Want Sweet Deals? Join our Mailing List

No Starch Press Blog

Redesigning Security with Living-Legend Loren Kohnfelder

This month, we continue our Author Spotlight series with an in-depth interview of Loren Kohnfelder—a true icon in the security realm, as well as the author of Designing Secure Software. In the following Q&A, we talk with him about the everlasting usefulness of threat modeling, why APIs are plagued by security issues, the unsolved mysteries of the SolarWinds hack, and what the recent Log4j exploit teaches us about the importance of prioritizing security design reviews. Loren Kohnfelder is a highly

Read More »

The End Is (Not) Nigh: Disaster Prepping with Michal Zalewski

For our first Author Spotlight interview of 2022, we have illustrious guest Michal Zalewski—world-class security researcher and author of the newly released Practical Doomsday: A User’s Guide to the End of the World. In the following Q&A, we talk with him about taking disaster preparedness back from the fringe, what he’s learned from living through numerous calamities, the reason hackers have the edge over doomsday preppers in any real emergency, and why he’s got a solid backup

Read More »

Live Coder Jon Gjengset Gets into the Nitty-Gritty of Rust

Our always fascinating Author Spotlight series continues with Jon Gjengset – author of Rust for Rustaceans. In the following Q&A, we talk with him about what it means to be an intermediate programmer (and when, exactly, you become a Rustacean), how Rust “gives you the hangover first” for your code’s own good, why getting over a language’s learning curve sure beats reactive development, and how new users can help move the needle toward a better Rust. A former

Read More »

Cracking Cybercrimes with Threat Analyst Jon DiMaggio

Our illuminating Author Spotlight series continues this month with Jon DiMaggio – author of The Art of Cyberwarfare: An Investigator’s Guide to Espionage, Ransomware, and Organized Cybercrime (March 2022). In the following Q&A, we talk with him about the difference between traditional threats and nation-state attacks, the reasons that critical infrastructure is an easy target for threat actors, the emerging “magic formula” for defeating ransomware, and the fact that just because you’re paranoid doesn’t mean they aren’t targeting you

Read More »

Cyber Defender Bryson Payne Takes Us to School

We continue the Cybersecurity Awareness Month edition of our ongoing Author Spotlight series with Bryson Payne, PhD – author of Go H*ck Yourself: An Ethical Approach to Cyber Attacks and Defense (January 2022). In the following Q&A, we talk with him about training the next generation of cyber defenders, why there’s never been a better time to get a job in infosec, the security benefits of thinking like an adversary, and whether ransomware could soon be coming for

Read More »

Break It Till You Make It: Q&A with Hardware Hackers Colin O’Flynn and Jasper van Woudenberg

To kick off the Cybersecurity Awareness Month edition of our ongoing Author Spotlight series, we’re joined by Colin O’Flynn and Jasper van Woudenberg, co-authors of The Hardware Hacking Handbook (available November, 2021). In the following Q&A, we talk with Colin (@colinoflynn) and Jasper (@jzvw) about the perils of proprietary protocols being replaced with network devices, the problem of having too many interesting targets to test your tools on, the beauty of AI-designed attack systems, the indisputable power of “hammock hacking,” and why

Read More »

Newsletter Subscription

We’ll send you sweet deals on upcoming books and let you know when new books are released. We’ll never sell, give away, or use your personal information for nefarious purposes. Choose the categories you’re interested in (check as many as you’d like):