Jerry Gamblin
Researcher. Builder. Hacker. Traveler.
Book Recommendations:
Recommended by Jerry Gamblin
“@AppSec_Village @defcon Can I suggest @dianakelley14? I have never heard her talk but I have given away many copies of her book "Practical Cybersecurity Architecture" to people I mentor and it is an amazing read. https://t.co/ScyxJFR1wi” (from X)
by Ed Moyle, Diana Kelley·You?
Plan and design robust security architectures to secure your organization's technology landscape and the applications you develop Key Features Leverage practical use cases to successfully architect complex security structuresLearn risk assessment methodologies for the cloud, networks, and connected devicesUnderstand cybersecurity architecture to implement effective solutions in medium-to-large enterprises Book description Cybersecurity architects work with others to develop a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization. With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through ongoing monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs. By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others. What You Will Learn Explore ways to create your own architectures and analyze those from othersUnderstand strategies for creating architectures for environments and applicationsDiscover approaches to documentation using repeatable approaches and toolsDelve into communication techniques for designs, goals, and requirementsFocus on implementation strategies for designs that help reduce riskBecome well-versed with methods to apply architectural discipline to your organization Who this book is for If you are involved in the process of implementing, planning, operating, or maintaining cybersecurity in an organization, then this security book is for you. This includes security practitioners, technology governance practitioners, systems auditors, and software developers invested in keeping their organizations secure. If you're new to cybersecurity architecture, the book takes you through the process step by step; for those who already work in the field and have some experience, the book presents strategies and techniques that will help them develop their skills further.
Recommended by Jerry Gamblin
“If you are interested in cryptography this free book is a must-read. https://t.co/t2WPCPosPx” (from X)
by Heiko Knospe·You?
by Heiko Knospe·You?
This book provides a compact course in modern cryptography. The mathematical foundations in algebra, number theory and probability are presented with a focus on their cryptographic applications. The text provides rigorous definitions and follows the provable security approach. The most relevant cryptographic schemes are covered, including block ciphers, stream ciphers, hash functions, message authentication codes, public-key encryption, key establishment, digital signatures and elliptic curves. The current developments in post-quantum cryptography are also explored, with separate chapters on quantum computing, lattice-based and code-based cryptosystems. Many examples, figures and exercises, as well as SageMath (Python) computer code, help the reader to understand the concepts and applications of modern cryptography. A special focus is on algebraic structures, which are used in many cryptographic constructions and also in post-quantum systems. The essential mathematics and the modern approach to cryptography and security prepare the reader for more advanced studies. The text requires only a first-year course in mathematics (calculus and linear algebra) and is also accessible to computer scientists and engineers. This book is suitable as a textbook for undergraduate and graduate courses in cryptography as well as for self-study.
Recommended by Jerry Gamblin
“This is a great book, easier than the GCHQ puzzle book but still challenging. https://t.co/zLYhP8mD4o” (from X)
by Sinclair McKay·You?
Bletchley Park Brainteasers was the runaway Christmas bestseller in 2017 and delighted hundreds of thousands of devoted puzzlers with its fiendish puzzles, riddles and enigmas. It's never to late to join the code breakers of Bletchley Park in their enjoyment of a devilish challenge! Would you love to master morse code? Could you have have outsmarted an enigma machine? Would your love of chess have seen you recruited into the history books? When scouring the land for top-level code breakers, the Bletchley Park recruiters left no stone unturned. As well as approaching the country's finest mathematicians, they cast their nets much wider, interviewing sixth-form music students who could read orchestral scores, chess masters, poets, linguists, hieroglyphics experts and high society debutantes fresh from finishing school. To assess these individuals they devised various ingenious mind-twisters - hidden codes, cryptic crosswords, secret languages, complex riddles - and it is puzzles such as these, together with the fascinating recruitment stories that surround them, that make up the backbone of this book. The code breakers of Bletchley Park were united in their love of a good puzzle. If you feel the same, why not dive in, put your mental agility to the test and discover: Would Bletchley Park have recruited YOU?