Security & Encryption

Dark Territory: The Secret History of Cyber War
Dark Territory: The Secret History of Cyber War

Review:Still reading the book but already found some errors that detract from my enjoyment of the material.

You'd think a book about cybersecurity would at least use a proofreader or editor that would know the difference between a silicon "die" and "dye".

They also clearly didn't get a good enough explanation of things like BGP and denial-of-service attacks. I found this disheartening. Read more

The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Review:The book is about digital anonymity. It starts with the very basic asks - strong passwords, securing your home network and the like. But soon gets on to things that most wouldn't even imagine. Burner phones are just a baffling idea.

Sites like DuckDuckGo, StartPage and ProtonMail are interesting tools that can be used. Features like pixel tracking, canvas fingerprinting allow online companies to know a lot about what you're doing on their site.

Reading about Tor was refreshing as I... Read more

What Everyone Needs to Know® - Cybersecurity and Cyberwar
What Everyone Needs to Know® - Cybersecurity and Cyberwar

Review:1-16-14. Having been a cybersecurity professional for over 20 years (long before it was called "cyber security") I am delighted to find a presentation that I can recommend to my non-technical family and friends who look at me with the "deer in the headlights" stare when I attempt to explain the complexities of the Internet and the security issues. The authors have gone to great lengths to simplify a very complicated topic and my "hat is off" to them. Nice job. Great book. Read more

A Concise History of the American People - The Unfinished Nation
A Concise History of the American People - The Unfinished Nation

Review:This was the first book I purchased from Amazon for school, and it came in great condition. I was thinking that purchasing a used book would be a result of a stinky, beat up horror, but I was surely wrong! Read more

Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition

Review:This is indeed an excellent book. I would surely recommend this book to anybody needing insights into different hacking methods. I am a graduate student in computer science and I don't think there are too many books on this subject out there that are better than this one. Read more

Queen of Scots to Quantum Cryptography - The Evolution of Secrecy from Mary
Queen of Scots to Quantum Cryptography - The Evolution of Secrecy from Mary

Review:There are a lot of books available on the subject of cryptography. For the non- technical, non-practitioner
I think this one may be the best (though, I certainly have not read them all). Its very readable and accessible.
Not boring. Read more

More information