In this interview, we talk to Kaustubh Dhondge, author of the book Lifecycle IoT Security for Engineers. We discuss the motivation behind writing the book, the target audience, the most useful aspects of the book, the challenges of writing the book, and advice for other engineers who are considering writing a book. Dr. Kaustubh Dhondge …
In this interview, we discuss to Bernhard Esslinger, author of the book, Learning and Experiencing Cryptography with CrypTool and SageMath. We discuss the motivation behind writing the book, the target audience, the most useful aspects of the book, the challenges of writing the book, and advice for other engineers who are considering writing a book. Bernhard Esslinger …
Artech House author Serge Borso gave us some interesting insights on your day-to-day internet security: I recently had the opportunity to teach a SANS class focused on Web Application Security and during the course of this training I met some great people. It’s always exciting to make connections with other security minded people, and in …
At Artech House, we ask our authors what problems their books can help readers solve. In this series, we share what our authors aim to do in their writing. Read on to find out what Serge Borso, who wrote The Penetration Tester’s Guide to Web Applications had to say: What are the features of your book …
When Artech House authors write their books, we ask them what they want their readers to get out of the project. In this series, we show you what our authors, in their own words, wish to impart upon readers. Serge Borso, author of The Penetration Tester’s Guide to Web Applications, describes what his book is …
When Artech House authors write their books, we ask them what they want their readers to get out of the project. In this series, we show you what our authors, in their own words, wish to impart upon readers. Ari Takanen, author of Fuzzing for Software Security Testing and Quality Assurance, Second Edition, describes what …
This book provides a comprehensive introduction into cryptography and the current state of the art. It starts with an overview about cryptography as a field of study and the various unkeyed, secret key, and public key cryptosystems that are available, and it then delves more deeply into the technical details of the systems. The goal …
Recently, I have seen many more discussions about cybersecurity breaches. Could this be down to many more people working from home? Or is expected due to the increase of technology in our day-to-day lives? Or both? This Forbes article from 2018 – https://www.forbes.com/sites/sallypercy/2018/11/27/the-top-three-business-priorities-for-leaders-over-the-next-three-years/?sh=26358f834ec9 – said that companies would be making cybersecurity and big data one …
We are thrilled to share Series Editor Rolf Oppliger’s insights into E2EE and their role in messaging and conferencing security: Does E2EE Provide Messaging and Conferencing Security? Since the triumphant advance of Internet messaging in general, and the revelations of Edward Snowden in particular, people have talked a lot about end-to-end encryption (E2EE) and why …
Authors of Medical Device Cybersecurity for Engineers and Manufacturers Axel Wirth and Chris Gates share what prompted them to write their book: Chris: I was born to this. I really didn’t have a choice. My father was an E.E. in the broadcast industry (radio and television) so I grew up around electronics. I was soldering …