Search Results
On November 2nd, 2015 with 19 comments
benrothke writes: It wasn't that long ago that building a full network security test lab was an expensive prospect. In The Network Security Test Lab: A...
Topics: Book Reviews →
Books,
Book Reviews,
Index
On September 17th, 2015 with 26 comments
New submitter sh0wstOpper writes: The topic of the Internet of Things (IoT) is gaining a lot of attention because we are seeing increasing amounts of "things",...
Topics: Book Reviews →
Books,
Book Reviews,
Index
On August 31st, 2015 with 71 comments
MassDosage writes: If you are familiar with the "Effective" style of books then you probably already know how this book is structured. If not here's a quick...
Topics: Book Reviews →
Books,
Python,
Book Reviews,
Index
On July 13th, 2015 with 33 comments
benrothke writes: Far too many technology books take a Hamburger Helper approach, where the first quarter or so of the book is about an introduction to the...
Topics: Book Reviews →
Books,
Cloud,
Book Reviews,
Index
On May 18th, 2015 with 270 comments
benrothke writes: The infinite monkey theorem states that a monkey hitting random typewriter keys for an infinite amount of time will eventually be able to...
Topics: Book Reviews →
Books,
The Military,
Book Reviews,
Index
On April 13th, 2015 with 33 comments
Saint Aardvark writes Michael W. Lucas has been writing technical books for a long time, drawing on his experience as both a system and a network...
Topics: Book Reviews →
Books,
Book Reviews,
Index
On March 31st, 2015 with 29 comments
Michael Ross writes As with any content management system, building a website using Drupal typically requires extensive use of its administrative interface, as...
Topics: Book Reviews →
Books,
Programming,
Book Reviews,
Index
On March 30th, 2015 with 27 comments
benrothke writes Technology is neutral and amoral. It's the implementers and users who define its use. In Future Crimes: Everything Is Connected, Everyone Is...
Topics: Book Reviews →
Books,
The Internet,
Book Reviews,
Index
On March 23rd, 2015 with 182 comments
Michael Ross writes In recent years, JavaScript has enjoyed a dramatic renaissance as it has been transformed from a browser scripting tool primarily used for...
Topics: Book Reviews →
Books,
PHP,
Programming,
Book Reviews,
Index
On March 9th, 2015 with 51 comments
benrothke writes Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, author Bruce Schneier could have justifiably written an...
Topics: Book Reviews →
Books,
Privacy,
Book Reviews,
Index
On March 5th, 2015 with 44 comments
MassDosage writes
As the full title to Lauren Ipsum: A story about Computer Science and Other Improbable Things indicates, this is a book about Computer...
Topics: Book Reviews →
Books,
Book Reviews,
Index
On January 28th, 2015 with 29 comments
benrothke writes Many organizations are overwhelmed by the onslaught of security data from disparate systems, platforms and applications. They have numerous...
Topics: Book Reviews →
Books,
Security,
Book Reviews,
IT,
Index
On January 19th, 2015 with 75 comments
Saint Aardvark writes If, like me, you administer FreeBSD systems, you know that (like Linux) there is an embarrassment of riches when it comes to filesystems....
Topics: Book Reviews →
Books,
Programming,
Book Reviews,
BSD,
Index
On December 17th, 2014 with 31 comments
MassDosage writes "At the the risk of exposing my age I remember building my first website using a rudimentary Unix text editor (Joe) and carefully...
Topics: Book Reviews →
Books,
Programming,
The Internet,
Book Reviews,
Index
On December 8th, 2014 with 82 comments
benrothke writes There are really two stories within Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door. The first...
Topics: Book Reviews →
Books,
Spam,
Book Reviews,
Index
On November 24th, 2014 with 92 comments
benrothke writes If SSL is the emperor's new clothes, then Ivan Ristic in Bulletproof SSL and TLS has shown that perhaps the emperor isn't wearing anything at...
Topics: Book Reviews →
Books,
Security,
Book Reviews,
Index
On November 10th, 2014 with 58 comments
benrothke writes A word to describe the book Takedown: The Pursuit and Capture of Americas Most Wanted Computer Outlaw was hyperbole. While the general...
Topics: Book Reviews →
Books,
Security,
Book Reviews,
Index
On October 27th, 2014 with 46 comments
benrothke writes It's hard to go a day without some sort of data about information security and risk. Research from firms like Gartner are accepted without...
Topics: Book Reviews →
Books,
Security,
Book Reviews,
Index
On October 13th, 2014 with 42 comments
First time accepted submitter sobczakt writes We live in a world flooded by data and information and all realize that if we can't find what we're looking for...
Topics: Book Reviews →
Books,
Book Reviews,
Apache,
Index
On September 8th, 2014 with 75 comments
benrothke writes Most books about cloud computing are either extremely high-level quasi-marketing tomes about the myriad benefits of the cloud without any...
Topics: Book Reviews →
Books,
Cloud,
Book Reviews,
Index
On August 4th, 2014 with 27 comments
benrothke writes Cyberwarfare is a controversial topic. At the 2014 Infosec World Conference, Marcus Ranum gave a talk on Cyberwar: Putting Civilian...
Topics: Book Reviews →
Books,
Book Reviews,
Index
On July 7th, 2014 with 26 comments
benrothke writes There is a not so fine line between data dashboards and other information displays that provide pretty but otherwise useless and unactionable...
Topics: Book Reviews →
Books,
Security,
Book Reviews,
Index
On June 16th, 2014 with 51 comments
benrothke (2577567) writes Having worked at the same consulting firm and also on a project with author J.J. Stapleton (full disclosure); I knew he was a really...
Topics: Book Reviews →
Books,
Security,
Book Reviews,
Index
On May 26th, 2014 with 56 comments
benrothke (2577567) writes "The only negative thing to say about Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is its title. A...
Topics: Book Reviews →
Books,
Security,
Book Reviews,
Index
On May 5th, 2014 with 27 comments
First time accepted submitter ericnishio (3641743) writes "Extending Bootstrap is a concise, step by step manual that introduces some of the best practices on...
Topics: Book Reviews →
Books,
Book Reviews,
Index
On April 7th, 2014 with 37 comments
Michael Ross (599789) writes "Web designers and developers nowadays are familiar with the critical decision they face each time before building an application...
Topics: Book Reviews →
Book Reviews,
Index
On April 2nd, 2014 with 102 comments
benrothke (2577567) writes "When it comes to documenting the history of cryptography, David Kahn is singularly one of the finest, if not the finest writers in...
Topics: Book Reviews →
Government,
Security,
Book Reviews,
Index
On March 31st, 2014 with 91 comments
jsuda (822856) writes "Most of us know that making money is difficult and saving it is even harder, but understanding money is easy–it's just coins and ...
Topics: Book Reviews →
The Almighty Buck,
Book Reviews,
Index
On March 3rd, 2014 with 32 comments
benrothke writes "When it comes to measuring and communicating threats, perhaps the most ineffective example in recent memory was the Homeland Security...
Topics: Book Reviews →
Books,
Security,
Book Reviews,
Index
On February 24th, 2014 with 83 comments
Saint Aardvark writes "If you're a Unix or Linux sysadmin, you know sudo: it's that command that lets you run single commands as root from your own account,...
Topics: Book Reviews →
Books,
Programming,
Book Reviews,
Index