{"id":1314,"date":"2013-02-26T16:45:10","date_gmt":"2013-02-26T21:45:10","guid":{"rendered":"http:\/\/www.kaspersky.co.in\/blog\/?p=1314"},"modified":"2017-09-24T20:16:15","modified_gmt":"2017-09-24T14:46:15","slug":"best-selling-books-from-rsa-2013","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/best-selling-books-from-rsa-2013\/1314\/","title":{"rendered":"Best-Selling Books on Security from RSA 2013"},"content":{"rendered":"<p>RSA is <span style=\"text-decoration: underline\">the<\/span> major event in security. Basically it\u2019s like the Big 8 International Conference or, better yet \u2013 the Olympics of security \u2013 except nobody is throwing spears and getting medals \u2013 people compete with their IQ\u2019s \u2013 throwing ideas and arguments at each other and get\u2026 pretty much nothing out of it, but respect. Those guys are brilliant! They read a lot \u2013 that\u2019s one of the reasons \ud83d\ude42 At RSA they do have a booth with the best literature by the experts and for the experts. We decided to see what is the most popular among attendees and provide you a list of the top 10 selling books in case you ever decide to get into the industry or simply increase your level of security awareness:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2013\/02\/05100350\/rsa2013_topbooks.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1315\" alt=\"rsa2013_topbooks\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2013\/02\/05100350\/rsa2013_topbooks.jpg\" width=\"638\" height=\"583\"><\/a><\/p>\n<p><strong>1. The Death of the Internet<\/strong><\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Death-Internet-Markus-Jakobsson\/dp\/1118062418\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1317 alignleft\" alt=\"Death of the Internet\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2013\/02\/05100347\/51aQpRCB04L._BO2204203200_PIsitb-sticker-arrow-clickTopRight35-76_AA300_SH20_OU01_.jpeg\" width=\"300\" height=\"300\"><\/a><br>\nFraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue, loss of security) and how they are related. It also discusses the primary countermeasures and how to implement them.<\/p>\n<p>\u00a0<\/p>\n<p><strong>2. Using Social Media for Global Security<\/strong><\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Using-Social-Media-Global-Security\/dp\/1118442318\/\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1318 alignleft\" style=\"margin-top: 10px;margin-bottom: 10px\" title=\"Social Media Security \" alt=\"Social Media\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2013\/02\/05100345\/51zlNLAoiSL._BO2204203200_PIsitb-sticker-arrow-clickTopRight35-76_AA300_SH20_OU01_.jpeg\" width=\"300\" height=\"300\"><\/a><br>\nDuring the Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision-makers, security analysts, and activists how to use the social world to improve security locally, nationally, and globally\u2013and cost-effectively. Authored by two technology\/behavior\/security professionals, Using Social Media for Global Security offers pages of instruction and detail on cutting-edge social media technologies, analyzing social media data, and building crowdsourcing platforms.<\/p>\n<p>The book teaches how to collect social media data and analyze it to map the social networks of terrorists and sex traffickers, and forecast attacks and famines. You will learn how to coalesce communities through social media to help catch murderers, coordinate disaster relief, and collect intelligence about drug smuggling from hard-to-reach areas. Also highlighting dramatic case studies drawn from the headlines, this crucial book is a must-read.<\/p>\n<p><strong>3. iOS Hacker\u2019s Handbook 1 and 2<\/strong><\/p>\n<p><a href=\"http:\/\/www.amazon.com\/iOS-Hackers-Handbook-Charlie-Miller\/dp\/1118204123\/\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1319 alignleft\" alt=\"iOS hacker\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2013\/02\/05100343\/51g8wVgRKmL._BO2204203200_PIsitb-sticker-arrow-clickTopRight35-76_AA300_SH20_OU01_.jpeg\" width=\"300\" height=\"300\"><\/a><br>\niOS is Apple\u2019s mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it.<\/p>\n<p>Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks work, explores iOS enterprise and encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacks, examines kernel debugging and exploitation.<\/p>\n<p>Companion website includes source code and tools to facilitate your efforts. iOS Hacker\u2019s Handbook arms you with the tools needed to identify, understand, and foil iOS attacks.<\/p>\n<p><strong>4. Hacking Exposed 7<\/strong><\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Hacking-Exposed-Network-Security-Solutions\/dp\/0071780289\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1321 alignleft\" alt=\"Hacking Exposed\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2013\/02\/05100342\/Hacking-Exposed.jpeg\" width=\"300\" height=\"300\"><\/a><br>\nBolster your system\u2019s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker\u2019s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets &amp; Solutions contains all-new visual maps and a comprehensive \u201ccountermeasures cookbook.\u201d<\/p>\n<p>You\u2019ll learn to: Obstruct APTs and web-based meta-exploits, defend against UNIX-based root access and buffer overflow hacks, block SQL injection, spear phishing, and embedded-code attacks, detect and terminate rootkits, Trojans, bots, worms, and malware, lock down remote access using smartcards and hardware tokens, Protect 802.11 WLANs with multilayered encryption and gateways, plug holes in VoIP, social networking, cloud, and Web 2.0 services, learn about the latest iPhone and Android attacks and how to protect yourself.<\/p>\n<p><strong>5. Ghost in the Wires<\/strong><\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Ghost-Wires-Adventures-Worlds-Wanted\/dp\/0316037702\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" alt=\"Ghost in the Wires\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2013\/02\/05100335\/Ghost-in-the-Wires.jpeg\" width=\"300\" height=\"300\"><\/a><br>\nKevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world\u2019s biggest companies\u2013and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn\u2019t just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information.<\/p>\n<p>Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. But as the FBI\u2019s net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat and mouse game that led through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down.<\/p>\n<p>Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information.<\/p>\n<p><strong>6. Hacking and Securing iOS Apps<\/strong><\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Hacking-Securing-iOS-Applications-Hijacking\/dp\/1449318746\/\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1323 alignleft\" alt=\"Hacking and Securing iOS App\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2013\/02\/05100340\/Hacking-and-Securing-iOS-App.jpeg\" width=\"300\" height=\"300\"><\/a><br>\nIf you\u2019re an app developer with a solid foundation in Objective-C, this book is an absolute must\u2014chances are very high that your company\u2019s iOS applications are vulnerable to attack. That\u2019s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren\u2019t aware of.<\/p>\n<p>This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You\u2019ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.<\/p>\n<p>Examine subtle vulnerabilities in real-world applications\u2014avoid the same problems in your apps<br>\nLearn how attackers infect apps with malware through code injection<br>\nDiscover how attackers defeat iOS keychain and data-protection encryption<br>\nUse a debugger and custom code injection to manipulate the runtime Objective-C environment<br>\nPrevent attackers from hijacking SSL sessions and stealing traffic<br>\nSecurely delete files and design your apps to prevent forensic data leakage<br>\nAvoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace<\/p>\n<p><strong>7. Cryptography Classics Library<\/strong><\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Schneiers-Cryptography-Classics-Library-Practical\/dp\/0470226269\/\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1324 alignleft\" alt=\"Classics Library\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2013\/02\/05100339\/Classics-Library.jpeg\" width=\"300\" height=\"300\"><\/a><br>\n\u2013 Cryptography is the study of message secrecy and is used in fields such as computer science, computer and network security, and even in instances of everyday life, such as ATM cards, computer passwords, and electronic commerce. Thanks to his innovative and ingenious books on the subject of cryptography, Bruce Schneier has become the world\u2019s most famous security expert. Now, his trio of revolutionary titles can be found in this unprecedented, value-priced collection.<br>\n\u2013 Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition: This seminal encyclopedic reference provides readers with a comprehensive survey of modern cryptography. It describes dozens of cryptography algorithms, offers practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems.<br>\n\u2013 Secrets and Lies: Digital Security in a Networked World: This narrative, straight-talking bestseller explains how to achieve security throughout computer networks. Schneier examines exactly what cryptography can and cannot do for the technical and business community.<br>\n\u2013 Practical Cryptography: As the ideal guide for an engineer, systems engineer or technology professional who wants to learn how to actually incorporate cryptography into a product, this book bridges the gap between textbook cryptography and cryptography in the real world.<\/p>\n<p><strong>8. Exploding the Phone<\/strong><\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Exploding-Phone-Untold-Teenagers-Outlaws\/dp\/080212061X\/\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1325 alignleft\" alt=\"Exploding the Phone\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2013\/02\/05100338\/Exploding-the-Phone.jpeg\" width=\"300\" height=\"300\"><\/a><br>\nBefore smartphones, back even before the Internet and personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world\u2019s largest machine: the telephone system. Starting with Alexander Graham Bell\u2019s revolutionary \u201charmonic telegraph,\u201d by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. But the network had a billion-dollar flaw, and once people discovered it, things would never be the same.<\/p>\n<p>Exploding the Phone tells this story in full for the first time. It traces the birth of long-distance communication and the telephone, the rise of AT&amp;T\u2019s monopoly, the creation of the sophisticated machines that made it all work, and the discovery of Ma Bell\u2019s Achilles\u2019 heel. Phil Lapsley expertly weaves together the clandestine underground of \u201cphone phreaks\u201d who turned the network into their electronic playground, the mobsters who exploited its flaws to avoid the feds, the explosion of telephone hacking in the counterculture, and the war between the phreaks, the phone company, and the FBI.<\/p>\n<p><strong>9. 21 Century Chinese Cyberwarware<\/strong><\/p>\n<p><a href=\"http:\/\/www.amazon.com\/21st-Century-Chinese-Cyberwarfare-Governance\/dp\/1849283346\/\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1326 alignleft\" alt=\"Cyberwarfare\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2013\/02\/05100336\/Cyberwarfare.jpeg\" width=\"300\" height=\"300\"><\/a><br>\n21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the author s personal experience to attempt to explain China to the uninitiated. The objective of the book is to raise awareness of the fact that the People s Republic of China is using a combination of their unique culture, language, and political will, known as Chinese Communism, to maintain their cultural heritage. This book is the first to gather the salient information regarding the use of cyber warfare doctrine by the People s Republic of China to promote its own hegemonistic, national self-interests and enforce its political, military and economic will on other nation states. The threat of Chinese Cyberwarfare can no longer be ignored. It is a clear and present danger to the experienced and innocent alike and will be economically, societally and culturally changing and damaging for the nations that are targeted.<\/p>\n<p><strong>10.\u00a0<\/strong><strong>Think Like a Programmer (Creative Problem Solving)<\/strong><\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Think-Like-Programmer-Introduction-Creative\/dp\/1593274246\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" alt=\"Think Like A Programmer\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2013\/02\/05100341\/Think-Like-A-Programmer.jpeg\" width=\"300\" height=\"300\"><\/a><br>\nThe real challenge of programming isn\u2019t learning a language\u2019s syntax\u2014it\u2019s learning to creatively solve problems so you can build something great. In this one-of-a-kind text, author V. Anton Spraul breaks down the ways that programmers solve problems and teaches you what other introductory books often ignore: how to Think Like a Programmer. Each chapter tackles a single programming concept, like classes, pointers, and recursion, and open-ended exercises throughout challenge you to apply your knowledge.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RSA is the major event in security. Basically it\u2019s like the Big 8 International Conference or, better yet \u2013 the Olympics of security \u2013 except nobody is throwing spears and<\/p>\n","protected":false},"author":38,"featured_media":1316,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[324,325],"class_list":{"0":"post-1314","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-rsa-2013","9":"tag-security-books"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/best-selling-books-from-rsa-2013\/1314\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/best-selling-books-from-rsa-2013\/1314\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/best-selling-books-from-rsa-2013\/1314\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/best-selling-books-from-rsa-2013\/1314\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/best-selling-books-from-rsa-2013\/1314\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/best-selling-books-from-rsa-2013\/535\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/best-selling-books-from-rsa-2013\/1314\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/best-selling-books-from-rsa-2013\/1314\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/rsa-2013\/","name":"RSA 2013"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/1314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=1314"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/1314\/revisions"}],"predecessor-version":[{"id":11421,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/1314\/revisions\/11421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/1316"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=1314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=1314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=1314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}