As a digital forensics and incident response (DFIR) professional with over two decades in IT, I have always felt a bit like a “security noob” when it comes to deep cryptographic principles. So when I picked up Cryptography Algorithms – Second Edition by Massimo Bertaccini, I was hoping for something that could bridge the gap between my foundational knowledge and the increasingly complex world of cryptography. Here’s my take.
Tag: Cybersecurity
Mastering Powershell Scripting by Chris Dent (REVIEW)
Mastering PowerShell Scripting – Fifth Edition: Automate repetitive tasks and simplify complex administrative tasks using PowerShell by Chris Dent is an outstanding resource tailored for IT professionals, system administrators, and developers aiming to maximize the potential of PowerShell scripting. This updated edition offers a thorough exploration of the latest advancements in PowerShell, providing a deep…
The Ultimate Kali Linux Book: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting, Third Edition by Glen D. Singh (REVIEW)
“The Ultimate Kali Linux Book: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting, Third Edition” by Glen D. Singh is an essential read for anyone serious about penetration testing and cybersecurity. As an industry staple, Kali Linux provides a robust platform for security professionals to test and secure systems, and Singh’s book offers an…
Black Hat Python by Justin Seitz and Tim Arnold (REVIEW)
If you’re diving into the world of ethical hacking and penetration testing, “Black Hat Python: Python Programming for Hackers and Pentesters” by Justin Seitz and Tim Arnold is an essential read. Published by No Starch Press, this book is a treasure trove of practical knowledge and hands-on techniques that cater to both budding and seasoned…
Dead Simple Python Idiomatic Python for the Impatient Programmer by Jason C. McDonald (REVIEW)
“Dead Simple Python: Idiomatic Python for the Impatient Programmer” by Jason C. McDonald is a gem in the realm of Python programming literature, offering a refreshing and concise approach to mastering the language for both novice and seasoned developers alike. In a landscape often cluttered with verbose technical manuals, McDonald’s book stands out for its…
The Art of Cyberwarfare: An Investigator’s Guide to Espionage, Ransomware, and Organized Cybercrime by Jon DiMaggio (REVIEW)
In “The Art of Cyberwarfare: An Investigator’s Guide to Espionage, Ransomware, and Organized Cybercrime” by Jon DiMaggio, readers are presented with a compelling exploration of this complex landscape and are equipped with essential strategies for defence. DiMaggio adeptly opens the discussion by tracing the evolution of cyber threats, from the innocuous Yankee Doodle virus of…
Interview with Hacker, Programmer and Former Armoured Recon Patrol Commander Leigh Trinity
Today, I have the privilege of sitting down with a remarkable individual who I have been friends with for a while now, a former armored recon patrol commander, she has traded the battlefield for the digital frontier, wielding her skills in C# and Python to fortify systems against potential threats. But that’s not all—beyond the…
Mastering Linux Security and Hardening: Safeguard Your Linux Systems from Cyber Threats – 3rd Edition by Donald A. Tevault (REVIEW)
In my early career, I ventured into the realm of application support and to ensure that the critical software tools, indispensable to the work of geologists and paraphysicists, operated seamlessly. This was the backdrop for my journey into the world of Linux. During those days, the mighty Red Hat Enterprise Linux 5 machine was my…
Cybersecurity, Threats, Malware Trends & Strategies by Tim Rains 2nd Edition REVIEW
In the ever-changing landscape of cyber threats, malware, and data protection, Tim Rains’ book Cybersecurity, Threats, Malware Trends & Strategies provides an invaluable look into the current and future state of cyber security. With a wealth of knowledge and insights garnered from his time as a director at Microsoft’s Cybersecurity Solutions Group, Rains is able…
Practical Linux Forensics, A Guide for Digital Investigators by Bruce Nikkel for No Starch Press REVIEW
This book is a comprehensive and informative guide for those interested in digital forensics and investigations. The book covers a wide range of topics related to forensic analysis of Linux systems, including data acquisition, evidence preservation, and various forensic techniques. It is a fantastic read, even before going deep into it forensically, the digital and…