Infosecurity Reviews
Review: CrimeDotCom - From Viruses to Vote Rigging, How Hacking Went Global
A review of Geoff White's look at the evolution of hacking
Review: Conquer The Web - The Ultimate Cybersecurity Guide
A review of the collaborative book on best practices, example scenarios and practical advice.
Review: Lessons Learned: Critical Information Infrastructure Protection
Reviewing a how-to for information security professionals on how to manage critical information infrastructure.
Review: "Multi Factor Authentication for Dummies"
The authors of the book have made sure to keep the content of the book highly consumable, even for the most novice of reader, using relatable and easy to understand examples of the concepts in practice.
Review: "Serious Cryptography- A Practical Introduction to Modern Encryption"
A review of Serious Cryptography – A Practical Introduction to Modern Encryption written by Jean-Philippe Aumasson,
Review: "Industrial Cyber Security for Dummies"
This book may be for Dummies, but any security professional in the utility sector will likely already have a deeper knowledge of ICS than this book offers.
Review: "Gray Hat C# - A Hackers Guide to Creating and Automating Security Tools"
A review of "Gray Hat C# - A Hackers Guide to Creating and Automating Security Tools".
Review: "Navigating The Digital Age: The Definitive Cybersecurity Guide for Directors and Officers "
For technical practioners it's a useful insight into how non-technical defenders think, for experienced cyber professionals it contains quotable supporting text combined with reassurance that the industry is finally changing
Review: 'Internet Security Fundamentals'
'Internet Security Fundamentals' by Nick Ioannou provides a comprehensive outline of the most common internet security threats an average user may face on a daily basis.
Review: 'Managing Cybersecurity Risk: How Directors and Corporate Officers Can Protect their Businesses'
Managing Cybersecurity Risk is a comprehensive and engrossing guide for organizations, of any size, that are yet to fully appreciate their exposure to an ever-growing landscape of cyber-threats
Review: 'The Car Hackers Handbook'
The Internet of Things (IoT) is getting noticed within the security community as an area which needs much improvement. Overall, though, IoT devices are just mini versions of desktops and servers. They run Linux or Windows variants and connect via Bluetooth, Wi-Fi and Ethernet. There is one exception: cars.
Review: 'Whaling for Beginners: Reputations'
Whaling for Beginners: Reputations by Jerome Vincent is the second instalment in AXELOS’ novella series exploring the topic of ‘Whaling’, the use of phishing techniques to specifically target board-level executives within cybercrime
Review: 'Whaling for Beginners'
This short story highlights the devastating impacts a cyber-attack can have on an organization’s hard won reputation, competitive advantage and market value.
Review: The CISSP Companion You Can’t Do Without
Shan Lee finds there is much to learn from Javvad Malik’s humor in his new e-book "The CISSP Companion Handbook"
Review: A Password System that Favors Puzzle Over Ease
Bruce Marshall finds that one book offers up anything but an easy password creation system
Review: Making Smart Grid Cybersecurity Accessible
Áine MacDermott finds "Applied Cyber Security and the Smart Grid" worth the time investment