Summaries of books about Security & Cryptography:
Tribe of Hackers Blue Team
Tribal Knowledge from the Best in Defensive Cybersecurity
Marcus J. Carey|Jennifer Jin
The book is a compilation of insights and advice from leading cybersecurity defense experts, focusing on strategies for protecting networks and systems. It covers a range of topics including incident response, security operations, and best practices for building a strong security posture within organizations.
See full summary
Tribe of Hackers Security Leaders
Tribal Knowledge from the Best in Cybersecurity Leadership
Marcus J. Carey|Jennifer Jin
The book is a compilation of insights and advice from cybersecurity experts, offering guidance on leadership, management, and strategy in the field of information security. It features interviews with prominent security professionals who share their experiences, challenges, and best practices for leading effective security teams and protecting organizations from cyber threats.
See full summary
Cyber Privacy
Who Has Your Data and Why You Should Care
April Falcon Doss
The book examines the vast amounts of personal data collected by companies and governments, exploring the implications for privacy, security, and civil liberties. It provides insights into how data is used and shared, and offers guidance on how individuals can better protect their personal information in the digital age.
See full summary
The Blockchain and the New Architecture of Trust
Kevin Werbach
The book explores how blockchain technology creates a new framework for trust, enabling secure transactions without the need for traditional intermediaries like banks and governments. It delves into the potential of blockchain to transform various industries by establishing trust through transparency, security, and decentralization.
See full summary
Cyber War Will Not Take Place
Thomas Rid
The book challenges the notion of cyber warfare, arguing that cyber attacks do not constitute war but are instead a form of sabotage, espionage, and subversion. It examines historical and contemporary cyber incidents to demonstrate that they fall short of true warfare and explores the implications for international security and strategy.
See full summary
Digital Cash
The Unknown History of the Anarchists, Utopians, and Technologists Who Created Cryptocurrency
Finn Brunton
The book delves into the history and development of digital currency, exploring the contributions of various groups including anarchists, utopians, and technologists who played pivotal roles in the creation of cryptocurrencies. It examines the philosophical and technical origins of digital cash, detailing the innovations and struggles that led to the rise of Bitcoin and other cryptocurrencies.
See full summary
Cybersecurity for Executives
A Practical Guide
Gregory J. Touhill|C. Joseph Touhill
The book provides a comprehensive overview of cybersecurity principles, strategies, and best practices tailored for leaders and decision-makers in organizations. It covers risk management, legal issues, policy development, and incident response, aiming to equip executives with the knowledge to protect their enterprises in the digital age.
See full summary
The Cybersecurity Playbook
How Every Leader and Employee Can Contribute to a Culture of Security
Allison Cerra
The book provides strategies and practical guidance for leaders and employees to enhance their organization's cybersecurity posture, emphasizing the importance of creating a culture of security awareness. It covers topics such as risk management, incident response, and the role of human behavior in safeguarding digital assets.
See full summary
Bitcoin Manifesto
ONE CPU ONE VOTE (Heterodoxa)
Satoshi Nakamoto
The book you're referring to does not actually exist as an authentic work by Satoshi Nakamoto, the pseudonymous creator of Bitcoin. Any book with such a title is likely to be an unofficial work that discusses the principles of decentralization and democratic participation in the Bitcoin network, emphasizing the original concept of one CPU equating to one vote in the context of mining and governance.
See full summary
Cyberinsurance Policy
Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks
Josephine Wolff
The book examines the evolving landscape of cyber risk and the role of insurance in managing the financial impact of events like data breaches and cyberattacks. It explores the challenges of creating effective cyberinsurance policies, including assessing risks, setting premiums, and defining the scope of coverage in a rapidly changing technological environment.
See full summary