Summaries of books about Security & Cryptography:
This Is How They Tell Me the World Ends
The Cyberweapons Arms Race
Nicole Perlroth
The book delves into the global market for cyberweapons, revealing how governments and mercenaries trade in digital vulnerabilities and exploits. It exposes the dangers of this secretive industry, highlighting the escalating threats to national security and the potential for catastrophic cyber warfare.
See full summary
The Art of Invisibility
The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Kevin D. Mitnick
The book provides practical advice on protecting privacy and securing personal information in the digital age, drawing on the author's expertise in hacking and cybersecurity. It covers a range of topics from securing online communication to evading surveillance and understanding the tactics used by governments and corporations to collect data.
See full summary
The Basics of Bitcoins and Blockchains
An Introduction to Cryptocurrencies and the Technology that Powers Them
Antony Lewis
The book provides a comprehensive overview of cryptocurrencies, explaining the technical underpinnings of Bitcoin and other digital currencies, as well as the blockchain technology that supports them. It also delves into related topics such as cryptography, investing in digital assets, derivatives, futures trading, and the emergence of non-fungible tokens (NFTs).
See full summary
Countdown to Zero Day
Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter
The book delves into the discovery and analysis of Stuxnet, a sophisticated computer worm designed to sabotage Iran's nuclear program. It explores the implications of cyber warfare and the new era of state-sponsored hacking that the Stuxnet operation heralded.
See full summary
Blockchain Bubble or Revolution
The Future of Bitcoin, Blockchains, and Cryptocurrencies
Neel Mehta|Aditya Agashe|Parth Detroja
The book provides an in-depth analysis of blockchain technology, its potential to disrupt various industries, and the hype surrounding cryptocurrencies. It offers insights into how blockchain works, its applications, and the challenges it faces, while also examining the future prospects of digital currencies and their impact on the global economy.
See full summary
Blue Team Field Manual
Alan White|Ben Clark
The book serves as a concise, practical guide for cybersecurity professionals tasked with defending networks and systems, providing checklists, technical step-by-step instructions, and command-line references for various security tools and platforms. It covers incident response, log analysis, malware analysis, network security, and other blue team tactics to effectively handle and mitigate security breaches.
See full summary
Hacking
The Art of Exploitation, 2nd Edition
Jon Erickson
The book provides an in-depth exploration of the world of hacking, covering topics from programming to network communications, and teaches readers how to think like hackers. It includes practical examples and exercises to apply concepts such as buffer overflows, shellcode, and cryptographic attacks in a hands-on manner.
See full summary
Eleventh Hour CISSP
Study Guide
Joshua Feldman|Seth Misenar|Eric Conrad
The book serves as a concise review for those preparing for the CISSP certification exam, providing summaries, exam tips, and practice questions covering all domains of the ISCĀ²'s Common Body of Knowledge (CBK). It is designed for last-minute studying, reinforcing key concepts and ensuring candidates are well-versed in the critical areas tested on the exam.
See full summary
Future Crimes
Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
Marc Goodman
The book explores the dark side of technological advances, detailing how criminals, corporations, and governments use new technologies to exploit vulnerabilities and infringe on privacy. It also offers insights and strategies for individuals and organizations to protect themselves against emerging cyber threats and ensure a safer digital future.
See full summary
The Hacker Playbook 3
Practical Guide To Penetration Testing
Peter Kim
The book provides advanced penetration testing techniques and methodologies, focusing on simulating real-world attack scenarios to test and secure networks. It covers topics such as red teaming strategies, exploitation tactics, and how to bypass security controls, offering practical advice and step-by-step guides for ethical hackers.
See full summary