Posts in Books
Security Engineering, 2nd Ed.

Published by Wiley. November, 2010
By Ross J. Anderson

“The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.”

Read More
The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

Published by Penguin Random House, June 19, 2018
By David E. Sanger

"The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes—from crippling infrastructure to sowing discord and doubt—cyber is now the weapon of choice for democracies, dictators, and terrorists."

Read More
Dawn of the Code War

“The inside story of how America’s enemies launched a cyber war against us-and how we’ve learned to fight back...”

Includes links to:

  • “The Lawfare Podcast: John Carlin on 'Dawn of the Code War'“ by Jen Patja Howell. Saturday, November 24, 2018.

  • A discussion on responses to national security threats in cyberspace from the Department of Justice, featuring John P. Carlin, Former Assistant Attorney General, National Security Division; and John C. Demers, Assistant Attorney General, National Security Division, on Tuesday, January 15, 2019 at the Center for Strategic & International Studies.

  • John Carlin on “Stay Tuned with Preet” Dec. 4, 2018.

Read More
Zucked: Waking Up to the Facebook Catastrophe

"The New York Times bestseller about a noted tech venture capitalist, early mentor to Mark Zuckerberg, and Facebook investor, who wakes up to the serious damage Facebook is doing to our society – and sets out to try to stop it. "

Roger McNamee has been a Silicon Valley investor for 35 years. He co-founded successful funds in venture, crossover and private equity. His most recent fund, Elevation, included U2’s Bono as a co-founder. He holds a B.A. from Yale University and…

Read More
Secrets & Lies: Digital Security in a Networked World

Welcome to the businessworld.com. It's digital: Information is more readily accessible than ever. It's inescapably connected: businesses are increasingly--if not totally--dependent on digital communications. But our passion for technology has a price: increased exposure to security threats. Companies around the world need to understand the risks associated with doing business electronically. The answer starts here.

Read More
Applied Cryptography: Protocols, Algorithms, and Source Code in C

This second edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography -- the technique of enciphering and deciphering messages -- to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them in cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

Read More