This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
which I've now included in this book 😊 These are the stories behind the stories and finally, the book about it all is here: I announced the book back in April last year after Rob, Charlotte and I had already invested a heap of effort before releasing a preview in October. This book has it all. Pat Phelan.
Molly White—of “ Web3 is Going Just Great ” fame— reviews Chris Dixon’s blockchain solutions book: Read Write Own : In fact, throughout the entire book, Dixon fails to identify a single blockchain project that has successfully provided a non-speculative service at any kind of scale. billion.
So, this is a blog post about a book about blog posts. It all began when Rob Conery reached out a few years ago and said "dude, we should totally turn a bunch of your blog posts into a book" to which I replied, "why?" I mean they're all up on my blog anyway, why on earth would anyone want to read them just stuffed into a book?
Cybersecurity For Dummies , the best-selling cybersecurity book written for general audiences by Joseph Steinberg , is now available in Portuguese. Readers of the book learn in simple, straightforward language what threats face them, as well as how to protect themselves against such threats.
I have 500 copies of each book available. It’s a lot of work to sign and mail hundreds of books. Also, signed but not personalized books will arrive faster. For a limited time, I am selling signed copies of Click Here to Kill Everybody and Data and Goliath , both in paperback, for just $6 each plus shipping.
Claude (Anthropic’s LLM) was given this prompt: Please summarize the themes and arguments of Bruce Schneier’s book Beyond Fear. Then lay out the most salient criticisms of the book. The book was a product of my thinking twenty years ago, and my own thinking has evolved to address those criticisms.
The second edition of Cybersecurity For Dummies , Joseph Steinberg’s best-selling introductory-level book about cybersecurity, is now available in French. The book is the down-to-earth guide you need to secure your own data (and your company’s, too).
Read this book by Daniel Shoemaker, Ken Sigler and Tamara Shoemaker. Looking for a handbook for teaching the cybersecurity body of knowledge in a conventional classroom setting?
Rupin Gupta runs Digital Guru books. He's one of the nicest people you'll ever meet, a real joy to work with, and he works hard to put books on shelves so that you can discover them. They don't just sell books though, they know the authors, the customers, they're the epitome of a small customer focused business."
Some of what I've read over the past quarter, and want to recommend each of the books below as worthy of your time. Dr. Black is explicit that she wrote the book to carry the feel of an internet campaign, with some stylistic bits that I found surprising. Don't make my mistake, and do read the book. I was expecting a drier style.
His groundbreaking book, The Codebreakers was the first serious book I read about codebreaking, and one of the primary reasons I entered this field. David Kahn has died. He will be missed.
The books I read in the third quarter of 2022 that are worth your time. The books I read in the third quarter of 2022 that are worth your time. Research for my next book. I don't like strategy books much, and this one explains why: they're not actually strategy, but rather just pablum like we're going to work smarter.
These are the books that I read in the second quarter, 2022 that are worth your time. Books I've read lately that I think you might find enjoyable are the focus of this 100% foreshadowing-free edition of worthwhile books. Write Useful Books , Rob Fitzpatrick. Cyber Cyber Peace , edited by Scott J.
Books that I read in the second quater that are worth your time include two memoirs, a great book on the security of ML, and more! A short book reflecting on the history of thinking about passwords, treating the secret knowledge of how to solve the labyrinth as password adjacent. Password (Object Lessons series) , Martin Eve.
The serious side of the book Im really excited to have my first copies of the new book in hand. Ive said a lot about how much fun Ive had writing it, and perhaps havent written enough about what a serious book it really is. So all that to say: this is a serious book in a fun package, and I hope you enjoy it and learn from it.
I'm always looking for interesting books to read. These are the books that I enjoyed enough to recommend in Q2. I'm always looking for interesting books to read. These are the books that I enjoyed enough to recommend in Q2. Also, thanks to RAND for releasing their books with an epub version.)
Im excited to share that Ill be doing a book reading and signing at Adas Books, Feb 7th at 6PM. The live launch party for Threats! Tomorrow!) official site , and they ask you RSVP on Facebook. Ill also be doing a virtual launch party, 3PM Feb 8th for those not in Seattle, or otherwise unable to attend.
Books that I read in the fourth quater that are worth your time include several about safety with lessons for cybersecurity Cyber Both of my so-called cyber books are not about cyber — if you judge a book by its cover. The excellent book by Ms. But both have some pretty important lessons for us.
The second edition of Cybersecurity For Dummies , Joseph Steinberg’s best-selling introductory-level book about cybersecurity, is now available. The book is the down-to-earth guide you need to secure your own data (and your company’s, too). Topics covered in the book include: ? The who and why of cybersecurity threats. ?
Threats is almost in bookstores When my first threat modeling book came out, I talked about STRIDE in terms of Star Wars Luke Skywalker spoofing a Stormtrooper and being caught because he was too short. And as I thought about turning that into a book, my publisher suggested maybe you can get a chapter out of it? I mean, kids today .
These are the books that I read in the second half of 2021 that I think are worth your time. I realize it's been a little while since I did this, but I wanted to pick up my now and then mention of books that I read in Q4 2021 that I think are worth your time. Cyber A Vulnerable System by Andrew Stewart.
Carter Schoenberg is a trusted security expert who has vast experience in the public and private sectors. Here’s his guidance on what works and what doesn’t with the cybersecurity industry.
They used gift cards and prepaid credit cards to buy the books, so there was no available balance when Amazon tried to charge them the buyout price for non-returned books. They also used various aliases and other tricks to bypass Amazon’s fifteen-book limit. In all, they stole 14,000 textbooks worth over $1.5
The Polish version of the second edition of Cybersecurity For Dummies , Joseph Steinberg’s best-selling introductory-level book about cybersecurity, is now available. The book provides readers of the Polish language with a down-to-earth guide to help them to secure their data (and the data belonging to their employers).
Discover the latest on her new book about secure coding, exciting updates in Application Security, and the use of AI in security. Learn how her new book goes deeper into secure coding practices, backed by her [] The post Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book appeared first on Shared Security Podcast.
An unexpected book review. I hate reviewing books by people I know, because I am a picky reader, and if you can't say anything nice, don't say anything at all. I also tend to hate management books, because they often substitute jargon for crisp thinking. It is not a book for the CSO. Fire" doesn't do that.
ESET Research shares new findings about Telekopye, a scam toolkit used to defraud people on online marketplaces, and newly on accommodation booking platforms
The full tale of what I first did (and how disastrous it ultimately became), is up front early in the book so I won't relay it here, but it's quite the story. The book title - Pwned - also seemed like a natural fit. "Somehow" is a theme throughout the book because if I'm honest, none of this was really planned.
The Armenian Government is now the 37th to have free and open access to their domains on HIBP (this gives them API-level domain searches to their gov TLD) After two and a bit years on sale, we're now giving away "Pwned" the book, for free (go grab it in PDF or EPUB format)
It's bad news for people who want to be able to control their computer, because these attacks are leading vendors to lock down even their traditional operating systems, as Jonathan Zittrain predicted in his 2008 book, The Future of the Internet--And How to Stop It. Cult of the Dead Cow , Joseph Menn. The White Box Essays , Jeremy Holcomb.
but the books were already printed with 1/4" grid (didn't think it through). And I missed whiteboards, so working with my partners at Agile Stationery, we created not only whiteboards, but also stencils to help you neaten up your threat models as you iterate through them. So the final production stencils have an inch-denominated ruler.
The White Box , and its accompanying book, "The White Box Essays" are a FANTASTIC resource, and I wish I'd had them available to me as I designed Elevation of Privilege and helped with Control-Alt-Hack. If you've ever thought about designing a game, you should buy this book. A resource for those developing games.
Hacking et Cybersécurité Mégapoche pour les Nuls , a single-volume book containing French versions of the latest editions of both the best selling CyberSecurity for Dummies by Joseph Steinberg, and Hacking For Dummies by Kevin Beaver, is now available to the public.
These are the books that I read in Q2 2020 that I think are worth your time. These are the books that I read in Q2 2020 that I think are worth your time. Let me be frank: I hate most business books. Sorry it's late. They're still worthwhile. :) Cyber You'll See This Message When It Is Too Late , by Josephine Wolff.
KrebsOnSecurity last week heard from a reader whose close friend received a targeted phishing message within the Booking mobile app just minutes after making a reservation at a California. The phishing message our reader’s friend received after making a reservation at booking.com in late October.
Will this change how you buy and store digital books? The clock is ticking for Kindle users. After February 2025, a long-standing feature disappears. Read on to find out.
And a 1994 review of Applied Cryptography by redacted : Applied Cryptography, for those who don’t read the internet news, is a book written by Bruce Schneier last year. The book is destined for commercial success because it is the only volume in which everything linked to cryptography is mentioned. There are many redactions.
It’s about 150 linear feet of books, conference proceedings, journals, and monographs — mostly from the 1980s, 1990s, and 2000s. The time has come for me to find a new home for my (paper) cryptography library.
Thought-provoking survey of the problems that come from the book above not being better read. Fiction As it turns out, all three fiction books are re-imaginings of other stories. Good enough that I bought a paper copy to augment the ebook. Also, sometimes redundant, and says nice things about my work.)
Some books worth reading. Angel: How to Invest In Technology Startups is a bit of a breathless business book, but is an excellent overview of how to be a helpful angel investor. One ran the State department, the other the CIA. Sometimes verges towards the polemical, and readers with a statistical bent may want more.
Some books worth reading, particularly related to space and history A Man on the Moon , Andrew Chaikin is probably the best of the general histories of the moon landings. Failure is not an Option , by Gene Kranz, who didn't actually say that during Apollo 13. Marketing The Moon by David Scott and Richard Jurek.
Which means that sometime in early 1993 I, as an unpublished book author who only wrote a couple of crypto articles for Dr. Dobbs Journal , asked him to read and comment on my book manuscript. He’s listed in the acknowledgments as a reader of every other of my books from Beyond Fear on. And he said yes. And he read it.
. “Western Digital has determined that some My Book Live and My Book Live Duo devices are being compromised through exploitation of a remote command execution vulnerability,” the company said in a statement June 24. The My Book Live and My Book Live Duo devices received its final firmware update in 2015. .”
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content