Chance to Win Two Free Security Books This Week

For those of you who didn’t see the post last week, we are giving away free, gently used security books during the next month or so to those of you who follow us on Twitter. If you don’t already follow us on Twitter, you can find us @grecs.

To win a book, you will need to pay close attention to our Twitter feed each week. We will randomly tweet a clue about the book we are giving away that week, and the first person to tweet back to us about the clue wins the book. You can find the name of the book we will be giving away each week by checking NovaInfosecPortal every Tuesday.

So, what happens if not one catches the clue?

Well, it turns out that’s what happened last week. The book we were giving away last week was The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage by Cliff Stoll. The clue that we tweeted was as follows:

grecs: #followfriday @geminisecurity @danphilpott @dallendoug @electricfork @IBMFedCyber @cliffstoll @linuxgeek247 @marcusjcarey @cyberhiker

You’ll notice that we used Cliff Stoll’s name (the author of Cuckoo’s Egg) as the clue. While our clues won’t always look like this, we wanted to give you an idea of what to look for in the future.

Since no one caught the clue last week, we will be giving away two books this week: The Cuckoo’s Egg from last week, and Hacking Exposed: Web Application Security Secrets & Solutions by Joel Scambray and Mike Shema. (So that means you should be watching for two clues, not just one.)

Hacking Exposed covers hacking scenarios across a wide spectrum of programming languages and depicts various kinds of attacks/counterattacks and offers some helpful insight into web application security. You can read more about it on Amazon.com. You can read more about The Cuckoo’s Egg in our post from last week.

Well, that’s all for now. If you have any questions about the rules of this contest, please feel free to contact us or read the rules we outlined last week.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.