Trust in Computer Systems and the Cloud Book written by Mike Bursell Book review by Ben Rothke Bottom Line I recommend...
Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin Book written by Paul van Oorschot Book review by Ben Rothke Bottom Line I...
CISO Desk Reference Guide: A Practical Guide for CISOs Volume 1 Book written by Bill Bonney, Gary Hayslip, Matt Stamper Book review by Ben...
Zero Trust Networks: Building Secure Systems in Untrusted Networks Executive Summary Ken Thompson was the co-winner of the 1983 Turing Award. While...
The Hardware Hacker: Adventures in Making and Breaking Hardware Book written by Andrew Huang Book review by Ben Rothke Executive Summary Rarely...