Found 3 comments on HN
epalmer · 2016-01-07 · Original thread
http://www.amazon.com/The-Codebreakers-Comprehensive-Communi...

A good read about the crypto behind the Enigmia and other encryption approaches. A fun read.

EthanHeilman · 2014-10-02 · Original thread
The Codebreakers: The Comprehensive History of Secret Communication[0] by David Kahn is probably the best book in this area. Be warned it sits on many bookshelves but due to its length few are the number that have finished it, none the less it is an extremely rewarding read. It has oddles and oddles of stories about cryptographers you have never heard of doing awesome things, including the history and personalities behind many of the Black Chambers of Europe.

It puts the Code Book to shame.

[0]: http://www.amazon.com/The-Codebreakers-Comprehensive-Communi...

wglb · 2014-09-06 · Original thread
Really a better list is by tom his own self: http://www.amazon.com/lm/R2EN4JTQOCHNBA/ref=cm_lm_pthnk_view...

My recommendations would add:

http://www.amazon.com/The-Codebreakers-Comprehensive-Communi... by David Kahn. Many stories of the whole history of secret communications, with lessons in op-sec, not changing the codes frequently enough, they can't possibly break this.

The John LaCarre http://en.wikipedia.org/wiki/John_le_Carr%C3%A9 books. Do you remember the point where someone says to Smiley "There is no reason to think that they tapped the phone" to which Smiley replies "There is Every reason".

A must read, I tell my students in my Security Awareness training classes is The Cuckoo's Egg http://www.amazon.com/The-Cuckoos-Egg-Tracking-Espionage/dp/.... Examples like default service accounts on Dec Vax with username Field and password Service. Note when this is written and are our habits really any better with junk hung on the internet? Concepts pioneered in his book, as effective as they are, are not practiced. Note the alarms going off, ignored, at a large retailer last thanksgiving. Or another retailer recently, "Wait, what, we are being attacked? I didn't feel anything".

Most vulnerable is the thinking "Well, they can't get our X because <thing we did>". I have a matrix of attacker motives and what they are after. There motives and targetsyou haven't thought of.

Get dozens of book recommendations delivered straight to your inbox every Thursday.