Quantcast
Channel: Book Review – Adventures in the programming jungle
Browsing latest articles
Browse All 15 View Live

Image may be NSFW.
Clik here to view.

Book review: Foundations of Security (Part 3 Introduction to Cryptography)

Chapter 12:  Symmetric Key Cryptography The chapter starts with an introduction to cryptography that consists in explaining some notations and terminology. Then the block ciphers are explained and the...

View Article



Image may be NSFW.
Clik here to view.

Book review: Hacking – the art of exploitation, 2-end edition

This is a review of the Hacking – the art of exploitation, 2-end edition book. Chapter 0×100 Introduction Very short chapter (2 pages and 1/2) in which the author gives his definition of a hacker;...

View Article

Image may be NSFW.
Clik here to view.

Book review: Basics of Web Hacking (Tools and Techniques to Attack the Web)

This is a review of The Basics of Web Hacking: Tools and Techniques to Attack the Web. Chapter 1: The basics of Web Hacking The chapter starts with a quick introduction to some fundamental notions of...

View Article

Image may be NSFW.
Clik here to view.

Book review: Continuous Enterprise Development in Java

This is a very short review of the Continuous Enterprise Development in Java book. The book can be easily split in two parts. The first part of the book from chapter 1 to chapter 4 contains general...

View Article

Image may be NSFW.
Clik here to view.

Book review: Software Security: Building Security in – Part I: Software...

This is a review of the first part of the Software Security: Building Security in book. Chapter 1: Defining a discipline This chapter lands out the landscape for the entire book; the author presents...

View Article


Image may be NSFW.
Clik here to view.

Book review: Software Security: Building Security in – Part II: Seven...

This is a review of the second part of the Software Security: Building Security in book. Chapter 3: Introduction to Software Security Touchpoints This is an introductory chapter for the second part of...

View Article

Image may be NSFW.
Clik here to view.

Book review: Software Security: Building Security in – Part III: Software...

This is a review of the third part of the Software Security: Building Security in book. This part is dedicated to how to introduce a software security program in your company; it’s something that I’m...

View Article

Image may be NSFW.
Clik here to view.

Book review: Building microservices (part 1)

This is the first part of the review of the Building Microservices book. Chapter 1: Microservices This first chapter is a quick introduction to microservices, the definition, the concept genesis and...

View Article


Image may be NSFW.
Clik here to view.

Book review: Iron-Clad Java Building Secure Web Applications

This a review of the Iron-Clad Java: Building Secure Web Applications book. (My) Conclusion I will start with the conclusion because it’s maybe the most important part of this review. For me this is a...

View Article


Image may be NSFW.
Clik here to view.

Book review : Practical Anonymity: Hiding in Plain Sight Online

This is a review of the Practical Anonymity: Hiding in Plain Sight Online book. Conclusion This is not a technical book about the inner workings of Tor or Tails and I think a better title would be “How...

View Article
Browsing latest articles
Browse All 15 View Live




Latest Images