Showing Blog Posts: 1–10 of 144 tagged Book Review

  • Book Review: The Woman Who Smashed Codes

    by Ben Rothke on January 19, 2018

    One of the challenges of working for the NSA, is that employees don’t have the freedom to share what they do with the professional community at large. Whether it is blogging, writing articles, participating in industry meetings or the like, NSA employees simply can’t do that. It’s not just the NSA, it pretty much every security agency of most countries. While many people think that public-key…

  • Book review: Serious Cryptography: A Practical Introduction to Modern Encryption

    by Ben Rothke on December 13, 2017

    Philosopher Alfred North Whitehead noted that modern philosophy is simply a series of footnotes to Plato. When it comes to cryptography, much of it is simply footnotes to Bruce Schneier’s classic work Applied Cryptography: Protocols, Algorithms and Source Code in C. In Serious Cryptography: A Practical Introduction to Modern Encryption (No Starch Press 978-1593278267), Jean-Philippe Aumasson has…

  • Book Review: Why CISOs Fail: The Missing Link in Security Management--and How to Fix It

    by Ben Rothke on November 17, 2017

    A recurring complaint of many executives when berating their CISO, is that they’ve spent exorbitant amounts on information security and often don’t have a lot to show for it. In Why CISOs Fail: The Missing Link in Security Management--and How to Fix It (Auerbach Publications 978-1138197893) author Barak Engel shows how these executives are at times correct. Engel has been in the information…

  • Ben's Book of the Month: Review of "From CIA to APT: An Introduction to Cyber Security"

    by Ben Rothke on October 31, 2017

    It’s unclear if Albert Einstein really said that if “you do not really understand something unless you can explain it to your grandmother”. Explaining information security is often a challenge. Many try to explain it to the uninitiated, and often don’t do that great of a job. For those looking for a technical introductory text, by authors who could explain it to your grandmother, consider From CIA…

  • Book Review: Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security

    by Ben Rothke on August 17, 2017

    Anyone who has taken a computer science or programming class will likely know of Brian Kernighan. He had significant contributions to the development of Unix, and also wrote the AWK and AMPL programming languages. For the last 20 years, he’s been a professor of computer at Princeton University. He is the author of many technical books. When I got his latest book Understanding the Digital World:…

  • NTP Security: A Quick-Start Guide

    by Ben Rothke on May 2, 2017

    What does stand-up comedy, networking and internet security have in common? Their ultimate success depends a lot on timing. When it comes to comedy, timing is measured in seconds. In networking and security, it’s in milliseconds. The use of the Network Time Protocol (NTP) has long been the gold-standard for network time synchronization. It’s been in use since the early 1980’s and is one of the…

  • American Spies: Modern Surveillance, Why You Should Care, and What to Do About It

    by Ben Rothke on March 6, 2017

    Return on investment (ROI) is a measure used to evaluate the efficiency of an investment. It measures the amount of return on an investment relative to its cost. To calculate ROI, the return of an investment is divided by the cost of the investment, and the result is expressed as a percentage or a ratio. If anyone would attempt to gauge the ROI spent by the National Security Agency (NSA) and…

  • Ben's Book of the Month: Review of "Hospital and Healthcare Security"

    by Ben Rothke on February 28, 2017

    When I first requested a copy of Hospital and Healthcare Security (Butterworth-Heinemann 012-4200486), I assumed it was brief high-level reference on the topic. Upon getting this monster of a book, I read as Tom Smith wrote in the forward, “this is the bible of healthcare security”. At just over 700 pages, the book is indeed a comprehensive reference for everything related to hospital and…

  • Audio Content Security: Attack Analysis on Audio Watermarking

    by Ben Rothke on February 21, 2017

    Watermarking is a covert marker meant to identify ownership. It has long been used in various forms to protect physical and digital products. For digital media, it’s used to protect copyright, intellectual property, content and more. If that watermark is attacked and compromised, the underlying security will be of no use. In Audio Content Security: Attack Analysis on Audio Watermarking (Syngress…

  • The Security Reading Room: The Best Information Security Books of 2016

    by Ben Rothke on February 5, 2017

    There were a lot of good information security books that came out in 2016, and many that were not worth reading. With that, here’s my list of the information security books stand out as the best, listed in no particular order: The Car Hacker's Handbook: A Guide for the Penetration Tester - plus ça change, plus c’est la même chose. Lots of features combined with poor security make cars the next big…

View All


Are you interested in contributing to the RSA Conference blog? Download our 2018 Editorial Calendar for more info. 

This document was retrieved from on Sun, 25 Feb 2018 12:40:43 -0500.