Author

Bill Blunden

📖 Overview

Bill Blunden is an independent investigator focusing on information security, cybercrime, and surveillance technology. He has authored several books including "The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System" and "Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware Industrial Complex." As a software developer and researcher, Blunden has extensively documented rootkit technology and malware analysis. His technical writing has appeared in publications like CounterPunch, Salon, The Register, and other media outlets covering cybersecurity topics. Blunden holds degrees in physics and mathematics and has worked as a software engineer in Silicon Valley. He regularly gives presentations at security conferences and has taught courses on software design, reverse engineering, and data structures. His work frequently examines the intersection of technology, security policy, and privacy rights. Blunden's research and analysis often takes a critical look at surveillance capitalism and the broader implications of cyber warfare and information control.

👀 Reviews

Readers value Blunden's technical expertise and his ability to explain complex security concepts clearly. His book "The Rootkit Arsenal" receives specific praise for its detailed code examples and hands-on approach to understanding rootkit technology. Liked: - Deep technical knowledge and practical examples - Clear explanations of advanced security concepts - Critical analysis of cybersecurity industry - Thorough research and documentation Disliked: - Some readers note code examples become outdated quickly - Technical density can be challenging for beginners - Limited coverage of newer exploitation techniques Ratings: - "The Rootkit Arsenal" (2nd Edition): 4.5/5 on Amazon (43 reviews) - "Behold a Pale Farce": 4.3/5 on Amazon (12 reviews) - Goodreads ratings average 4.1/5 across his books Notable reader comment from Amazon: "The level of detail is incredible. Not for the faint of heart, but if you want to truly understand rootkit internals, this is the book."

📚 Books by Bill Blunden

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System A technical manual detailing rootkit technology, malware analysis techniques, and system security fundamentals for IT professionals and security researchers.

Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware Industrial Complex An examination of cybersecurity politics, exploring how threats are sometimes inflated and exploited by various actors in the security industry and government.

Offshoring IT: The Good, the Bad, and the Ugly A detailed analysis of IT outsourcing practices, covering economic impacts, security considerations, and operational challenges in global software development.

Cube Farm A non-fiction account documenting experiences and observations from within corporate IT culture during the dot-com era.

👥 Similar authors

Bruce Schneier writes extensively about cryptography, digital security, and surveillance with a focus on policy implications. He authored "Data and Goliath" and other foundational cybersecurity texts that examine similar themes around privacy and security power structures.

Richard Bejtlich focuses on network security monitoring and incident response from a practitioner's perspective. His books "The Practice of Network Security Monitoring" and "The Tao of Network Security Monitoring" provide detailed technical insights into defensive security operations.

Peter Singer analyzes the role of technology in modern warfare and international relations. His works like "Cybersecurity and Cyberwar" and "LikeWar" examine how digital capabilities shape conflict and security policy.

Micah Lee writes about practical digital security, encryption, and surveillance resistance. He produces technical guides and investigative reporting on security tools and privacy protection methods at The Intercept.

Kevin Mitnick documents real-world social engineering and penetration techniques based on direct experience. His books "Ghost in the Wires" and "The Art of Deception" provide insights into offensive security methods and attacker psychology.