Cyber Security Books

Wiley: The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity - Phil Quade Wiley:
Virus Bomb: A Novel  by D. Greg Scott (Author) Real superheroes are ordinary people who step up when called. Jerry Barkley never
cybersecurity books
Cyber-Kinetic Security Book by Marin Ivezic - Marin Ivezic Cyber-Kinetic Security Book by Marin Ivezic - Embedding Cybersecurity Into the
Reading The Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World, Joseph Menn’s impressive

The technology publishing industry is now releasing numerous cyber security books every year. Some are highly technical in nature, such as those published by Manning Publications. Others are based on cyber security research. Some, like Jim Sciutto’s The Shadow War, are not primarily about cyber security, but rather deal with urgent national security issues that relate to cyber security and cyber espionage.

Why Read Cyber Security Books?

Books about cyber security are helpful for many reasons. For one thing, they often provide good explanations for extremely complex topics. They can help non-technical people understand deep technological issues that affect security. Like, what’s ransomware? Most people have a general idea of how ransomware works, but a good cyber security book can spell out the threat and its impact in plain English.

Going in the other direction, a cyber security book can explain business, public policy or national security issues to a cyber security practitioner. There is a great need for this kind of cross-disciplinary dialogue. Many cyber security analysts and topical experts lack a firm grasp of the broader legal and public policy issues that affect their work.

 

Books about Political Philosophy that Deal with Cyber Security

Cyber security, cyber threats and digital disinformation—which is a form of cyberattack, at a deep level—make appearances in several recent books about political philosophy. For example, Timothy Snyder’s The Road To Unfreedom, as well as his short book, On Tyranny, examine the impact of digital technology on political sensibilities. They discuss the potentially devasting impact of cyberattacks from political actors like the Russian FSB security services on vulnerable countries like Ukraine.

 

Cyber Security Books about Public Policy

There have been some excellent recent books that deal with cybersecurity in the contexts of public policy and military strategy. For instance, Cyberspace in Peace and War, written by Professor Martin C. Libicki at the US Naval Academy, provides the reader with a comprehensive technological and military overview of cyberwar. It happens to be remarkably thorough in dealing with some very complex issues.

The author introduces the subject with a detailed review of cyberattacks. He then defines the main approaches to cyberdefense, delving into the tricky conversation about what the government should or should do about the problem.

 

 

Wiley: The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity – Phil Quade

Wiley: The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity – Phil Quade

Wiley: The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity – Phil Quade

 

 

FOR IMMEDIATE RELEASE:

 

 

The Digital Big Bang: A Must-Read for CISOs Leading Security Innovation in the Digital Age

 

Industry leaders reveal the connection between fundamental and scientific principles and cybersecurity best practices.

Hoboken, NJ (September 5, 2019) – Released today, The Digital Big Bang: The Hard Stuff, The Soft Stuff, And the Future of Cybersecurity, explores approaching cybersecurity like science. Like the scientists of centuries ago, who led the search for knowledge about the cosmic big bang, space and the science behind it, this book includes thoughtful observations, hypothesis, and conclusions on cyberspace and the ‘digital’ big bang from many of today’s cybersecurity leaders, making it a must-read for CISOs. The book is authored by Phil Quade, who brings three decades of security experience in numerous private and government organizations.

 

Further, more than 30 of the most accomplished leaders in the cybersecurity field contribute to The Digital Big Bang, sharing their knowledge and experience from working on the front lines in an industry that keeps changing in the world of digital transformation.  These contributors represent the most important industries and organizations globally, including academia, airlines, financial management, healthcare and government.

 

Cybersecurity subjects that The Digital Big Bang covers:

·         Speed and connectivity; the core and binding strategies of cybersecurity

·         Authentication, patching, and training; frequent elementary shortfalls

·         Cryptography, access control, and segmentation; fundamental and proven strategies

·         Visibility, inspection, and failure recovery; advanced strategies and sophisticated cybersecurity operations

·         Complexity, privacy, and human frailty; higher-order dimension factors that can eclipse computing wizardry

·         The future of cybersecurity, including AI, ML and securing hyperconnectivity

 

“Embracing cybersecurity as a science can be an incredibly powerful and effective way to underpin innovation.” – Phil Quade, author of The Digital Big Bang: The Hard Stuff, The Soft Stuff, And the Future of Cybersecurity

 

About the author: Phil Quade is the CISO of Fortinet (NASDAQ: FTNT). Phil brings more than three decades of cyber intelligence, defense, and attack experience working across foreign, government, and commercial industry sectors at the National Security Agency (NSA) and partner organizations, such as US Cyber Command, the CIA, and others.

 

About the book: The Digital Big Bang: The Hard Stuff, The Soft Stuff, And the Future of Cybersecurity (Wiley, September 2019, ISBN: 978-1-119-61736-5, $29.99, 336 pages).

 

Press Contact: For review copies of the book, interviews with the author, excerpt requests, or any additional information, please contact: Amy Laudicano, Wiley – alaudicano@wiley.com.

 

 

 

###

Virus Bomb

Virus Bomb: A Novel 

Real superheroes are ordinary people who step up when called.

Jerry Barkley never worked for the government. An IT contractor from Minnesota, he knows nothing about International espionage. But now he’s on the front lines of the largest cyber-attack in history and nobody believes his warnings when Jerry discovers the attackers are gathering data to plan a series of bombings and a biological attack. To make things worse, the FBI suspects he’s the attacker.

Hundreds have already died in bombings and thousands more could die, first from Ebola and then potentially from war with the wrong enemy. Facing willful ignorance and a hostile law-enforcement bureaucracy, Jerry is forced to take action. If he doesn’t, who will? He must leave his keyboard comfort zone, armed with nothing but IT skills and quick wits, and go face-to-face with elite foreign agents and shut the attack down.

 

About the Author

D. Greg Scott is a veteran of the tumultuous IT industry. Greg graduated from Wabash College in Crawfordsville, Indiana with a double major of math and speech and earned an MBA from the University of St. Thomas in Minneapolis. He started Scott Consulting and Infrasupport Corporation with a laser focus on infrastructure and security. He currently works for an enterprise software company and holds several IT industry certifications, including CISSP number 358671. Greg lives in the Minneapolis/St. Paul metro area with his wife, daughter, and two grandchildren.

Cyber-Kinetic Security Book by Marin Ivezic – Marin Ivezic

Cyber-Kinetic Security Book by Marin Ivezic – Marin Ivezic

Cyber-Kinetic Security Book by Marin Ivezic – Embedding Cybersecurity Into the Physical World – When hackers threaten your life

Cyber-Kinetic Security Book by Marin Ivezic – Marin Ivezic

Book Review: The Cult of the Dead Cow

Reading The Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World, Joseph Menn’s impressive account of one of the earliest and most influential hacking communities, is to be immersed in a world you thought you knew, but probably didn’t. Menn, a college classmate of mine and longtime cybersecurity reporter for Reuters, pulls off a difficult feat in the book. While telling the basic story of the group in detail, he pulls in relevant cultural, political, technological, ideological and economic contexts. He does so without ever getting boring or succumbing to the “hipper than thou” ethos that frequently characterizes writing about hacker culture. Hackers are interesting, but worshipping them is not a great way to understand what their work really meant.

The Cult of the Dead Cow began as a very modest dial-up bulletin board for isolated teenagers in Texas in the 1980s. In fascinating detail, Menn chronicles the obsessions of the age, including the use and abuse of phone companies. He pays homage to the “phone phreaks” who set the stage for the hackers of the 1980s and beyond. The book also reveals the connections between phone phreak/early hacking culture and the development of what we might think of as the entire consumer technology industry of today.

As the book describes, the group grew to include some of the most talented hackers of that generation. Over time, the group developed a method of approaching cybersecurity that they felt was fair and within an ethical framework they defined and adhered to. The release of the “Back Orifice” malware in the 1990s, which forced Microsoft to admit to, and then correct serious security flaws in Windows 95 and 98, was one of their most famous stunts.

Individual members of the group were involved in many of the most critical (and often classified) hacking exercises undertaken at the behest of the US government. The group was also a pioneer in “hacktivism,” helping political causes through cyber means. Menn is able to show how the group came to grips with the reality that hacktivism, while pure in motive for some, might be the malicious tools of unsavory entities—a difference that could be impossible to spot.

The media has focused on Beto O’Rourke’s membership in the group. Menn addresses this, but it’s not the main thrust of the book. The principal idea Menn seems to want to present is how groups of people with skills and ethics can come together and make a difference.

Menn is also not afraid to say out loud what a lot of people think: that cybersecurity problems today are at least partly the result of terrible business and engineering decisions made a generation ago. These decisions caused problems that still exist and have never truly been remediated due to corporate greed and excessive corporate influence on policymakers.

Buy the book: