Books You Should Read: Poorly Made In China

This book is scary, and honestly I can’t decide if I should recommend it or not. It’s not a guide, it doesn’t offer solutions, and it’s full of so many cautionary tales and descriptions of tricks and scams that you will wonder how any business gets done in China at all. If you are looking for a reason not to manufacture in China, then this is the book for you.

The author is not involved in the electronics industry. Most of the book describes a single customer in the personal products field (soap, shampoo, lotions, creams, etc.). He does describe …read more

Continue reading Books You Should Read: Poorly Made In China

Review: Protecting Patient Information

About the author Paul Cerrato has more than 30 years of experience working in healthcare and has written extensively on patient care, electronic health records, protected health information (PHI) security, practice management, and clinical decision support. He has served as Editor of InformationWeek Healthcare, Executive Editor of Contemporary OB/GYN, and Senior Editor RN Journal. Inside Protecting Patient Information If you are a decision maker in a healthcare organization, and you are not convinced that you … More Continue reading Review: Protecting Patient Information

Books You Should Read: Engineer to Win By Carroll Smith

One problem with engineering education today is a lack of experimental teaching. Oh sure you may have a project or two, but it’s not the focus of the program because it’s hard to standardize a test around. Typically sections of the field are taught in a highly focused theoretical course by a professor or graduate student with a specialization in that section. Because classes treat individual subject areas, it’s entirely possible to get a really good understanding of two pieces of the same puzzle, but never realize that they fit together to make a picture. It’s only when a freshly …read more

Continue reading Books You Should Read: Engineer to Win By Carroll Smith

Books You Should Read: Basic Electronics

I learned some basic electronics in high school physics class: resistors, capacitors, Kirchoff’s law and such, and added only what was required for projects as I did them. Then around 15 years ago I decided to read some books to flesh out what I knew and add to my body of knowledge. It turned out to be hard to find good ones.

The electronics section of my bookcase has a number of what I’d consider duds, but also some gems. Here are the gems. They may not be the electronics-Rosetta-Stone for every hacker, but they are the rock on which …read more

Continue reading Books You Should Read: Basic Electronics

Review: Cyber Guerilla

About the authors Jelle Van Haaster is an officer in the Royal Netherlands Army and has a background in legal, military, and technical defense matters. Rickey Gevers is currently Chief Intelligence Officer at the security firm Redsocks. He has been responsible for numerous revelations regarding high-profile security incidents. Martijn Sprengers is an IT security advisor and professional penetration tester who is specialised in conducting covert cyber operations. Inside Cyber Guerilla “Cyber guerilla is a conviction … More Continue reading Review: Cyber Guerilla

Books You Should Read: Instruments Of Amplification

Psst… Wanna make a canning jar diode? A tennis ball triode? How about a semiconductor transistor? Or do you just enjoy sitting back and following along an interesting narrative of something being made, while picking up a wealth of background, tips and sparking all sorts of ideas? In my case I wanted to make a cuprous oxide semiconductor diode and that lead me to H.P. Friedrichs’ wonderful book Instruments of Amplification. It includes such a huge collection of amplifier knowledge and is a delight to read thanks to a narrative style and frequent hands-on experiments.

Friedrichs first authored another very …read more

Continue reading Books You Should Read: Instruments Of Amplification

Book Review: Sécurité Informatique et Malwares

In 2013, Paul Rascagnères (aka “@r00tbsd“) wrote a book titled “Malware: Identification, analyse et éradication“. Paul being a friend but especially a renowned security researcher in the field of malware analysis and incident investigations, I bought the first edition of his book which was a very good introduction to malware.

[The post Book Review: Sécurité Informatique et Malwares has been first published on /dev/random]

Continue reading Book Review: Sécurité Informatique et Malwares

Books You Should Read: The Car Hacker’s Handbook

I just had my car in for an inspection and an oil change. The garage I take my car to is generally okay, they’re more honest than a stealership, but they don’t cross all their t’s and dot all their lowercase j’s. A few days after I picked up my car, low and behold, I noticed the garage didn’t do a complete oil change. The oil life indicator wasn’t reset, which means every time I turn my car on, I’ll have to press a button to clear an ominous glowing warning on my dash.

For my car, resetting the oil …read more

Continue reading Books You Should Read: The Car Hacker’s Handbook

Review: Secure & Simple: A Small-Business Guide to Implementing ISO 27001 On Your Own

About the author Dejan Kosutic is the author of numerous articles, tutorials, documentation templates, webinars, and courses about information security and business continuity management. He has helped various organizations implement information security management according to these standards. Inside Secure & Simple Complying with a globally accepted standard is the easiest way for companies to prove to their customers and partners how serious they are about something. ISO 27001 is the most popular information security standard … More Continue reading Review: Secure & Simple: A Small-Business Guide to Implementing ISO 27001 On Your Own

Review: The Car Hacker’s Handbook

About the author Craig Smith runs Theia Labs, a research firm that focuses on security auditing and building hardware and software prototypes. He is also a founder of the Hive13 hackerspace and OpenGarages. He has worked for several auto manufacturers, where he provided public research on vehicle security and tools. Inside The Car Hacker’s Handbook Car hacking and the insecurity of modern, computerized, connected cars has been a topic of much interest in the last … More Continue reading Review: The Car Hacker’s Handbook