the identities of suspected rioters. Learn how the FBI sifted through hundreds of thousands of leads, false positives, dead ends, as well as numerous unexpected leads to perform their investigations.

NOWHERE TO HIDE provides vivid context around the events of January 6, 2021, at the U.S. Capitol Building in Washington, DC, which left five people – one police officer and four protestors – dead by the end of the assault.

Effective OSINT research requires a combination of technical knowledge to find the Who, What, When, Where, and How threads of data and information as well as taking into account our unpredictable human nature that sometimes leads us to do the things we do (the Why). OSINT is both science and art. NOWEHERE TO HIDE provides practical, actionable information to help both novice and expert investigators, researchers, advocates, and journalists navigate and penetrate OSINT resources to find the information and evidence they seek.

Full Cover 2024 Front v1.jpg

Reviews:

Book Authority: 20 Best New Cyber Books to Read in 2022

 

Book Authority: 18 Best New Cyber Security Books to Read in 2021

 

Sonic Wall: The Top 12 Cybersecurity Books

 

Whats My IP Address: The Best Cybersecurity Books to Read in 2021

 

Zero Day Snoop: Cyber Security Reads

Simply put, this book was written for You. You’re busy. This guidebook is written clearly and concisely to get to the point to help protect every person who uses a computer, mobile phone or tablet. Cyber security is not only about protecting governments or companies from spies. It’s so much more, and also so much more personal. Cyber security is about:
 

  1. stopping trolls from stealing you or your loved one’s intimate photos and posting them online without your consent,

  2. protecting your family from bullies, predators, and stalkers,

  3. stopping thieves from draining your bank accounts or stealing your identity,

  4. preventing companies from secretly tracking you because they want to make money off of you,

  5. securing your home WiFi so hackers can’t steal your valuable personal information,

  6. creating safeguards to protect your expensive physical devices and the precious data within,

  7. stopping scammers from damaging both your home life and your career, and

  8. much, much more that protects innocent victims from online crime.


Millions of people continue to work remotely or go to school either partially or completely to fulfill their responsibilities. The need for individuals to take proactive steps for personal cyber security is more important than ever.

This guidebook will help aware individuals like yourself make actionable steps to protect you, those you care about, and your career from cyber threats and online exploitation. Real-life case studies will bring you into the mindset of both cyber criminals and victims to help you protect what’s most important and valuable to you. Included throughout the book are screenshots and informative graphics to provide a clearer picture of instructions, websites and apps that you may consider using. The intention is to make the cyber security steps you personally take less intimidating, more transparent, and more efficient. After reading Practical Cyber Security for Extremely Busy People, you’ll know what to do and how to do it.

bottom of page