Skip to main content

Want to Submit a Review?

Posted: 

Book Review Requirements

All book reviews must have four sections. Optionally, you can include a Sources and/or References section:

  • Title
  • Recommendation: Hall of Fame Winner, Niche, or Do Not Read
    • Niche = “Good if you’re interested in the specific topic"
    • Do Not Read = “Book is poorly written and/or contains inaccuracies or errors”
    • Hall of Fame Worthy = "Must-read books for all cybersecurity practitioners"
  • Executive Summary
  • Review
  • Conclusion
  • Sources (Optional)
  • References (Optional)

Title:
Cybersecurity Canon Candidate Book Review: “[Book Title] by [Book Author],” Book Reviewed by [Reviewer Name, Title], [DATE]

Example:
Cybersecurity Canon Candidate Book Review: “Spam Nation: The Inside Story of Organized Cybercrime – from Global Epidemic to Your Front Door (2014) by Brian Krebs,” Book Reviewed by Rick Howard, Palo Alto Networks CSO, 24 November 2014.


Executive Summary

Write a 250-word executive summary for those readers who do not want to take the time to read your 1500-word review at the moment.


Review

You are making the case that this book should or should not be inducted into the Cybersecurity Canon Hall of Fame. Here is the criteria:

To identify a list of must-read books for all cybersecurity practitioners – be they from industry, government or academia — where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.

Think of placing the book into one of three categories: Hall of Fame worthy, not hall of fame but might have some niche interest for some, and “do not read.” Reviews are between 800 and 1,500 words, not including the executive summary.


Conclusion

This is where you summarize your final arguments for the Review. You know you have a good conclusion if you feel like you can “drop the mic” after the last sentence.


Sources (Optional)

Example: Please include any sources you refer to in the Review in this format:

Sources
[1] “Trends In Computer Virus Research,” by Fred Cohen, VXHaven, sponsored by ASP, 1991, Last Visited 26 August 2016
http://vxheaven.org/lib/afc06.html
References (Optional)

Example: Please include any references that helped you in your review in this format:

“A Military Guide to Terrorism in the Twenty-First Century,” by United States Army Training and Doctrine Command, August 2007, Last Visited 26 August 2016,
http://www.dtic.mil/srch/doc?collection=t3&id=ADA472623.

Note: Consider the Executive Summary and the Review to be two stand-alone documents. It is perfectly acceptable to have the same or similar language in both the Executive Summary and the Review.

Note: The reviewer should not have a personal connection (e.g., friend, relative) to the author.


Submission

Combine the following into one document. Use the outline below to submit the combined Review and send to CybersecurityCanon@osu.edu.

We accept Microsoft Word format and plain text files.

  • Title
  • Executive Summary
  • Review
  • Conclusion
  • Sources (Optional)
  • References (Optional)

Recommend a book for review

Hall of Fame Criteria

Must-read books for all cybersecurity practitioners—be they from industry, government or academia—where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional's education that will make the practitioner incomplete.