{"id":4332,"date":"2013-12-19T08:00:17","date_gmt":"2013-12-19T16:00:17","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=4332"},"modified":"2015-12-11T09:50:41","modified_gmt":"2015-12-11T17:50:41","slug":"cybersecurity-canon-cryptonomicon","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2013\/12\/cybersecurity-canon-cryptonomicon\/","title":{"rendered":"The Cybersecurity Canon: Cryptonomicon"},"content":{"rendered":"<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:43.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9648 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-500x218.png\" alt=\"cybersec canon red\" width=\"500\" height=\"218\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-500x218.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-230x100.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-510x223.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-91x40.png 91w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red.png 786w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p><i>For the past decade, I have had this notion that there must be a <\/i><i><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/cybersecurity-canon\/\" target=\"_blank\">Cybersecurity Canon<\/a>:<\/i><i> a list of must-read books where the content is timeless, genuinely represents an aspect of the community that is true and precise and that, if not read, leaves a hole in cybersecurity professional\u2019s education. I\u2019ll be presenting on this topic at RSA 2014, and between now and then, <\/i><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/introducing-cybersecurity-canon-books-read\/\" target=\"_blank\"><i>I\u2019d like to discuss a few of my early candidates for inclusion<\/i><\/a><i>. I love a good argument, so feel free to let me know what you think.<!--more--><\/i><\/p>\n<p><b>Cryptonomicon (1999) by Neal Stephenson<\/b><\/p>\n<p>I said during the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/introducing-cybersecurity-canon-books-read\/\" target=\"_blank\">introduction to this series<\/a> that I wouldn\u2019t focus purely on technical literature, or even just nonfiction, for that matter. To me, Cryptonomicon is the quintessential hacker novel. The author, Neal Stephenson, describes a story that is set around the intersection between the discovery of world-changing math insights and the incipient designs of our computer science founding fathers.<\/p>\n<p>Stephenson delights in explaining how all of these things go together. His collection of fictional and nonfictional characters orbits each other across a thousand pages and propels the reader through dual timelines of World War II and the dot-com startup decade of the 1990s.<\/p>\n<p>The result is a multigenerational treasure hunt worthy of an Indiana Jones adventure, but unlike Indiana Jones, this is not a light read. It is dense with ideas. You do not skim through this looking for the good parts, but if you take the time to embrace the journey, you will not be disappointed. You will be fed cybersecurity history, rollicking adventure, heartbreaking tragedy, the pleasures and perils of a multigenerational family, and the awkwardness of several geek love stories all told from the hacker perspective. There is something for everyone here, and you owe yourself the pleasure of finding your favorite part. It deserves a spot in the canon.<\/p>\n<p><b>Genuine Passion<\/b><\/p>\n<p>When I describe Cryptonomicon as the best hacker novel I\u2019ve ever read, I use the word \u201chacker\u201d from the old-school definition \u2013 meaning, not computer trolls who spend their time breaking into systems for fun and profit but technological wizards who have a genuine passion for learning about how things work and making the world a better place with that knowledge.<\/p>\n<p>I admit it: I am a fanboy of Stephenson. He has written several of my favorite hacker novels over the last two decades, including Snow Crash, The Baroque Cycle and Reamde. But he uses Cryptonomicon as his personal petri dish to explore some wide-ranging ideas. He touches on everything from the impact of Allied code breaking during World War II, to the importance of Dungeons &amp; Dragons to modern-day geeks, to the jaw-dropping complexities of twentieth-century banking, to the necessity and procedures for getting the correct ratio of milk to Cap\u2019n Crunch kernels in your morning cereal, to the horrors experienced by soldiers and civilians in the Philippines during WWII, to the significance of cryptological systems in our state-of-the-art world, to the excitement of a present-day treasure hunt, and, most importantly, to the beauty of family ties across generations.<\/p>\n<p>As you might expect, this is a dense read. One fellow fan and author, Charles Yu, <a href=\"http:\/\/io9.com\/5924625\/10-science-fiction-novels-you-pretend-to-have-read-and-why-you-should-actually-read-them\" rel=\"nofollow,noopener\"  target=\"_blank\">describes the book this way<\/a>: \"A copy of Cryptonomicon has more information per unit volume than any other object in this universe. Any place that a copy of the book exists is, at that moment, the most information-rich region of space-time in the universe.\"<\/p>\n<p>You get the idea. It is not a novel you are going to get through in a weekend. But one of Stephenson\u2019s great gifts is his ability to juggle many seemingly unrelated and interesting characters within a story and then surprise the reader about how they are all connected. He crafts four main narrative arcs in Cryptonomicon and uses a parade of major and minor characters that intersect at key moments to propel the story. Three of the arcs happen during WWII, and the fourth happens during the Internet boom of the 1990s. Much more is woven throughout, and the word cryptonomicon itself refers to a collection of code-breaking techniques that one character inherits and develops throughout the story.<\/p>\n<p><b>Why It\u2019s In<\/b><\/p>\n<p>Cryptonomicon is unique in that it qualifies in two different categories: \u201cbooks for important historical context\u201d and \u201cnovels that don\u2019t exaggerate the genre.\u201d For historical context, Stephenson describes a story that is set around the intersection between the discovery of world-changing math insights and the incipient designs of our computer science founding fathers. That intersection is ground zero for my chosen profession\u2014cybersecurity\u2014and the hacks that are described are interesting and well within the realm of \u201cthe possible.\u201d<\/p>\n<p>But with all of that, Cryptonomicon is not an easy, breezy read. It is packed with ideas. Savor the journey though, and find your favorite part.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For the past decade, I have had this notion that there must be a Cybersecurity Canon: a list of must-read books where the content is timeless, genuinely represents an aspect of the &hellip;<\/p>\n","protected":false},"author":43,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155],"tags":[253,251,254],"coauthors":[791],"class_list":["post-4332","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","tag-cryptonomicon","tag-cybersecurity-canon","tag-neal-stephenson"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4332"}],"version-history":[{"count":5,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4332\/revisions"}],"predecessor-version":[{"id":11409,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4332\/revisions\/11409"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4332"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=4332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}