
Bowling Alone: Revised and Updated: The Collapse and Revival of American Community
Robert D. Putnam
4.3 on Amazon
19 HN comments

Between the World and Me
Ta-Nehisi Coates
4.7 on Amazon
19 HN comments

Security Engineering: A Guide to Building Dependable Distributed Systems
Ross Anderson
4.8 on Amazon
19 HN comments

The Autobiography of Malcolm X: As Told to Alex Haley
Malcolm X, Alex Haley, et al.
4.8 on Amazon
19 HN comments

What I Talk About When I Talk About Running: A Memoir (Vintage International), Book Cover May Vary
Haruki Murakami
4.5 on Amazon
19 HN comments

Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
4.7 on Amazon
19 HN comments

An Elegant Puzzle: Systems of Engineering Management
Will Larson
4.5 on Amazon
19 HN comments

Never: A Novel
Ken Follett
? on Amazon
19 HN comments

Bitcoin: Hard Money You Can't F*ck With: Why Bitcoin Will Be the Next Global Reserve Currency
Jason A. Williams and Jessica Walker
4.8 on Amazon
19 HN comments

The Road Less Traveled: The Secret Battle to End the Great War, 1916-1917
Philip Zelikow
4.7 on Amazon
19 HN comments

The Red Book: A Reader's Edition (Philemon)
C. G. Jung , Sonu Shamdasani, et al.
4.8 on Amazon
19 HN comments

The Culture Map: Breaking Through the Invisible Boundaries of Global Business
Erin Meyer
4.7 on Amazon
19 HN comments

The Elegant Universe: Superstrings, Hidden Dimensions, and the Quest for the Ultimate Theory
Brian Greene
4.7 on Amazon
19 HN comments

Physics: Principles with Applications (7th Edition) - Standalone book
Douglas Giancoli
4.2 on Amazon
19 HN comments

Common Sense: The Origin and Design of Government
Thomas Paine and Coventry House Publishing
4.8 on Amazon
19 HN comments
dronemalloneonJuly 18, 2017
sriram_malharonOct 20, 2019
Security Engineering. Ross Anderson
The Formal Semantics of Programming Languages. Glynn Wynskell.
Communicating Sequential Processes. Tony Hoare. This book is surprising in its compactness and lucidity.
Pi Calculus. Robin Milner.
Semantics With Applications. Hanne Riis Nielson
On Concurrent Programming. Fred Schneider.
Specifying Systems with TLA+. Leslie Lamport.
Distributed Algorithms. Nancy Lynch.
Reliable Distributed Computing. Ken Birman and Robert Van Renesse.
I'm sure I'll recall more as soon as I hit "reply".
mjaconDec 26, 2010
The Security II course is especially relevant. I am not sure that everyone can access these resources but the lecture notes cover a variety of modern hardware approaches to security (including chip-and-pin). Try:
http://www.cl.cam.ac.uk/teaching/1011/SecurityII/
I highly recommend Anderson's Security Engineering, the first edition is available online:
http://www.cl.cam.ac.uk/~rja14/book.html
closeparenonJuly 29, 2017
Ross Anderson's Security Engineering has a fun chapter on this topic.
madhadrononNov 13, 2020
Leo Brodie, 'Thinking Forth'
Roland, 'Program Construction'
Ullman, 'Elements of ML Programming'
De Marco, 'The Deadline'
Brooks, 'The Mythical Man-Month'
Skiena, 'The Algorithm Design Manual'
Hunt, 'The Pragmatic Programmer'
Stevens, 'Advanced Programming in the Unix Environment'
Stevens, 'TCP/IP Illustrated, Vol. 1'
Ross Anderson, 'Security Engineering'
Also, the Phoenix Project is a ripoff of Goldratt's 'The Goal.' I suggest reading Goldratt instead, and then think very carefully about what transfers from manufacturing to software.
eliteraspberrieonMay 3, 2015
We know certain technologies like Tor and OTR are safe because of the weight of scientific research that support them, and the immense effort of the developers. Not because someone said so at an event. Statements like "gpg ciphertexts with RSA 1024 were returned as fails" are totally meaningless.
I wish people had more confidence in good old science (like Anderson's works) than glamorous events like this. You should all check out Security Engineering by the same author, it's free! www.cl.cam.ac.uk/~rja14/book.html
indigochillonOct 1, 2018
Hacking, 2nd Edition - Introduces the foundations of memory and network exploitation
[Security Engineering](https://www.cl.cam.ac.uk/~rja14/book.html) - An overview of a huge array of info sec topics, from "E-policy" to nuclear command security.
Advanced Penetration Testing - Focuses on simulating APT attacks, using the author's penetration testing experiences to illustrate each point.
closeparenonFeb 2, 2020
The security engineering industry is very interested in the capability to physically ship secrets to potentially hostile actors inside devices that limit their use or duplication. There are many many applications:
- Payment cards: EMV credit/debit, transit, laundry, parking, prepaid electric meters, etc.
- DRM: Widevine for Netflix, DCP for your local movie theater, anti-piracy and anti-cheat in your Xbox.
- Privacy: the iPhone's Secure Element only decrypts user data given the right PIN, rate limits or caps attempts, resists extraction of private key, much to FBI's disappointment.
- Root of trust: enterprise HSMs for PKI will only enable signing operations with their internal private keys after the presentation of a quorum of operator credentials [2].
Ross Anderson's Security Engineering has a great chapter on this [3].
[0] https://trezor.io/security/
[1] https://en.wikipedia.org/wiki/FIPS_140-2
[2] https://www.cloudflare.com/dns/dnssec/root-signing-ceremony/
[3] https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch18-dec18.pdf
MattPalmeronJuly 25, 2017
I still spend a lot of time with developers, currently doing a lot on integrating security with continuous deployment and agile projects.
I was talking with a developer recently, who said he loves coding, so that's why he does it for a living. I replied that I also love coding, and that's why I don't do it for a living!
bjourneonApr 8, 2019
irundebianonFeb 11, 2018
Dependable Distributed Systems
Matt Bishop: Computer Security: Art and Science
BlackFlyonApr 17, 2017
DE Denning, PJ Denning, M Schwartz, ‘‘The tracker: a threat to statistical database security’’, in ACM Transactions on Database Systems v 4 no 1 (1979) pp 76–96
A general tracker can always be found, unless the data released is extremely restricted. Almost anything is personally identifiable as it can be used to build a tracker into the database.
I am aware of this result from chapter 9 of Security Engineering (http://www.cl.cam.ac.uk/~rja14/book.html) by Ross Anderson, if you are more generally interested.
eternauta3konAug 10, 2014
http://www.cl.cam.ac.uk/~rja14/book.html
malandrewonJuly 6, 2013
valera_rozuvanonJan 26, 2021
- Mastodon documentation [1]
- Nextcloud whitepapers and case studies [2]
- Book on security of distributed systems:
Security Engineering: A Guide to Building Dependable Distributed Systems [3]
----------
[1] https://docs.joinmastodon.org
[2] https://nextcloud.com/whitepapers/
[3] https://www.amazon.com/Security-Engineering-Building-Dependa...
calpatersononJuly 7, 2014
- the chips used (32kb 90s-style smartcards AIUI) are simple to read and save, making chip and pin readers susceptible to the same social engineering attacks as magnetic stripe cards (btw, in the UK there have been skimmers for chip and pin for some time)
- most terminals on the market transmit the pin in the clear from one part of the unit to the other, so it is trivial to doctor a legitimate chip and pin unit
- it is difficult for the consumer to verify the trustworthiness of an unfamiliar chip and pin unit
- in the UK, people often still try to walk away with my card, just as when we had magnetic stripe
- transactions can be conducted offline in most configurations (true for example in the UK, but not in Germany)
IMO the main selling point of Chip and PIN to UK retail banks is that they allow banks to reassign liability to for fraud to the customer. When your signature is forged, existing law clearly says you are not liable. When you PIN is discovered and used to send transactions, existing law is unclear and currently this allows banks to convince the customer to accept the liability. IIRC, American consumer fraud law is pretty strict, which is why the US has been slower to adopt the machines than eg the UK.
In the UK, Chip and PIN seemed to cut fraud for a while, until attacks like skimming were applied. Now fraud is back on the rise :(
There is good coverage of this in chapter 10 of Security Engineering 2nd edition by Ross Anderson, a book I highly recommend!
0xmohitonJuly 22, 2016
A couple of other resources:
- 7 Security Measures to Protect Your Servers [0]
- SSH best practices [1]
In case one doesn't prefer to be overwhelmed with documentation, one could refer to: My First 5 Minutes On A Server; Or, Essential Security for Linux Servers [2].
[0] https://www.digitalocean.com/community/tutorials/7-security-...
[1] http://www.cl.cam.ac.uk/~rja14/book.html
[2] https://plusbryan.com/my-first-5-minutes-on-a-server-or-esse...
throwaway81523onJuly 2, 2021
Basics of cryptography: there are many dumb errors to avoid.
Antirez's general advice about "10x programmers" is good: http://antirez.com/news/112
Thorough (not just basic) knowledge of SQL, if you don't count that as a language. The sqlite.org "technical and design documents" about sqlite's virtual machine and its query planner are well worth reading, and apply to other databases as well. ORM's are less important than SQL, and are usually language specific as someone mentioned.
Reasonable clue about socket programming, even if you're doing everything with libraries that wrap the details.
Comfort using debugging and profiling tools.
Lots of other stuff, I'm sure.
nickpsecurityonSep 29, 2016
My design a while back was to put it all on PCI cards on a PCI backplane. I saw backplanes that basically look like motherboards full of PCI slots that load into racks. I wanted to make the cards nothing but CPU and memory whose software communicated over efficient networking (not TCP/IP) through PCI DMA. My design had IO/MMU functionality in the backplane or PCI cards. At least one card having full-featured stack for management and at least one I/O card for external interface. I figured the backplane itself could be extended for that, too, with a dedicated port like motherboards do integrated GigE. Management and I/O could come through remote DMA over dedicated wires like many servers do with Ethernet so all the PCI slots could be dedicated to compute.
Dumbest thing about Facebook's model is them destroying drives. The first thing to notice, due to Ross Anderson's Security Engineering, is that those pieces still contain a lot of data if they weren't degaussed first. Next is to remember the fastest way to destroy data: use clustered, encrypting filesystems so that secrets never touch the drive. Then, you just have to delete the keys to loose the secrets. No need to trash the drives at all. The crypto can happen at the storage manager or at hardware interface with HW acceleration available for both types. I'm surprised they haven't already built this with all the smart people they have working on big-data stacks.