Assorted reading, relevant and random, mostly referenced on the blog. Book links take you to Amazon. Enjoy!
|The post titled Builder, Breaker, Blather, Why alludes to a famous spy novel|
|Referenced in You’ve Violated APE Law!|
|(in the original French)|
|Referenced in Soylent Grün ist Menschenfleisch|
|Referenced in Carborundum Saw|
|Referenced in Electric Skillet|
|A few Shakespeare quotes appear in…|
|DRY Fiend (Conjuration/Summoning) –
Henry VI, Part II
|I’ll ne’er look you i’ the plaintext again –
|A Monstrous Confluence –
|“Crash Override offers an up close look inside the controversy, threats, and social and cultural battles that started in the far corners of the internet and have since permeated our online lives. Quinn uses her story–as target and as activist–to provide an accessible, personal, and human look at the ways the internet impacts our lives and culture.”
Infosec is not practiced in a vacuum. It is necessary, but not sufficient, for online safety. Also check out this guide.
|“The Offworld Collection, a gorgeous hardcover anthology of some of the most diverse and insightful writing about video games ever written, a sophisticated but accessible look at a digital landscape where all voices are welcome and small, simple experiences can reflect our humanity.”
Computers are for playing games as much as they’re for hacking. (Perhaps even more so!) The ebook is available separately at offworld.itch.io/offworld.
|“Tufekci speaks from direct experience, combining on-the-ground interviews with insightful analysis. She describes how the internet helped the Zapatista uprisings in Mexico, the necessity of remote Twitter users to organize medical supplies during Arab Spring, the refusal to use bullhorns in the Occupy Movement that started in New York, and the empowering effect of tear gas in Istanbul’s Gezi Park. These details from life inside social movements complete a moving investigation of authority, technology, and culture—and offer essential insights into the future of governance.”
People organize for many reasons, sometimes aided by technology, sometimes solely because of it, and sometimes despite it. Protests and movements for social change might embrace particular tools, but technology alone does not solve their challenges.
|“Geared toward women who are considering getting into tech, or those already in a tech job who want to take their career to the next level…”
The advice and stories are informative for men and women alike, and important for managers and mentors in tech who wish to support under-represented communities.
|“In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine…you’ll run through a series of practical lessons…. As you follow along with the labs and launch attacks, you’ll experience the key stages of an actual assessment…”
These tools and techniques lay the foundation for understanding how to assess the security of applications and networks.