
Life 3.0: Being Human in the Age of Artificial Intelligence
Max Tegmark, Rob Shapiro, et al.
4.5 on Amazon
12 HN comments

Quantum Computing: An Applied Approach
Jack D. Hidary
4.5 on Amazon
11 HN comments

UNIX and Linux System Administration Handbook
Evi Nemeth, Garth Snyder, et al.
4.7 on Amazon
11 HN comments

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Michael Sikorski and Andrew Honig
4.7 on Amazon
11 HN comments

Trust Me, I'm Lying: Confessions of a Media Manipulator
Ryan Holiday and Penguin Audio
4.4 on Amazon
11 HN comments

Building Microservices: Designing Fine-Grained Systems
Sam Newman
4.5 on Amazon
10 HN comments

C++ Concurrency in Action
Anthony Williams
4.7 on Amazon
10 HN comments

Serious Cryptography: A Practical Introduction to Modern Encryption
Jean-Philippe Aumasson
4.7 on Amazon
10 HN comments

Theory of Fun for Game Design
Raph Koster
4.3 on Amazon
10 HN comments

The Model Thinker: What You Need to Know to Make Data Work for You
Scott E. Page, Jamie Renell, et al.
4.5 on Amazon
10 HN comments

Making Things Happen: Mastering Project Management (Theory in Practice)
Scott Berkun
4.4 on Amazon
10 HN comments

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Andy Greenberg, Mark Bramhall, et al.
4.7 on Amazon
10 HN comments

Designing Distributed Systems: Patterns and Paradigms for Scalable, Reliable Services
Brendan Burns
4.3 on Amazon
9 HN comments

High Performance Python: Practical Performant Programming for Humans
Micha Gorelick and Ian Ozsvald
4.8 on Amazon
9 HN comments

JavaScript: The Definitive Guide: Master the World's Most-Used Programming Language
David Flanagan
4.7 on Amazon
9 HN comments
alltakendamnedonJuly 8, 2019
https://nostarch.com/seriouscrypto
tptacekonDec 29, 2018
alltakendamnedonOct 12, 2019
rdlonJuly 10, 2017
https://www.nostarch.com/seriouscrypto
GoldenMonkeyonOct 26, 2019
thisacctforrealonDec 30, 2018
Would you recommend any other books in the bundle tptacek?
https://www.humblebundle.com/books/hacking-for-the-holidays-...
alltakendamnedonAug 29, 2020
kccqzyonApr 27, 2020
CiPHPerCoderonOct 7, 2019
What does Gutmann say in 2019 about /dev/urandom vs /dev/random?
Which of the two do JP Aumasson (author of Serious Cryptography and inventor of several cryptography algorithms used today, including BLAKE2 and SipHash), Dan Bernstein (Salsa20, ChaCha20, Poly1305, Curve25519, Ed25519, etc.), Matthew Green (professor associated with the TrueCrypt audit), et al. prefer in their own designs?
I can promise you the answer is /dev/urandom. Why do they prefer /dev/urandom? Because of the reasons outlined in the article I linked (which, unlike the mailing list post you linked, is occasionally updated with corrections).
It's not really that complicated: Use /dev/urandom.
If you're on an ancient Linux kernel, you can poll /dev/random until it's available if you're uncertain whether or not /dev/urandom has ever been seeded. Once /dev/random is available, don't use /dev/random, use /dev/urandom. This side-steps the "/dev/urandom never blocks" concern that people love to cite in their fearmongering. This is essentially what getrandom(2) does.
If you're on a recent Linux kernel, you can say "just use getrandom(2)" instead of "just use /dev/urandom", but the premise of the discussion is whether to use /dev/random or /dev/urandom not which of all possible options should be used.
See also: https://paragonie.com/blog/2016/05/how-generate-secure-rando...
The belief that /dev/random must somehow be better than /dev/urandom is, frankly, security theater.
thr0w__4w4yonApr 28, 2020
1) Christof Paar's book, mentioned already by EFruit. It's currently available as a free download, but that will close up soon, so go download it now. https://link.springer.com/book/10.1007/978-3-642-04101-3 I bought the hardcopy ~8 years ago and still refer to it. (Note: also as mentioned, Prof. Paar has something like 20 one-hour lectures -- in English -- on Youtube.)
2) Jean-Philippe Aumasson's excellent book (2018) "Serious Cryptography". Very practical, very readable. JPA is the author of the Blake cryptographic hash functions.
3) David Wong's upcoming book "Real World Cryptography" (Manning, 2020). I've read parts of it via Manning's early access program, the book isn't released yet, but good stuff. David blogs regularly too.
That should give you enough to chew on for a while!