EH-Net Book Review - Cracking Codes with Python

Book Review: Cracking Codes with Python

With one last code modification, you’re in, and the contents of the vault are yours! Cracking Codes with Python is not quite about breaking into banks or pulling off elaborate heists, but ...
To Kill a Mockingbird (8/10) Movie CLIP - Your Father's Passing (1962) HD

Book Review: " Go Set a Watchman (2011) by Harper Lee," Book Reviewed by Rick Howard, 1 August 2015

Executive SummaryIn Harper Lee’s Go Set a Watchman, Jean Louise Finch as a young woman discovers that racial tensions in the south are not as black and white as she thought they ...
Cybersecurity Canon Candidate Book Review: "Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats (2011)," by Will Gragido and John Pirc

Cybersecurity Canon Candidate Book Review: "Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats (2011)," by Will Gragido and John Pirc

Executive SummaryCybercrime and Espionage, published in 2011, is a book that was ahead of its time. The authors were pushing the envelope in terms of how the security community should think about ...
Book Review: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (2014) by Kim Zetter

Book Review: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon (2014) by Kim Zetter

Executive SummaryOperation Olympic Games is the US military code name that refers to the first ever act of real cyber warfare. Many journalists have told bits and pieces of the story since ...
Book Review: Winning as a CISO (2005) by Rich Baich

Book Review: Winning as a CISO (2005) by Rich Baich

| | Book Reviews, Cyber Security Canon
Executive SummaryThe latest candidate for the cyber security canon is Rich Baich’s Winning as a CISO. The roles of the chief information officer (CIO), the chief security officer (CSO), and the chief ...
Book Review: Spam Nation: The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door (2014) by Brian Krebs

Book Review: Spam Nation: The Inside Story of Organized Cybercrime – from Global Epidemic to Your Front Door (2014) by Brian Krebs

Executive SummaryIn Spam Nation, Brian Krebs covers a key portion of our cyber security and cyber crime history: 2007–2013, that period when we started to learn about the Russian Business Network, bulletproof-hosting ...
Book Review: The Practice of Network Security Monitoring: Understanding Incident Detection and Response (2013) by Richard Bejtlich

Book Review: The Practice of Network Security Monitoring: Understanding Incident Detection and Response (2013) by Richard Bejtlich

| | Book Reviews, Cyber Security Canon
Executive SummaryRichard Bejtlich is one of the most respected security practitioners in the community. If he publishes something, we should all take notice. In The Practice of Network Security Monitoring, Bejtlich provides ...
Book Review: Lexicon (2013) by Max Barry

Book Review: Lexicon (2013) by Max Barry

Executive SummaryLexicon is an exciting story that is really about social engineering taken to the nth degree. It is not a cyber security canon candidate, however, because it does not meet the ...
Book Review: No Place to Hide:  Edward Snowden, the NSA, and the U.S. Surveillance State (2014) by Glenn Greenwald

Book Review: No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State (2014) by Glenn Greenwald

Executive SummaryNo Place to Hide is a strange concoction: part exposé, part autobiography, and part screed “against the man.” It is not what I would call an example of rigorous journalistic reporting ...
Book Review: The Girl with the Dragon Tattoo (2005) by Stieg Larsson

Book Review: The Girl with the Dragon Tattoo (2005) by Stieg Larsson

Executive SummaryYou have heard of this book from watching one or both of the movies that have sprung from it, but do yourself a favor: take the time to read through this ...