Appendix B

Additional Resources for Chaper 1:

Books

  • "Nothing to Hide: The False Tradeoff Between Privacy and Security" by Daniel J. Solove

    • Breaks down why the idea that privacy and security are at odds is a total myth.
  • "The Age of Surveillance Capitalism" by Shoshana Zuboff

    • Looks at how big tech companies are cashing in on our personal info and what that means for us.
  • "The Transparent Society" by David Brin

    • Talks about how being open and being watched affects us, and how to keep a balance between the two.
  • "VPNs Illustrated: Tunnels, VPNs, and IPsec" by Jon C. Snader

    • A book covering the details of VPN technologies, including IPsec and other tunneling methods.
  • "Network Security Essentials: Applications and Standards" by William Stallings

    • Covers the basics of network security, including important apps and standards to keep your data safe.
  • "Applied Network Security Monitoring: Collection, Detection, and Analysis" by Chris Sanders and Jason Smith

    • A guide on how to monitor your network for security threats, from collecting data to spotting and analyzing attacks.

RFCs:

Online Technical Guides and Resources:

Additional Resources for Chapter 2:

BOOKS:

  • Threat Modeling: Designing for Security by Adam Shostack

    • A guide to threat modeling.
  • Security Engineering: A Guide to Building Dependable Distributed Systems by Ross Anderson

    • In-depth exploration of security engineering principles.
  • The Art of Invisibility by Kevin Mitnick

    • Practical strategies for maintaining privacy online.

MANUALS & SPECIFICATIONS:

Additional Resources for Chapter 3:

BOOKS:

  • Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier

    • Breaks down how big companies collect your data and why it matters.
  • Privacy and Security for Online Accounts by David A. Chappell

    • How-to guide for protecting your online accounts and staying safe online.

RFCs:

Additional Resources for Chapter 4:

MANUALS & SPECIFICATIONS:

  1. PGP (Pretty Good Privacy) User Guide: Instructions for using PGP to encrypt email content.
  2. Tor Project: Tor Browser Manual: Guide to using the Tor Browser.
  3. ProtonMail Security Practices: Documentation on ProtonMail's encryption practices and security features.
  4. Diceware Passphrase : Guide for generating secure Diceware passphrases.

Additional Resources for Chapter 5:

BOOKS:

  • "Applied Cryptography: Protocols, Algorithms, and Source Code in C" by Bruce Schneier

    • All about cryptographic algorithms and how to use them in code.
  • "Cryptography and Network Security: Principles and Practice" by William Stallings

    • Deep dive into how cryptographic techniques keep data secure.
  • "Introduction to Modern Cryptography: Principles and Protocols" by Jonathan Katz and Yehuda Lindell

    • Basics of modern cryptography and how it works.
  • "Practical Cryptography for Developers" by Svetlin Nakov

    • Guide for using cryptography in software development.
  • "The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography" by Simon Singh

    • Cool history of cryptography and its development over time.

TECHNICAL DOCUMENTS:

  1. NIST Special Publication 800-38A: Recommendation for Block Cipher Modes of Operation: Technical details on block cipher modes and their usage.
  2. NIST Special Publication 800-175B: Guide to Secure Use of Cryptographic Algorithms: Practical guide on the secure use of cryptographic algorithms.

Additional Resources for Chapter 6:

BOOKS:

  • "Privacy and Data Protection in the Age of Big Data" by L. Westin

    • Explores the intersection of privacy, data protection, and new technologies.
  • "The Privacy Engineer's Manifesto" by Michelle Finneran Dennedy

    • Talks about privacy engineering and practices for protecting personal data.

MANUALS AND SPECIFICATIONS:

Additional Resources for Chapter 7:

MANUALS AND SPECIFICATIONS:

  1. Whonix Documentation: Official documentation for setting up and using the Whonix OS.
  2. Tor Project’s Tor Browser Manual: Guide to using the Tor Browser.
  3. Qubes OS Documentation: Guide on using Qubes OS.