Quantcast
Channel: Blog Posts From Ben Rothke: Security Reading Room Tagged With security+
Browsing all 15 articles
Browse latest View live

Computer Security Literacy: Staying Safe in a Digital World

One of the most important papers on computer security and usability was Why Johnny Can’t Encrypt, A Usability Evaluation of PGP 5.0 by Alma Whitten and J.D. Tygar.  They noted that user errors cause or...

View Article



Low Tech Hacking: Street Smarts for Security Professionals

Security guru Bruce Schneier has observed that for those organizations that have incorrectly deployed cryptography, it is akin to putting a big flagpole in front of your facility and hoping that it...

View Article

Using Social Media for Global Security

Every knows that social media is an extremely powerful technology.  The notion of social media analytics (SNA) which Using Social Media for Global Security deals with didn’t even exist a few years ago....

View Article

Security Engineering: A Guide to Building Dependable Distributed Systems

Security Engineering: A Guide to Building Dependable Distributed Systems by Ross Anderson is one of, if not the best information security book ever written.With a list price of $80, it's worth every...

View Article

The Design of Rijndael: AES - The Advanced Encryption Standard

While it was printed about 11 years ago, I just got around to reading The Design of Rijndael: AES - The Advanced Encryption Standard.  Appropois given that the RSA conference is next week. Many...

View Article


Two new security certification review guides from Microsoft Press

Last year, Microsoft Press started a series of Rapid Review certification books.  With 6 currently in print; two of the titles are around security, namely CISSP Rapid Review by Darril Gibson and...

View Article

The Phoenix Project

While at the RSA Conference this week, the nice people at Tripwire gave me a copy of their CTO’s book The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win. The theme of the book...

View Article

The Hacker's Guide to OS X: Exploiting OS X from the Root Up

The Macintosh operating system was long considered more secure than Windows.  Part of the reason was that the vast majority of attackers targeted Windows given it was so ubiquitous.   A lot has changed...

View Article


PRAGMATIC Security Metrics: Applying Metametrics to Information Security

Like all books on metrics, early in the book in PRAGMATIC Security Metrics: Applying Metametrics to Information Security makes the statement that “you can't manage what you can't measure”.  The authors...

View Article


Introduction to Computer Networks and Cybersecurity

At nearly 1,400 pages, Introduction to Computer Networks and Cybersecurity is more than just an introduction to the topic.  Rather than simply an introduction, it is a comprehensive guide to the...

View Article

The Death of the Internet

At the beginning of The Death of the Internet, Markus Jakobsson asks the obvious question: is the title of this book a joke? It is noted that things can get worse and that is what the book is about....

View Article

Applied Cyber Security and the Smart Grid: Implementing Security Controls...

Imagine if the smart guys from the SANS Institute came to the Federal Energy Regulatory Commission (FERC) and told them there it was impossible that the smart grid could be effectively secured.  What...

View Article

The Death of the Internet - Markus Jakobsson

When I first heard about the book The Death of the Internet, it had all the trappings of a second-rate book; a histrionic title and the fact that it had nearly 50 contributors.  I have seen far too...

View Article


Applied Information Security: A Hands-on Approach

In Applied Information Security: A Hands-on Approach, authors David Basin, Patrick Schaller and Michael Schläpfer detail some of the labs exercises and texts that they used for courses they gave at ETH...

View Article

Locked Down: Information Security for Lawyers

HadLocked Down: Information Security for Lawyers not been published by the American Bar Association (ABA) and 2 of its 3 authors not been attorneys; one would have thought the book is a reproach...

View Article

Browsing all 15 articles
Browse latest View live




Latest Images