Teaching computer security principles via hands-on activities
Unique among computer security texts, this book, in its third edition, builds on the author's long tradition of teaching complex subjects through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle. Readers can touch, play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes worldwide. The author has also published online courses on Udemy based on this book.
Topics covered in the book
- Software vulnerabilities, attacks, and countermeasures
- Attacks on web applications, countermeasures
- Attacks on hardware: Meltdown and Spectre attacks
- Cryptography and attacks on algorithms and protocols
- Public Key Infrastructure (PKI)
- Common hacking and defense techniques
Teaching computer and network security principles via hands-on activities
Unique among computer security texts, this book, in its third edition, builds on the author's long tradition of teaching complex subjects through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle. Readers can touch, play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes worldwide. The author has also published online courses on Udemy based on this book.
Topics covered in the book
- Software security: attacks and countermeasures
- Web security: attacks and countermeasures
- Hardware security: Meltdown and Spectre attacks
- Network security: attacks on TCP/IP and DNS
- Firewall and Virtual Private Network (VPN)
- Cryptography and attacks on algorithms and protocols
- Public Key Infrastructure
- Common hacking and defense techniques
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins the security of our mobile phone calls, credit card payments, web searches, internet messaging, and cryptocurrencies--in short, everything we do online. Increasingly, it also runs in the background of our smart refrigerators, thermostats, electronic car keys, and even the cars themselves. As our daily devices get smarter, cyberspace--home to all the networks that connect them--grows.
Broadly defined as a set of tools for establishing security in this expanding cyberspace, cryptography enables us to protect and share our information. Understanding the basics of cryptography is the key to recognizing the significance of the security technologies we encounter every day, which will then help us respond to them.
What are the implications of connecting to an unprotected Wi-Fi network? Is it really so important to have different passwords for different accounts? Is it safe to submit sensitive personal information to a given app, or to convert money to bitcoin? In clear, concise writing, information security expert Keith Martin answers all these questions and more, revealing the many crucial ways we all depend on cryptographic technology. He demystifies its controversial applications and the nuances behind alarming headlines about data breaches at banks, credit bureaus, and online retailers. We learn, for example, how encryption can hamper criminal investigations and obstruct national security efforts, and how increasingly frequent ransomware attacks put personal information at risk. Yet we also learn why responding to these threats by restricting the use of cryptography can itself be problematic.
Essential reading for anyone with a password, Cryptography offers a profound perspective on personal security, online and off.
Unlock the power of secure coding with this straightforward and approachable guide!
Discover a game-changing resource that caters to developers of all levels with Alice and Bob Learn Secure Coding. With a refreshing approach, the book offers analogies, stories of the characters Alice and Bob, real-life examples, technical explanations and diagrams to break down intricate security concepts into digestible insights that you can apply right away. Explore secure coding in popular languages like Python, Java, JavaScript, and more, while gaining expertise in safeguarding frameworks such as Angular, .Net, and React. Uncover the secrets to combatting vulnerabilities by securing your code from the ground up!
Topics include:
Alice and Bob Learn Secure Coding is designed for a diverse audience, including software developers of all levels, budding security engineers, software architects, and application security professionals. Immerse yourself in practical examples and concrete applications that will deepen your understanding and retention of critical security principles.
Alice and Bob Learn Secure Coding illustrates all the included concepts with easy-to-understand examples and concrete practical applications, furthering the reader's ability to grasp and retain the foundational and advanced topics contained within. Don't miss this opportunity to strengthen your knowledge; let Alice and Bob guide you to a secure and successful coding future.
Understand the history of hacking culture and the genesis of a powerful modern subculture
In Hack to the Future: How World Governments Relentlessly Pursue and Domesticate Hackers, veteran information security professional Emily Crose delivers a deep dive into the history of the United States government's nuanced relationship with hacker culture and the role the latter has played in the former's domestic policy and geopolitics. In the book, you'll learn about significant events that have changed the way the hacking community has been perceived by the public, the state, and other hackers.
The author explains how the US government managed to weaponize a subculture widely seen as misanthropic and awkward into a lever of geopolitical power. You'll also discover how:
Perfect for anyone with an interest in hacking, tech, infosec, and geopolitics, Hack to the Future is a must-read for those who seek to better their understanding of the history of hacking culture and how we got to where we are today.
Demystify one of the most disruptive modern technologies and gain an understanding of distributed ledger technology, consensus protocols, smart contracts, DApps, blockchain scalability, privacy, security, and more.
Purchase of the print or Kindle book includes a free eBook in PDF format.
Key Features:
Book Description:
Blockchain is the backbone of cryptocurrencies, with applications in finance, government, media, among other industries. With a legacy of providing technologists with executable insights, this new edition of Mastering Blockchain is thoroughly revised and updated according to the latest blockchain research. With new chapters on Decentralized Finance, Decentralized Identity and blockchain privacy, scalability, and security, as well as bonus online content exploring alternative blockchains, this is an unmissable read for everyone who wants to gain a deep understanding of blockchain.
Although this book covers the basics, including blockchain's technical underpinnings, cryptography, and consensus protocols, it doesn't shy away from advanced topics and practical expertise, such as decentralized application (DApp) development using smart contracts. Throughout the book, you'll explore blockchain solutions beyond cryptocurrencies, such as the Internet of Things (IoT) with blockchain, enterprise blockchains, and tokenization, and gain insight into the future scope of this fascinating and disruptive technology.
By the end of this blockchain book, you will have gained a thorough comprehension of the various facets of blockchain and understand the potential of this technology in diverse real-world scenarios.
What You Will Learn:
Who this book is for:
This book is for blockchain enthusiasts from all backgrounds, including software developers and programmers who want to learn how to build DApps, business executives and managers who want to explore the benefits and challenges of leveraging blockchain in different industries, and system architects and solution designers who want insight into blockchain architecture, consensus mechanisms, and security considerations. It is also a useful reference guide for blockchain development professionals who want to build fast and highly secure transactional applications. Basic knowledge in any programming language will come in handy.
This is the Black and White edition.
If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.
The first half of our book focuses on foundational theory, covering topics such as:
The second half encourages fledgling administrators to jump in with both feet, outlining the quirks of common tasks such as:
Are you a systems administrator just starting out? A developer looking to not just implement, but to understand? Or perhaps SSL/TLS has been a topic you've avoided over the years because it is very dense and implementation can be fraught with fidgety pitfalls. You can read this book cover to cover, crosswalk to the copiously linked RFCs, or use it as a desk reference.
This is SSL/TLS for everyone.
Explaining the mathematics of cryptography
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers work. He focuses on both code making and code breaking and discusses most of the ancient and modern ciphers that are currently known. He begins by looking at substitution ciphers, and then discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, connections between ciphers and computer encryption, stream ciphers, public-key ciphers, and ciphers involving exponentiation. He concludes by looking at the future of ciphers and where cryptography might be headed. The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages. A blog describing new developments and historical discoveries in cryptography related to the material in this book is accessible at http: //press.princeton.edu/titles/10826.html.Learn application security from the very start, with this comprehensive and approachable guide!
Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures. Throughout, the book offers analogies, stories of the characters Alice and Bob, real-life examples, technical explanations and diagrams to ensure maximum clarity of the many abstract and complicated subjects.
Topics include:
Alice and Bob Learn Application Security is perfect for aspiring application security engineers and practicing software developers, as well as software project managers, penetration testers, and chief information security officers who seek to build or improve their application security programs.
Alice and Bob Learn Application Security illustrates all the included concepts with easy-to-understand examples and concrete practical applications, furthering the reader's ability to grasp and retain the foundational and advanced topics contained within.
A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization--inhabiting a variety of roles not traditionally associated with cybersecurity--can contribute to improving its cybersecurity backbone. You'll discover how developers, DevOps professionals, managers, and others can strengthen your cybersecurity. You'll also find out how improving your firm's diversity and inclusion can have dramatically positive effects on your team's talent.
Using the familiar analogy of the color wheel, the author explains the modern roles and responsibilities of practitioners who operate within each slice. He also includes:
Perfect for managers, directors, executives, and other business leaders, See Yourself in Cyber: Security Careers Beyond Hacking is also an ideal resource for policymakers, regulators, and compliance professionals.
Plan, design, and build resilient security architectures to secure your organization's hybrid networks, cloud-based workflows, services, and applications
Key FeaturesCybersecurity architecture is the discipline of systematically ensuring that an organization is resilient against cybersecurity threats. Cybersecurity architects work in tandem with stakeholders to create a vision for security in the organization and create designs that are implementable, goal-based, and aligned with the organization's governance strategy.
Within this book, you'll learn the fundamentals of cybersecurity architecture as a practical discipline. These fundamentals are evergreen approaches that, once mastered, can be applied and adapted to new and emerging technologies like artificial intelligence and machine learning. You'll learn how to address and mitigate risks, design secure solutions in a purposeful and repeatable way, communicate with others about security designs, and bring designs to fruition. This new edition outlines strategies to help you work with execution teams to make your vision a reality, along with ways of keeping designs relevant over time. As you progress, you'll also learn about well-known frameworks for building robust designs and strategies that you can adopt to create your own designs.
By the end of this book, you'll have the foundational skills required to build infrastructure, cloud, AI, and application solutions for today and well into the future with robust security components for your organization.
What you will learnThis book is for new as well as seasoned cybersecurity architects looking to explore and polish their cybersecurity architecture skills. Additionally, anyone involved in the process of implementing, planning, operating, or maintaining cybersecurity in an organization can benefit from this book. If you are a security practitioner, systems auditor, and (to a lesser extent) software developer invested in keeping your organization secure, this book will act as a reference guide.
Table of ContentsInfuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management
Organizations spend tremendous time and resources addressing vulnerabilities to their technology, software, and organizations. But are those time and resources well spent? Often, the answer is no, because we rely on outdated practices and inefficient, scattershot approaches. Effective Vulnerability Management takes a fresh look at a core component of cybersecurity, revealing the practices, processes, and tools that can enable today's organizations to mitigate risk efficiently and expediently in the era of Cloud, DevSecOps and Zero Trust.
Every organization now relies on third-party software and services, ever-changing cloud technologies, and business practices that introduce tremendous potential for risk, requiring constant vigilance. It's more crucial than ever for organizations to successfully minimize the risk to the rest of the organization's success. This book describes the assessment, planning, monitoring, and resource allocation tasks each company must undertake for successful vulnerability management. And it enables readers to do away with unnecessary steps, streamlining the process of securing organizational data and operations. It also covers key emerging domains such as software supply chain security and human factors in cybersecurity.
Effective Vulnerability Management is a new and essential volume for executives, risk program leaders, engineers, systems administrators, and anyone involved in managing systems and software in our modern digitally-driven society.
Are you ready to dive into the fascinating world of meme coins? Before you invest a single dollar, make sure you have all the facts. The Birth of Meme Coins: Exploring the Pre-2017 Crypto Landscape is your comprehensive guide to understanding the rise and fall of some of the most famous meme coins in history.
This book takes you on a journey through the early days of crypto, exploring the emergence of Dogecoin, the first meme coin to capture the attention of the masses. You'll discover the technical features of each meme coin, including Rare Pepe Party, BBQCoin, NyanCoin, and HoboNickels, and the real-world use cases that made them stand out in the crowded crypto landscape.
But this book is more than just a history lesson. You'll also learn about the challenges and opportunities of investing in meme coins, and the lessons learned from the rise and fall of these early coins. Discover the potential risks and rewards of investing in meme coins, and learn how to spot the warning signs of a potential scam.
With expert insights and real-world examples, The Birth of Meme Coins is the essential guide to navigating the volatile world of cryptocurrency. Whether you're a seasoned investor or just getting started, this book will equip you with the knowledge and tools you need to make informed decisions about your investments.
Don't miss out on this exciting opportunity to explore the origins of meme coins and discover the potential of this emerging asset class. Order your copy of The Birth of Meme Coins: Exploring the Pre-2017 Crypto Landscape today and join the ranks of savvy investors who are shaping the future of finance.
Quantum Cryptography: Securing the Future with Quantum Tech delves into the cutting-edge world of quantum cryptography and its revolutionary impact on data security. As the rise of quantum computing threatens to render traditional encryption methods obsolete, this book offers a timely exploration of how quantum cryptography provides an unbreakable solution to safeguarding information in the digital age. Through a clear and accessible approach, it unpacks the complexities of quantum mechanics, revealing how principles like superposition and entanglement are leveraged to create secure communication systems.
This book guides readers through the key concepts of quantum key distribution (QKD), post-quantum cryptography, and the imminent threat quantum computers pose to classical cryptographic systems like RSA and ECC. Readers will gain insight into the practical applications of quantum cryptography, from securing financial transactions to protecting sensitive government communications and revolutionizing industries such as healthcare, finance, and defense that rely on data protection.
With a focus on real-world implementation, Quantum Cryptography: Securing the Future with Quantum Tech also addresses the challenges of building a quantum-secure infrastructure. This involves creating systems and networks that can resist attacks from quantum computers, a task that requires significant research and development. It also discusses the importance of preparing for the quantum computing revolution and the role governments, businesses, and industries must play in transitioning to quantum-safe systems.
What you will find in this book:
Prepare to understand the future of secure communication in a world dominated by quantum technology.
This volume contains four articles written by personnel of the National Security Agency (NSA) about the Voynich manuscript from 1965 to 1978.
The first essay, by Brigadier John Tiltman, is entitled The Voynich Manuscript: The Most Mysterious Manuscript in the World and was presented to the Baltimore Bibliophiles in 1967. It provides a basic summary of facts about the manuscript and its provenance and adds a survey of proposed solutions, most of which it dispenses with quite quickly. I found it interesting to discover that Tiltman was first introduced to the Voynich ms. by William Friedman, founder of the NSA, in 1947 ( ) I was also intrigued that Tiltman's scholarly research into the history of medieval herbalism included consultations with leading English academics, no doubt during visits on Five Eyes business.
The second essay, originally classifed Top Secret Umbra, is An Application of PTAH to the Voynich Manuscript by Mary D'Imperio - the title itself was unclassified. A few pages in, I came to a full stop when I encountered this:
PTAH (named for the Egyptian god of wisdom), is a general statistical method developed at IDA (Institute for Defense Analyses), Princeton University. PTAH got its name when a programmer. Mr.Gerry Mitchell, was listening to the opera Aida while working on his program. He was struck by the passage immenso Ptah noi invociam, and named his program after the Egyptian god. The name was ultimately extended from this program, implementing a particular application of the method, to the method and its mathematical theory as well...
The technical meaning of PTAH remains classified, although Google helped me find a journal article that suggests PTAH must be some sort of Hidden Markov Model. (Math. Comput. Appl. 2019, 24, 14; doi:10.3390/mca24010014)
D'Imperio used PTAH to analyze the Voynich manuscript and similar works and concluded that I find the above comparisions quite convincing support for a view that the Voynich text, regarded as a string of single letters, does not 'act like' natural language. Instead, it exhibits a clear positional regularity or characters within words. I believe that these findings strengthen the theory of Friedman and Tiltman that an artificial language may underlie the Yoynich text.
Government interest dating back to 1947 ... pharmacology unknown to modern man ... artificial languages ... the movie ARRIVAL based on Ted Chiang's Story of Your Life ... hmmm ...
The third essay, also by D'Imperio, is An Application of Cluster Analysis and Multidimensional Scaling to the Question of 'Hands' and 'Languages' in the Voynich Manuscript. She uses cluster analytic techniques to examine findings by Captain Prescott Currier, who suggested that the manuscript's pages can be clustered into groups of multiple authors and styles. D'Imperio's discussion includes warnings that are still sound today: The interpretation of cluster analysis results is unavoidably circular; we propose a certain structure in the group of objects under study, we perform the computation, and we are happy if we see what we expected, or at least something that makes sense in terms of our original hypothesis, however revised.
The fourth and final essay, by James Child, takes an important step forward by proposing that the Voynich Manuscript does not contain an artificial language nor the enciphered text of an underlying text in an unknown language. but is a text in a hitherto unknown medieval North Germanic dialect.
People who enjoy works like THE DA VINCI CODE, PUZZLE PALACE, and Snowden will find this fascinating.
Views differ on bitcoin, but few doubt the transformative potential of Blockchain technology. The Truth Machine is the best book so far on what has happened and what may come along. It demands the attention of anyone concerned with our economic future. --Lawrence H. Summers, Charles W. Eliot University Professor and President Emeritus at Harvard, Former Treasury Secretary
From Michael J. Casey and Paul Vigna, the authors of The Age of Cryptocurrency, comes the definitive work on the Internet's Next Big Thing: The Blockchain.