From the list on how to break things (encryption, passwords, etc.).
Who am I?
I have had the opportunity to write (I have written over 30 college textbooks on technology, most of them in the area of cybersecurity), study (my PhD dissertation was on cybersecurity), teach (I have taught at colleges and universities my entire career about technology, networking, and cybersecurity), and research (I have published numerous peer-reviewed journal articles) on the topic of cybersecurity. But I have always had a soft spot in my heart for the average computer user who struggles with how to protect their technology devices. This has helped drive my passion to focus on practical cybersecurity for everyone.
Mark's book list on how to break things (encryption, passwords, etc.)
Discover why each book is one of Mark's favorite books.
Why did Mark love this book?
It is hard to underestimate the significance of code breaking during World War II. Without the work of dedicated mathematicians, linguists, and others the great conflicts such as the Battle of Midway and the German U-boat "wolfpacks" that sank over 13 million tons of Allied supplies could have easily been up for grabs. But due to the codebreakers the balance shifted to the Allies. And what is even equally impressive is that the Axis powers never knew that their encoded messages were being read. Stephen Budiansky traces how the codebreakers pulled off this feat while at the same time often battling within their own ranks about who should decode the message, how the messages should be used, and who should get the credit.