Book Reviews
Book Review: Cracking Codes with Python
With one last code modification, you’re in, and the contents of the vault are yours! Cracking Codes with Python is not quite about breaking into banks or pulling off elaborate heists, but ...
Book Review: " Go Set a Watchman (2011) by Harper Lee," Book Reviewed by Rick Howard, 1 August 2015
Executive SummaryIn Harper Lee’s Go Set a Watchman, Jean Louise Finch as a young woman discovers that racial tensions in the south are not as black and white as she thought they ...
Cybersecurity Canon Candidate Book Review: "Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats (2011)," by Will Gragido and John Pirc
Executive SummaryCybercrime and Espionage, published in 2011, is a book that was ahead of its time. The authors were pushing the envelope in terms of how the security community should think about ...
Book Review: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon (2014) by Kim Zetter
Executive SummaryOperation Olympic Games is the US military code name that refers to the first ever act of real cyber warfare. Many journalists have told bits and pieces of the story since ...
Book Review: Winning as a CISO (2005) by Rich Baich
Executive SummaryThe latest candidate for the cyber security canon is Rich Baich’s Winning as a CISO. The roles of the chief information officer (CIO), the chief security officer (CSO), and the chief ...
Book Review: Spam Nation: The Inside Story of Organized Cybercrime – from Global Epidemic to Your Front Door (2014) by Brian Krebs
Executive SummaryIn Spam Nation, Brian Krebs covers a key portion of our cyber security and cyber crime history: 2007–2013, that period when we started to learn about the Russian Business Network, bulletproof-hosting ...
Book Review: The Practice of Network Security Monitoring: Understanding Incident Detection and Response (2013) by Richard Bejtlich
Executive SummaryRichard Bejtlich is one of the most respected security practitioners in the community. If he publishes something, we should all take notice. In The Practice of Network Security Monitoring, Bejtlich provides ...
Book Review: Lexicon (2013) by Max Barry
Executive SummaryLexicon is an exciting story that is really about social engineering taken to the nth degree. It is not a cyber security canon candidate, however, because it does not meet the ...
Book Review: No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State (2014) by Glenn Greenwald
Executive SummaryNo Place to Hide is a strange concoction: part exposé, part autobiography, and part screed “against the man.” It is not what I would call an example of rigorous journalistic reporting ...
Book Review: The Girl with the Dragon Tattoo (2005) by Stieg Larsson
Executive SummaryYou have heard of this book from watching one or both of the movies that have sprung from it, but do yourself a favor: take the time to read through this ...