Book review: Foundations of Security (Part 3 Introduction to Cryptography)
Chapter 12: Symmetric Key Cryptography The chapter starts with an introduction to cryptography that consists in explaining some notations and terminology. Then the block ciphers are explained and the...
View ArticleBook review: Hacking – the art of exploitation, 2-end edition
This is a review of the Hacking – the art of exploitation, 2-end edition book. Chapter 0×100 Introduction Very short chapter (2 pages and 1/2) in which the author gives his definition of a hacker;...
View ArticleBook review: Basics of Web Hacking (Tools and Techniques to Attack the Web)
This is a review of The Basics of Web Hacking: Tools and Techniques to Attack the Web. Chapter 1: The basics of Web Hacking The chapter starts with a quick introduction to some fundamental notions of...
View ArticleBook review: Continuous Enterprise Development in Java
This is a very short review of the Continuous Enterprise Development in Java book. The book can be easily split in two parts. The first part of the book from chapter 1 to chapter 4 contains general...
View ArticleBook review: Software Security: Building Security in – Part I: Software...
This is a review of the first part of the Software Security: Building Security in book. Chapter 1: Defining a discipline This chapter lands out the landscape for the entire book; the author presents...
View ArticleBook review: Software Security: Building Security in – Part II: Seven...
This is a review of the second part of the Software Security: Building Security in book. Chapter 3: Introduction to Software Security Touchpoints This is an introductory chapter for the second part of...
View ArticleBook review: Software Security: Building Security in – Part III: Software...
This is a review of the third part of the Software Security: Building Security in book. This part is dedicated to how to introduce a software security program in your company; it’s something that I’m...
View ArticleBook review: Building microservices (part 1)
This is the first part of the review of the Building Microservices book. Chapter 1: Microservices This first chapter is a quick introduction to microservices, the definition, the concept genesis and...
View ArticleBook review: Iron-Clad Java Building Secure Web Applications
This a review of the Iron-Clad Java: Building Secure Web Applications book. (My) Conclusion I will start with the conclusion because it’s maybe the most important part of this review. For me this is a...
View ArticleBook review : Practical Anonymity: Hiding in Plain Sight Online
This is a review of the Practical Anonymity: Hiding in Plain Sight Online book. Conclusion This is not a technical book about the inner workings of Tor or Tails and I think a better title would be “How...
View Article
More Pages to Explore .....