Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age


Steven Levy - 2001
    From Stephen Levy—the author who made "hackers" a household word—comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.

Practical Cryptography


Niels Ferguson - 2003
    The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies. Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers. Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).

The Hacker Playbook 2: Practical Guide To Penetration Testing


Peter Kim - 2015
    The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

Bulletproof SSL and TLS: The Complete Guide to Deploying Secure Servers and Web Applications


Ivan Ristic - 2014
    Quite the contrary; mistakes are easy to make and can often fully compromise security. Bulletproof SSL and TLS is the first SSL book written with users in mind. It is the book you will want to read if you need to assess risks related to website encryption, manage keys and certificates, configure secure servers, and deploy secure web applications. Bulletproof SSL and TLS is based on several years of work researching SSL and how SSL is used in real life, implementing and supporting a comprehensive assessment tool running on the SSL Labs website (https://www.ssllabs.com), and assessing most of the public SSL servers on the Internet. The assessment tool helped many site owners identify and solve issues with their SSL deployments. The intent of this book is to provide a definitive reference for SSL deployment that is full of practical and relevant information.

Security in Computing


Charles P. Pfleeger - 1988
    In this newFourth Edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends. The authors first introduce the core concepts and vocabulary of computer security, including cryptography. Next, they systematically identify and assess threats now facing programs, operating systems, databases, and networks. For each threat, they offer best-practice responses. Security in Computing, Fourth Edition, goes beyond technology, covering crucial management issues you face in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, and making the business case for security investments. Another new chapter addresses privacy--from data mining to identity theft, to RFID and e-voting. New coverage also includes Programming mistakes that compromise security: man-in-the-middle, timing, and privilege escalation Web application threats and vulnerabilities Networks of compromised systems: bots, botnets, and drones Rootkits--including the notorious Sony XCP Wi-Fi network security challenges, standards, and techniques New malicious code attacks, including false interfaces and keystroke loggers Improving code quality: software engineering, testing, and liability approaches Biometric authentication: capabilities and limitations Using Advanced Encryption System (AES) more effectively Balancing efficiency and piracy control in music and other digital content Defending against new cryptanalytic attacks against RSA, DES, and SHA Responding to the emergence of organized attacker groups pursuing profit 0132390779B0721200 Every day, the news media giv

Security Engineering: A Guide to Building Dependable Distributed Systems


Ross J. Anderson - 2008
    Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

Bitcoin for the Befuddled


Conrad Barski - 2014
    Already used by people and companies around the world, many forecast that Bitcoin could radically transform the global economy. The value of a bitcoin has soared from less than a dollar in 2011 to well over $1000 in 2013, with many spikes and crashes along the way. The rise in value has brought Bitcoin into the public eye, but the cryptocurrency still confuses many people. Bitcoin for the Befuddled covers everything you need to know about Bitcoin—what it is, how it works, and how to acquire, store, and use bitcoins safely and securely. You'll also learn about Bitcoin's history, its complex cryptography, and its potential impact on trade and commerce. The book includes a humorous, full-color comic explaining Bitcoin concepts, plus a glossary of terms for easy reference.

The Best of 2600: A Hacker Odyssey


Emmanuel Goldstein - 2008
    Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker's perspective. Included are stories about the creation of the infamous tone dialer "red box" that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks.

Handbook of Applied Cryptography


Alfred J. Menezes - 1996
    Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional: It serves as an introduction to the more practical aspects of both conventional and public-key cryptographyIt is a valuable source of the latest techniques and algorithms for the serious practitionerIt provides an integrated treatment of the field, while still presenting each major topic as a self-contained unitIt provides a mathematical treatment to accompany practical discussionsIt contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussedNow in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World


Marcus J. Carey - 2019
    Tribe of Hackers wants to change that. We asked for industry, career, and personal advice from 70 cybersecurity luminaries who are ready to break down barriers and shatter ceilings. It's about time.This book can be a catalyst for change for anyone, from beginners trying to enter the industry, to practitioners looking to start their own firms. What tips do the founders of Dragos, Inc. and Duo Security have on starting a company? Do you need a college degree or certification to be a cybersecurity professional? What is the biggest bang-for-the-buck action your organization can take to improve its cybersecurity posture? What "life hacks" to real hackers use to make their own lives easier? What resources can women in cybersecurity utilize to maximize their potential?All proceeds from the book will go towards: Bunker Labs, Sickle Cell Disease Association of America, Rainforest Partnership, and Start-Up! Kid's Club.We can't wait to show you the most epic cybersecurity thought leadership collaborative effort, ever.(Source: Amazon.com)

Understanding Cryptography: A Textbook For Students And Practitioners


Christof Paar - 2009
    Today's designers need a comprehensive understanding of applied cryptography.After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book's website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

A MacKenzie Security Omnibus 1: Seduction and Sapphires, Shadows and Silk, Secrets and Satin, Sins and Scarlet Lace


Liliana Hart - 2019
     Bayleigh Scott has no idea who her new neighbor is, only that her body is drawn to him in ways she can’t explain, and the danger that surrounds him isn’t the deterrent she knows it should be. More than fireworks explode between Cade and Bayleigh when she discovers the real reason he relentlessly pursued her, but by then it’s too late, because she’s already been drawn into a deadly game of desire, deception and revenge. SHADOWS AND SILK Agent Brant Scott knows when a battle is lost. He’s been an integral part of hunting down members of the del Fuego cartel for years, but it’s not the violent criminals that have the ability to bring him to his knees. That honor belongs to one woman. And after spending a night in Darcy MacKenzie’s bed, he knows he has to disappear from her life or risk her finding out the one secret that can make her despise him forever. Darcy MacKenzie is hell on wheels. At least that’s what her brothers tell her. And when she has the chance to work with the elite team assigned to destroy the most dangerous drug cartel in the world, she jumps at the chance to lend her expertise by deciphering the Mayan hieroglyphs the cartel is using to send messages. The only problem is her partner is none other that Brant Scott—the only man she’s ever loved and the one who left her without a backward glance. With secrets of her own—and a body built for sin—Darcy is more than an equal match for the stubborn Brant. But loving each other could be more of a risk than either is willing to take. SECRETS AND SATIN No one knows heartbreak like Jade Jax. After losing her husband to a tragic death, she doesn’t believe love can happen twice. But after years of living a half-life without her husband, her body starts to waken again, and needs she’d forgotten come to the surface. Max Devlin never thought Jade would want him outside of his dreams, but fate plays a helping hand when they’re thrust into a high stakes mission, protecting each other’s backs like old times. Max decides he’s finally ready to end his bachelor ways, but he learns quickly that happily-ever-after isn't always possible. Because Jade has no desire to ever love again. Not when she knows how painful it can be. SINS AND SCARLET LACE Declan MacKenzie has loved the same woman for as long as he can remember, but after a mission early on in his career turns deadly, he realizes he can never have a wife or family and keep them safe. So he watches her marry another man. Sophia Huxley is involved in a nightmare. Her late husband has been labeled a traitor and he's made her the fall guy. There's no one she can call to prove her innocence. Except the man who broke her heart.

Shadow Force: Complete 5-Part Series


Camilla Blake - 2021
    No cliffhangers. Epic action, drama, suspense, clean romance, and happy ever afters. Highly rated authors.PART ONE: Shadow PromiseCade Montgomery will always carry the guilt for the men who died on his watch, and he will stop at nothing to find the people responsible. When Piper Collins, his former foster sister and the woman who stole his heart more than ten years ago, resurfaces, things get complicated.Piper Collins left the FBI after her fiancé died three years ago, to find his killer. That search leads her to Atlanta and back to Cade, the man who broke her heart when he left and never returned. When Cade meets with two men who are working for a known drug lord at the bar where she’s working undercover, Piper is disappointed to find he turned to a life of crime instead of being the man of conviction she used to know. But things aren’t adding up, and Piper hopes that, with his help, her fiancé’s killer will be brought to justice.PART TWO: Shadow SecretCruz Ortiz is no longer the man he used to be. After being taken hostage and almost beaten to death by a Venezuelan drug lord, Cruz joins Shadow Force with a new face, a new identity, and a death certificate for his old self. When Shadow Force is tasked with sending someone in undercover, Cruz is the obvious choice.Lydia Ayala is content with her life as a nurse practitioner in the slums of Miami. Sure, her patients tend to be gang members and drug dealers, but she’s confident she’s making a difference in the world. When she’s kidnapped and forced into a marriage, she plans to find a way out of the death sentence. But Cruz Ortiz keeps a watchful eye on her, and her chances to make a break are growing smaller, while the wedding is drawing closer.PART THREE: Shadow FlightRyder Blake is grateful Shadow Force scooped him up before he died a slow death at his desk at the CIA headquarters. After running for his life during a long-term undercover op, Ryder is convinced he’s put his clandestine days behind him. But when a large shipment of drugs and guns goes missing and the Russian Mafia boss who tried to have him killed is implicated, Ryder agrees to take on his old persona and enter a string of underground fights. Only, Jolie Phillips, the office manager for Shadow Force and a woman determined to be an operative, is assigned to the case with him, and Ryder is not a happy camper.A new organization comes to light as Ryder and Jolie travel around the southeast. As they get closer to the answers, the danger escalates, and Ryder and Jolie are running for their lives.PART FOUR: Shadow RescueFormer army and explosives expert Oscar Cortada is rumored to have one or two screws loose due to his infatuation with making things go Boom! But when he and the team stumble upon a container of women, Oscar is tormented by his memories. Oscar volunteers for the job to help Shadow Force uncover the missing people.Ivy Bell never stopped loving her husband while she pursued a career in acting and modeling. Still, after eleven years apart, it seemed they would never find their way back to each other. But when a new role opens up in Atlanta and Ivy arrives on set, she realizes things aren’t what they seem.PART FIVE: Shadow RedemptionLevi Slater has fought crime since his time with the DEA, but never before has he encountered a more evil and sinister group than the Los Caballeros del Camino, The Knights of the Way.Dr. Drew Bellamy has one objective: keep her son safe. But when she’s taken from outside her home and given an ultimatum, she finds herself scrambling and forcing her way out of captivity. When she runs smack into Levi Slater in the woods outside the compound where she was held, she faces a decision—trust him with her and her son’s life or go it alone.

Codebreaker: The History of Codes and Ciphers, from the Ancient Pharaohs to Quantum Cryptography


Stephen Pincock - 2006
    The 4,000-year history of cryptography has been a kind of arms race: Each time a more complex encryption has been developed, it has been attacked and, more often than not, decoded; and each time, in response, codemakers have produced tougher and tougher codes. Codebreaker surveys the entire history of codes through an eloquent narrative and an evocative range of illustrations, paying special attention to famous codes that have never been broken, such as the Beale Ciphers, the Voynich manuscript, the Easter Island code, and many more. Many great names in history appear throughout, from Caesar and Mary Queen of Scots, to Samuel Morse and Alan Turing. The narrative is based in part on interviews with cryptology experts, Navaho windtalkers, decryption experts, and law enforcement experts, and ends with a vision of the coded future via quantum cryptography.

Blockchain: The Beginners Guide to Understanding the Technology Behind Bitcoin & Cryptocurrency (The Future of Money)


Artemis Caro - 2017
    As a result, many people are left with an incomplete understanding of this transformative new technology and its massive implications for the future. The goal of this book is not to plumb the depths of the mathematical wizardry used to code blockchain-based applications, but rather to serve as an introduction to the broader architecture and conceptual background behind blockchain technology. We will take a practical approach, examining how Blockchains are used in the real world. In this short, concise guide you will learn: A Brief History of Blockchain Technology Blockchain Basics: Managing Digital Transactions What is a Distributed Ledger? Blockchain Beyond Bitcoin Implications Of Blockchain: Big Data, Privacy & Personal Data Profiting from Blockchain Technologies Limitations & Challenges of Blockchain The Future of Blockchain For Centuries, people have relied on corrupt Centralized Institutions like banks and Governments to serve as intermediaries when it comes to storing and transacting financial assets. This is ALL About To Change... Make sure you take action and join the Financial Revolution by reading this book!