<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Book Review on System Overlord</title><link>https://systemoverlord.com/tags/book-review.html</link><description>Recent content in Book Review on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Wed, 24 Nov 2021 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/book-review/index.xml" rel="self" type="application/rss+xml"/><item><title>Book Review: Designing Secure Software</title><link>https://systemoverlord.com/2021/11/24/book-review-designing-secure-software.html</link><pubDate>Wed, 24 Nov 2021 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2021/11/24/book-review-designing-secure-software.html</guid><description>&lt;p&gt;&lt;em&gt;Designing Secure Software&lt;/em&gt; (&lt;a href="https://amzn.to/3nRatAc"&gt;Amazon&lt;/a&gt;,
&lt;a href="https://nostarch.com/designing-secure-software"&gt;No Starch Press&lt;/a&gt;) by Loren Kohnfelder is
one of the latest entries in No Starch Press&amp;rsquo;s line of security books. This
book stands out to me for two big reasons. First, this is one of the most
mindset-centric books I&amp;rsquo;ve seen (which means it is likely to age better than a
lot of more technically-specific books). Second, this book caters to developers
more than security professionals (but don&amp;rsquo;t take this to mean it&amp;rsquo;s only for
developers), which is definitely a distinguishing feature from so many other
security books.&lt;/p&gt;</description></item><item><title>Book Review: Bug Bounty Bootcamp</title><link>https://systemoverlord.com/2021/11/05/book-review-bug-bounty-bootcamp.html</link><pubDate>Fri, 05 Nov 2021 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2021/11/05/book-review-bug-bounty-bootcamp.html</guid><description>&lt;p&gt;&lt;em&gt;Bug Bounty Bootcamp&lt;/em&gt; (&lt;a href="https://amzn.to/3BOzpMq"&gt;Amazon&lt;/a&gt;,
&lt;a href="https://nostarch.com/bug-bounty-bootcamp"&gt;No Starch Press&lt;/a&gt;)
by Vickie Li is one of No Starch Press&amp;rsquo;s newest offerings in the security space.
The alliterative title is also the best three word summary I could possibly
offer of the book &amp;ndash; it is clearly focused on getting the reader into a position
to participate in Bug Bounties from the first page to the last. This
differentiates this book well against other web security books, despite covering
many of the same vulnerabilities.&lt;/p&gt;</description></item><item><title>Comparing 3 Great Web Security Books</title><link>https://systemoverlord.com/2020/07/10/comparing-3-great-web-security-books.html</link><pubDate>Fri, 10 Jul 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/07/10/comparing-3-great-web-security-books.html</guid><description>&lt;p&gt;I thought about using a clickbait title like &amp;ldquo;Is this the best web security
book?&amp;rdquo;, but I just couldn&amp;rsquo;t do that to you all. Instead, I want to compare and
contrast 3 books, all of which I consider great books about web security. I
won&amp;rsquo;t declare any single book &amp;ldquo;the best&amp;rdquo; because that&amp;rsquo;s too subjective. Best
depends on where you&amp;rsquo;re coming from and what you&amp;rsquo;re trying to achieve.&lt;/p&gt;
&lt;p&gt;The 3 books I&amp;rsquo;m taking a look at are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://amzn.to/2ZUg4bK"&gt;Real-World Bug Hunting: A Field Guide to Web
Hacking&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://amzn.to/2ZVZojX"&gt;The Web Application Hacker&amp;rsquo;s Handbook: Finding and Exploiting Security
Flaws&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://amzn.to/2W5KQ05"&gt;The Tangled Web: A Guide to Securing Modern Web
Applications&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Book Review: Operator Handbook</title><link>https://systemoverlord.com/2020/05/25/book-review-operator-handbook.html</link><pubDate>Mon, 25 May 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/05/25/book-review-operator-handbook.html</guid><description>&lt;p&gt;When Netmux first released the &lt;a href="https://amzn.to/2XrjxNI"&gt;Operator Handbook&lt;/a&gt;, I
had to check it out. I had some initial impressions, but wanted to take some
time to refine my thoughts on it before putting together a full review of the
book. The book review will be a bit short, but that&amp;rsquo;s because this is a rather
straightforward book.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://amzn.to/2XrjxNI"&gt;&lt;img src="https://ws-na.amazon-adsystem.com/widgets/q?_encoding=UTF8&amp;amp;ASIN=B086SG77HS&amp;amp;Format=_SL160_&amp;amp;ID=AsinImage&amp;amp;MarketPlace=US&amp;amp;ServiceVersion=20070822&amp;amp;WS=1&amp;amp;tag=systemovecom-20&amp;amp;language=en_US" alt="Operator Handbook"&gt;&lt;/a&gt;{:.right}&lt;/p&gt;
&lt;p&gt;I think the first things to know is that this book is &lt;em&gt;strictly&lt;/em&gt; a reference.
There&amp;rsquo;s nothing to read and learn things from in a cohesive way. It would be
like reading a dictionary or a theasaurus &amp;ndash; while you might learn things
reading it, it&amp;rsquo;s not going to be in any meaningful way. There&amp;rsquo;s lots of things
you can learn on a particular very narrow topic, but it is mostly organized to
be &amp;ldquo;in the moment&amp;rdquo;, not as a &amp;ldquo;learning in advance&amp;rdquo; kind of thing.&lt;/p&gt;</description></item><item><title>Book Review: Red Team by Micah Zenko</title><link>https://systemoverlord.com/2018/02/10/book-review-red-team-by-micah-zenko.html</link><pubDate>Sat, 10 Feb 2018 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2018/02/10/book-review-red-team-by-micah-zenko.html</guid><description>&lt;p&gt;&lt;a href="http://amzn.to/2EAIrTK"&gt;Red Team: How to Succeed By Thinking Like the Enemy&lt;/a&gt; by
Micah Zenko focuses on the role that red teaming plays in a variety of
institutions, ranging from the Department of Defense to cybersecurity. It&amp;rsquo;s an
excellent book that describes the thought process behind red teaming, when red
teaming is a success and when it can be a failure, and the way a red team can
best fit into an organization and provide value. If you&amp;rsquo;re looking for a book
that&amp;rsquo;s highly technical or focused entirely on information security engineering,
this book may disappoint. There&amp;rsquo;s only a single chapter covering the
application of red teaming in the information security space (particularly
&amp;ldquo;vulnerability probes&amp;rdquo; as Zenko refers to many of the tests), but that doesn&amp;rsquo;t
make the rest of the content any less useful &amp;ndash; or interesting &amp;ndash; to the Red
Team practitioner.&lt;/p&gt;</description></item><item><title>Book Review: The Hacker Playbook...</title><link>https://systemoverlord.com/2014/05/21/book-review-the-hacker-playbook/</link><pubDate>Wed, 21 May 2014 01:10:54 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/05/21/book-review-the-hacker-playbook/</guid><description>&lt;p&gt;&lt;a href="http://www.amazon.com/gp/product/1494932636/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=1494932636&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20"&gt;The Hacker Playbook: Practical Guide To Penetration Testing&lt;/a&gt; is an attempt to use a continuous series of football metaphors to describe the process of a network penetration test. Maybe the metaphors would work better for someone who actually watches sports, but I felt they were a bit strained and forced at times. That being said, the actual content and techniques described are solid and generally useful information. It&amp;rsquo;s arranged in the stages of a good penetration test, and reads like a strong guide for those relatively new to penetration testing. Unfortunately, it doesn&amp;rsquo;t set up general guides for each area as much as describing specific &amp;ldquo;plays&amp;rdquo; for each area, so once those techniques start to fall flat, it doesn&amp;rsquo;t leave you with a lot of depth.&lt;/p&gt;</description></item><item><title>Homeland by Cory Doctorow</title><link>https://systemoverlord.com/2013/02/06/homeland-by-cory-doctorow/</link><pubDate>Wed, 06 Feb 2013 10:12:50 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2013/02/06/homeland-by-cory-doctorow/</guid><description>&lt;p&gt;Those who know me will not be surprised to learn that I have stayed up until 1:45 AM reading Cory Doctorow's new book, &lt;a href="http://www.amazon.com/gp/product/0765333694/ref=as_li_ss_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=0765333694&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20"&gt;&lt;i&gt;Homeland&lt;/i&gt;&lt;/a&gt;. &lt;i&gt;Homeland&lt;/i&gt; is the sequel to &lt;a href="http://www.amazon.com/gp/product/0765323117/ref=as_li_ss_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=0765323117&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20"&gt;&lt;i&gt;Little Brother&lt;/i&gt;&lt;/a&gt;, Cory's first novel about a dystopian near-future/present of the American Surveillance State, which was one of my favorite novels of all time. &lt;i&gt;Homeland&lt;/i&gt; doesn't disappoint -- it's realistic enough to be scary, but sufficiently fictional to not be downright terrifying. &lt;i&gt;Little Brother&lt;/i&gt; and &lt;i&gt;Homeland&lt;/i&gt; are the &lt;i&gt;Nineteen Eighty-Four&lt;/i&gt; of the 21&lt;sup&gt;st&lt;/sup&gt; century -- a warning of an issue that society is largely ignoring, and that will affect every one of us.&lt;/p&gt;</description></item><item><title>Social Engineering: The Art of Human Hacking</title><link>https://systemoverlord.com/2012/12/02/social-engineering-the-art-of-human-hacking/</link><pubDate>Sun, 02 Dec 2012 21:49:25 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2012/12/02/social-engineering-the-art-of-human-hacking/</guid><description>&lt;p&gt;I just got done reading Christopher Hadnagy's &lt;a href="http://www.amazon.com/gp/product/0470639539/ref=as_li_ss_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=0470639539&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20"&gt;Social Engineering: The Art of Human Hacking&lt;/a&gt;. If you are interested in the social aspects of information security, this provides an in-depth view of the actual techniques and science behind social engineering. While books like Kevin Mitnick's &lt;a href="http://www.amazon.com/gp/product/076454280X/ref=as_li_ss_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=076454280X&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20"&gt;The Art of Deception&lt;/a&gt; and &lt;a href="http://www.amazon.com/gp/product/0471782661/ref=as_li_ss_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=0471782661&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20"&gt;The Art of Intrusion&lt;/a&gt; tell amusing and noteworthy stories of social engineering hacking, Hadnagy's book tells you &lt;b&gt;why&lt;/b&gt; and &lt;b&gt;how&lt;/b&gt; it works. Hadnagy's exposure all reveals the most important lesson -- how to defend against the attacks.&lt;/p&gt;</description></item><item><title>Review: The Art of Community (Jono Bacon)</title><link>https://systemoverlord.com/2009/10/06/review-the-art-of-community-jono-bacon/</link><pubDate>Tue, 06 Oct 2009 21:55:24 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2009/10/06/review-the-art-of-community-jono-bacon/</guid><description>&lt;p&gt;I had the privilege of receiving an early copy of &lt;a href="http://www.artofcommunityonline.org"&gt;The Art of Community&lt;/a&gt; by Jono Bacon for review.  It's taken a little longer than I had hoped to get through it, but that's by no means a reflection of the book.&lt;/p&gt;
&lt;p&gt;"The Art of Community" tackles a very difficult question in the Open Source world: how do you build a strong community around your project?  Jono addresses this by using anecdotal evidence of good community organization, and discussing the facets that apply to community development.  Jono's varied experiences are shown through anecdotes about the Ubuntu community and other communities he has participated in.  The stories he shares are concise and clear, but demonstrate their points effectively and thoughtfully.  Jono's writing skills are first-rate, with strong points made clearly.  He builds the community idea from grassroots to the enterprise and shows how community participation can help -- and harm -- at each step along the way.  It's obvious that Jono knows what he's talking about, and he communicates it well.  I highly recommend this book for anyone interested in the dynamics of a community or any project leader looking to build from the ground up.&lt;/p&gt;</description></item><item><title>'Embedded Linux Primer': A Review</title><link>https://systemoverlord.com/2007/05/20/embedded-linux-primer-a-review/</link><pubDate>Sun, 20 May 2007 05:44:10 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2007/05/20/embedded-linux-primer-a-review/</guid><description>&lt;p&gt;A review originally published on LinuxQuestions.org:&lt;/p&gt;
&lt;p&gt;"Embedded Linux Primer" by Christopher Hallinan is an excellent resource for anyone looking to use Linux in an embedded system.  It does not cover basics, so is more targeted to experienced Linux or embedded systems developers looking to move to Linux embedded systems.&lt;/p&gt;
&lt;p&gt;The book covers a variety of topics including the Linux kernel's interaction with hardware, system initialization, design considerations when working with an embedded system, and porting Linux.  The book provides a detailed description of most of these topics, including many step-by-step directions on reference implementations.&lt;/p&gt;</description></item></channel></rss>