Summaries of books about Security & Cryptography:
The Art of Deception
Controlling the Human Element of Security
Kevin D. Mitnick|William L. Simon
The book delves into the world of social engineering, where human psychology is exploited to gain unauthorized access to information systems. It presents real-world examples of how con artists use deception to manipulate individuals into compromising their security, and offers insights on how to protect against such vulnerabilities.
See full summary
Social Engineering
The Science of Human Hacking
Christopher Hadnagy
The book provides an in-depth exploration of the psychological tactics used by social engineers to manipulate individuals into divulging confidential information or performing actions that may compromise security. It offers insights into understanding and defending against these deceptive practices through real-world examples, techniques, and strategies for building a personal defense against social engineering threats.
See full summary
Blockchain Revolution
How the Technology Behind Bitcoin Is Changing Money, Business, and the World
Don Tapscott|Alex Tapscott
The book explores the transformative potential of blockchain technology across various sectors, beyond its initial application in cryptocurrencies like Bitcoin. It delves into the implications for financial services, business, governance, and personal privacy, predicting a radical shift in how the world operates as blockchain systems become more prevalent.
See full summary
Dark Territory
The Secret History of Cyber War
Fred Kaplan
The book delves into the history and evolution of cyber warfare, detailing how the United States government and military have engaged in covert operations to defend and attack through digital means. It explores the policies, strategies, and ethical dilemmas that have emerged as national security has become increasingly reliant on cyber capabilities.
See full summary
The Perfect Weapon
War, Sabotage, and Fear in the Cyber Age
David E. Sanger
The book delves into the rise of cyber warfare, detailing how nations are increasingly using digital attacks to disrupt their adversaries without traditional military engagement. It explores real-world examples of cyber espionage, sabotage, and the strategic implications of this new domain of conflict.
See full summary
PTFM
Purple Team Field Manual
Tim Bryant
The book serves as a practical guide for cybersecurity professionals, providing strategies and techniques for simulating cyber attacks and defenses to improve organizational security. It includes methodologies for both red team (offensive) and blue team (defensive) activities, with a focus on collaboration and knowledge sharing to enhance security posture.
See full summary
Data and Goliath
The Hidden Battles to Collect Your Data and Control Your World
Bruce Schneier
The book delves into the extensive surveillance practices of governments and corporations, revealing how they collect vast amounts of personal data. It also discusses the implications for privacy, security, and democracy, and offers insights into how individuals can protect themselves against these intrusions.
See full summary
The Hacker Playbook 2
Practical Guide To Penetration Testing
Peter Kim
The book serves as a comprehensive guide to penetration testing, providing advanced techniques, methodologies, and practical tips for effectively breaking into systems as a security professional. It covers a range of topics from setting up a penetration testing lab to exploiting networks and applications, and includes real-world scenarios to help readers hone their hacking skills.
See full summary
The Hacker Playbook
Practical Guide To Penetration Testing
Peter Kim
The book serves as a comprehensive guide to penetration testing, providing readers with step-by-step instructions on hacking methodologies, tools, and techniques. It covers various attack vectors, defenses, and practical tips to effectively test and secure computer systems from vulnerabilities.
See full summary
Blockchain Basics
A Non-Technical Introduction in 25 Steps
Daniel Drescher
The book provides an accessible introduction to the concept of blockchain technology using a step-by-step approach that avoids technical jargon. It covers the principles behind blockchain, how it functions, and its potential applications in various industries, all explained through simple metaphors and illustrations.
See full summary