Books#
- Code Secure and Reliable Network Services from Scratch
- By Adam Woodbeck
- March 2021 (392 pp)
- ISBN-13: 9781718500884 (No Strach Press)
- The Definitive Guide to Attacking the Internet of Things
- By Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, Beau Woods
- March 2021 (464 pp)
- ISBN-13: 9781718500907 (No Strach Press)
Data Engineering for Cybersecurity
- By James Bonifield
- Fall 2025 (336 pp)
- ISBN-13: 9781718504028 (No Strach Press)
Build a Large Language Model (From Scratch)
- By Sebastian Raschka
- Sep 2024 (368 pages)
- ISBN-13: 9781633437166
This is a practical and eminently-satisfying hands-on journey into the foundations of generative AI. We can code a base model without relying on any existing LLM libraries, evolve it into a text classifier, and create a chatbot.
- Building Applications with Foundation Models
- By Chip Huyen
- Dec 2024 (534 pages)
- ISBN-13: 9781098166304 (O’Reilly Media, Inc.)
The book provides an overview of AI engineering which differs from traditional ML engineering. AI engineering, as new AI stack, discuss different approaches to evaluating open-ended models, including AI-as-a-judge approach.
Serious Cryptography [2nd Ed]
- A Practical Introduction to Modern Encryption
- By Jean-Philippe Aumasson
- Aug 2024 (376 pp)
- ISBN-13: 9781718503847 (No Strach Press)
This practical guide breaks down the fundamental mathematical concepts at the heart of cryptography. You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography.
Effective Vulnerability Management
- Managing Risk in the Vulnerable Digital Ecosystem
- By Chris Hughes and Nikki Robinson
- Mar 2024 (288 pages)
- ISBN: 978-1-394-22121-9 (Wiley)
- This book takes a fresh look at a core component of cybersecurity, revealing the practices, processes, and tools that can enable today’s organizations to mitigate risk efficiently and expediently in the era of Cloud, DevSecOps and Zero Trust.
- It enables readers to do away with unnecessary steps, streamlining the process of securing organizational data and operations.
- It also covers key emerging domains such as software supply chain security and human factors in cybersecurity.
- You’ll learn the important difference between asset management, patch management, and vulnerability management and how they need to function cohesively.
- Build a real-time understanding of risk through secure configuration and continuous monitoring.
- Implement best practices like vulnerability scoring, prioritization and design interactions to reduce risks from human psychology and behaviors.
- Discover new types of attacks like vulnerability chaining, and find out how to secure your assets against them.