In this interview, we talk to Joe and James authors of the book Cryptography and Satellite Navigation. We discuss the motivation behind writing the book, the target audience, the most useful aspects of the book, the challenges of writing the book, and advice for other engineers who are considering writing a book. Joe Rushanan has …
In this interview, we talk to Axel, Christopher, and Jason authors of the book Medical Device Cybersecurity for Engineers and Manufacturers, Second Edition. We discuss the motivation behind writing the book, the target audience, the most useful aspects of the book, the challenges of writing the book, and advice for other engineers who are considering …
In this interview, we talk to Kaustubh Dhondge, author of the book Lifecycle IoT Security for Engineers. We discuss the motivation behind writing the book, the target audience, the most useful aspects of the book, the challenges of writing the book, and advice for other engineers who are considering writing a book. Dr. Kaustubh Dhondge …
In this interview, we discuss to Bernhard Esslinger, author of the book, Learning and Experiencing Cryptography with CrypTool and SageMath. We discuss the motivation behind writing the book, the target audience, the most useful aspects of the book, the challenges of writing the book, and advice for other engineers who are considering writing a book. Bernhard Esslinger …
Artech House author Serge Borso gave us some interesting insights on your day-to-day internet security: I recently had the opportunity to teach a SANS class focused on Web Application Security and during the course of this training I met some great people. It’s always exciting to make connections with other security minded people, and in …
At Artech House, we ask our authors what problems their books can help readers solve. In this series, we share what our authors aim to do in their writing. Read on to find out what Serge Borso, who wrote The Penetration Tester’s Guide to Web Applications had to say: What are the features of your book …
When Artech House authors write their books, we ask them what they want their readers to get out of the project. In this series, we show you what our authors, in their own words, wish to impart upon readers. Serge Borso, author of The Penetration Tester’s Guide to Web Applications, describes what his book is …
When Artech House authors write their books, we ask them what they want their readers to get out of the project. In this series, we show you what our authors, in their own words, wish to impart upon readers. Ari Takanen, author of Fuzzing for Software Security Testing and Quality Assurance, Second Edition, describes what …
This book provides a comprehensive introduction into cryptography and the current state of the art. It starts with an overview about cryptography as a field of study and the various unkeyed, secret key, and public key cryptosystems that are available, and it then delves more deeply into the technical details of the systems. The goal …
Recently, I have seen many more discussions about cybersecurity breaches. Could this be down to many more people working from home? Or is expected due to the increase of technology in our day-to-day lives? Or both? This Forbes article from 2018 – https://www.forbes.com/sites/sallypercy/2018/11/27/the-top-three-business-priorities-for-leaders-over-the-next-three-years/?sh=26358f834ec9 – said that companies would be making cybersecurity and big data one …