Bishop Fox Cybersecurity Style Guide

Bishop Fox Cybersecurity Style Guide

By Brianne Hughes (editor)
Book Description

This guide is designed for security researchers. It provides advice on which terms to use in reports, how they should look in the middle of a sentence, and how to pronounce them out loud. Since the terms are listed alphabetically, you’ll find serious usage advice right next to playful entries about internet culture.

Each term in the guide earned its place by being unintuitive in some way:

  • It may look like a non-technical word (execute, pickling, shell),

  • It may be uniquely written (BeEF, LaTeX, RESTful),

  • It may not follow a clear pattern (web page vs. website),

  • It may have a very specific technical distinction (invalidated vs. unvalidated),

  • Or its meaning may change depending on the context (crypto, PoC, red teaming).

Language is always evolving, and those changes are especially visible in an innovative field like information security. This guide aspires to record those changes in vocabulary and encourage researchers to use language intentionally as the digital lexicon continues to grow.

Table of Contents
  • Table of Contents
  • Welcome!
    • Advice on Technical Formatting
      • Bold Text
    • What to Expect in the Guide
  • The Cybersecurity Style Guide
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • Appendix A: Decision-making Notes
    • How We Choose Our Terms
    • How to Codify Your Own Terms
    • How to Write Terms That Don’t Follow Your Style
  • Appendix B: External Resources
    • Our Reference Materials
    • Technical Definitions and Explanations
    • Internet-savvy Style Guides and Advice
    • Writing Advice
    • Introductory Hacking Resources
    • Security Organizations and Publications
    • Additional Resources
  • Epilogue
    No review for this book yet, be the first to review.
      No comment for this book yet, be the first to comment
      You May Also Like
      Also Available On
      App store smallGoogle play small
      Curated Lists
      • Pattern Recognition and Machine Learning (Information Science and Statistics)
        by Christopher M. Bishop
        Data mining
        by I. H. Witten
        The Elements of Statistical Learning: Data Mining, Inference, and Prediction
        by Various
        See more...
      • CK-12 Chemistry
        by Various
        Concept Development Studies in Chemistry
        by John Hutchinson
        An Introduction to Chemistry - Atoms First
        by Mark Bishop
        See more...
      • Microsoft Word - How to Use Advanced Algebra II.doc
        by Jonathan Emmons
        Advanced Algebra II: Activities and Homework
        by Kenny Felder
        See more...
      • The Sun Who Lost His Way
        Tania is a Detective
        by Kanika G
        See more...
      • Java 3D Programming
        by Daniel Selman
        The Java EE 6 Tutorial
        by Oracle Corporation
        See more...