Pular para o conteúdo principal

10 security books for the future

10 security books for the future: "
An ever-evolving list of books “to be read” is a constant temptation. Chad Perrin hopes his top 10 list of security books he wants to acquire might tempt some of his readers, too.





As should anyone serious about developing generalized security knowledge, I have my fingers in a lot of pies, so to speak. Among other things, this means that I am really a very busy guy. It is normal for me to be in the middle of reading no fewer than three books, at least one of which is about security and/or programming, at any given time.

I have been thinking about what books to read next. I have enough on my shelves to keep me busy for a while, but when I think about what books to read I inevitably start thinking about what books I want to buy for the future. My current short list of security-related books to buy takes the form of an Amazon wish list I call my Security Queue. Whether my intention is to learn something new or to just explore additional approaches and alternative views on subjects with which I am already conversant, all the following books make me want to reach for my wallet.

1. Software Security Library Boxed Set


It seems appropriate to start a list of ten security books I want to read by cheating a little. The first item in this list is actually a boxed set of three books. Author Gary McGraw had a hand in all three of these books, with the help of co-authors John Viega and Greg Hoglund. The titles include:

  • Building Secure Software: How to Avoid Security Problems the Right WaySporting a picture of a white cowboy hat, and colloquially referred to as The White Hat Book, this volume addresses the need to start security with the design of the software itself.
  • Exploiting Software: How to Break CodeAdorned with an image of a black cowboy hat, and colloquially referred to as The Black Hat Book, this volume addresses the matter of software security from the attacker’s perspective. It purports to provide valuable insights into the needs and techniques of secure software development by giving developers an outsider’s view of their work.
  • Software Security: Building Security InThe last volume of the trilogy is marked by the Taoist symbol of opposing forces — Yin and Yang — in balance, each side decorated with either a white or black cowboy hat. According to its description on Amazon, this book “unifies the two sides of software security–attack and defense, exploiting and designing, breaking and building–into a coherent whole.”

Reviews suggest there is a little redundancy between the books, because they are intended to be able to stand alone as well as working together as a set, but accounts tend to agree that the Software Security Library Boxed Set is a worthwhile purchase.

2. Applied Cryptography


Bruce Schneier’s classic tome on the subject of “Protocols, Algorithms, and Source Code in C” for cryptographic tool development is pretty much universally regarded as a must-read foundational text for the would-be security software developer. It is old enough now that some of what it has to say must be taken with a grain of salt, of course, but its value as a technical introduction to cryptography is by all accounts timeless. It is really surprising that I still have not found the time to read it.

3. Practical Cryptography


Co-authored by Niels Ferguson and Bruce Schneier, this book reputedly takes a more human-centric approach approach to the topic of developing cryptographic tools and systems. Schneier has lamented his more purely technical approach to addressing the topic of cryptographic systems in Applied Cryptography as ignoring the importance of the human factor in secure systems design, and this book serves at least in part as an answer to that problem. I intend to read it as a follow-up to Schneier’s earlier text.

4. PGP & GPG


I normally do not spend money on books and other resources that are essentially feature guides to specific pieces of software. Even when I buy books about particular operating systems (or families of them), I tend to try to select those that take a generalized enough approach that the information presented is applicable to other systems, and this policy has served me well over the years.

This book appears to land somewhere between a text about specific tools and a more generalized approach to dealing with a software use topic. It specifically addresses both the PGP and GnuPG (also known as GPG) encryption tools, but it also discusses the ways public key cryptography can serve the reader well in providing cryptographic privacy protection using the OpenPGP protocol. Overall, it appears to be a good choice for continuing to flesh out my understanding of the practical individual uses of public key cryptography.

5. The Book of PF


Continuing my trend of making an exception to the “no specific application books” policy, this is about the OpenBSD project’s firewall, PF (short for Packet Filter). It is also available on other OSes, including my current favorite, FreeBSD — and it is the firewall software I am using right now.

I make this exception to the usual policy of not spending money on books and other resources specific to a given piece of software mostly because I have not come up with a single reason to adhere to it in this case. A quick read about the uses and configuration of PF seems to be made up entirely of benefits from my perspective.

6. Fuzzing: Brute Force Vulnerability Discovery


The topic of fuzzing is one I simply need to examine in more depth than I already have. My knowledge and experience in this area is woefully lacking, compared to other security subject areas that serve some interest or importance in my life. In addition to gaining greater insight into the security challenges facing software developers, I also hope that reading this book might put me on the path to being more directly helpful to the developers of certain software projects, and to being better able to ensure the security of the software I write myself.

7. Reversing: Secrets of Reverse Engineering


In the area of reverse engineering, I am long on theory and short on practice. While I hope this book will give me more depth and breadth in the theory area, my greatest desire for this book is that it will point me toward improving my practical knowledge of the techniques of reverse engineering. Aside from security crackers, the security benefits of a strong knowledge of the techniques and uses of reverse engineering also apply to security researchers and developers of secure software.

8. The Tao of Network Security Monitoring


There is always room to improve in the realm of detecting, and addressing, security compromises. As the Amazon description of the book says:

Network security monitoring (NSM) equips security staff to deal with the inevitable consequences of too few resources and too many responsibilities. NSM collects the data needed to generate better assessment, detection, and response processes—resulting in decreased impact from unauthorized activities.

If that is not a good reason to learn something about network security monitoring in the IT industry, I do not know what is.

9. Security Warrior


The description on the Amazon site really covers this book for me.

Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It’s often scary, and never comforting. If you’re on the front lines, defending your site against attackers, you need this book. On your shelf–and in your hands.

10. Hacking: The Next Generation


An ambitious attempt to map out the near future of information systems security, Hacking is the sort of book that looks like it will be a fun and intriguing read — as long as I get around to it in the next year or so. Topics like the present and near future information security context of our world come with a well hidden expiration date, because they attempt to address the concrete realities and developing trends of extremely fast-moving fields. They can also prove incredibly valuable, and having thumbed through this one in a local bookstore not long ago I have high hopes for it.


Are there security texts I should add to my list? Do any of you have any experience with these books?
Obviously, this list may change in the future. With luck, anyone who feels a desire to keep up with those changes — including me — will find it worthwhile.




"

Comentários

Postagens mais visitadas deste blog

Improve Windows Security By Closing Open Ports

Improve Windows Security By Closing Open Ports : " A standard Windows operating system has a number of ports open after installation. Some of these ports are needed for the system to function properly while others might not. These ports can pose a security risk as every open port on a system might be an entry point for a malicious user. A port basically allows communication to or from the device. Characteristics are a port number, an IP address and a protocol type. This article will give you the tools at hand to identify and evaluate the open ports on your Windows system to make a decision in the end whether they can or should be closed or left open. Software programs and tools that we will use: CurrPorts : Available for 32-bit and 64-bit editions of Windows. It is a port monitor that displays all open ports on a computer system. We will use it to identify the ports and the programs that are using them. Windows Task Manager: Also used to identify the programs and link some p

Diagnosing a Blue Screen of Death Error in Windows

Diagnosing a Blue Screen of Death Error in Windows : For many years now the famous Blue Screen of Death (BSoD) has been the ultimate indication that something disastrous has happened to make your computer die, but how useful is the information in the BSoD and the respective crash dump file that Windows produces? The best article I ever found explaining the BSoD in depth is here on the Microsoft website, however it’s quite technical and doesn’t discuss how to actually troubleshoot a problem. The crash dump file is just technical details of what was being held in the computer’s memory at the time of the crash, and this will include details on every driver and service that was loaded, and every piece of software that was running. The most useful pieces of information are to be found on the BSoD itself and are highlighted on the screenshot below. These are the BSoD error name, the stop error code and the name of the driver or service that has failed (this last one might not always appea

Use Sysinternals Active Directory Explorer to make a domain snapshot

Use Sysinternals Active Directory Explorer to make a domain snapshot : " Active Directory is one of Microsoft’s best products ever in my opinion. It allows for an incredible amount of control of computer and user accounts, and there is so much more under the hood. The free Sysinternals Active Directory Explorer tool allows administrators to quickly look at information for the entire domain, as well as take a snapshot for comparison at a later date. The tool should not replace any of the Active Directory tools for everyday use, but rather supplement them for snapshots or a view into specific configuration. Once Active Directory Explorer is installed, the basic authentication screen appears to connect to a database ( Figure A ). Figure A Click the image to enlarge. It’s not ideal, but you can create objects, such as a user account, within the Active Directory Explorer tool ( Figure B ). Figure B Click the image to enlarge. Creating a snapshot of the Active Directory domain ( Figure