Category: Book-Review

Book Review: RESTful Web APIs by Leonard Richardson and Mike Amundsen

For the past few months, much of my time has been absorbed by my senior design project at UAH. Setting aside the specifics of what my group and I are working on, the design calls for a web service that has an open API to allow for the simple creation...

Book Review: Hackers by Steven Levy

*Hackers* is Steven Ley's attempt to trace the roots of hacker culture to its beginnings. That is, hackers in the sense of people for whom learning about and building upon technology is a way of life, not hackers in the sense of criminals breaking into computer systems. This is one...

Book Review: Version Control with Git by Jon Loeliger and Matthew McCullough

**Version Control with Git** is pretty much what you would expect, a book all about using Git as a version control system. This book is written to be picked up by a developer entirely unfamiliar with Git, and as such starts out by explaining how to install Git in Linux...

Book Review: CODE by Charles Petzold

**CODE** takes a reader from humble beginnings of communications using flashing lights, to telegraphs and the invention of the relay, to a (relatively) modern computer by the end of the book, making many stops along the way to detail each stage of the evolution of a modern, digital computer. At...

Book Review: Security Engineering by Ross Anderson

**Security Engineering** is all about designing and building secure systems. Unlike many security books, this one attempts to cover the entire range of security engineering, ranging from cryptography, access control and similar technologies, into security policy, and even into the macro scale of governmental policies. Of course, this is a...

Book Review: Threat Modeling by Frank Swiderski and Window Snyder

Threat modeling is something that probably should be done whenever developing a complex system, especially software, but all too often isn't. In part this deficiency is caused by lack of knowledge about threat modeling - not many people are talking or writing about it. Much of what is written about...

Book Review: Counterhack Reloaded by by Ed Skoudis and Tom Liston

Shortly after having read [Malware](/book-review-malware-fighting-malicious-code-ed-skoudis-lenny-zeltser.html) by Ed Skoudis, I decided I was willing to give any security book he wrote a reading. And, indeed, this was a good decision. **Counterhack Reloaded**, an expansion of the original **Counterhack** (Mr. Skoudis likes the Matrix movies it seems),proves to be a great introduction...

Book Review: Computer Security by Dieter Gollmann

Computer Security is, as you may have guessed, a book about computer security, specifically, it a textbook intended to be used along with a upper level undergrad course, or a graduate course. However, I found that it served well as a standalone book to educate yourself on basic computer security,...