top of page

Me - the author

Yes, despite having written the Cybersecurity Hyperglossary, composing and compiling the entries, creating the plain-English definitions, cross-linking terms extensively and spending an inordinate amount of time and  energy on readying it for publication, I use my own book.  Routinely.  The well-thumbed printed book sits right beside me on the desk with the electronic version just clicks away.

The book has value for:

  • Checking whether cybersecurity terms are listed, properly defined, readable, make sense, cover the nuances, that sort of thing.  I have been refining the content for at least 25 years and see no reason to stop - since the field is alive, it's never really "done"!

  • Looking up and reminding myself about the meanings of the more obscure terms and abbreviations within the glossary's 5,555 entries.

  • Contemplating and making sense of neologisms, novel terms, unusual interpretations and wrinkles in the language.

  • Spotting acronym collisions - integrity issues similar to hash collisions.

  • Exploring concepts through links, research and comparison.

  • Responding to reader queries/comments and community feedback

  • Parsing other published glossaries and 'official' sources for new terms and definitions worth adding.

  • Looking for and addressing errors and omissions, of course, plus ambiguity - opportunities to expand, improve, simplify or refine the content, maintaining my working copy of the Cybersecurity Hyperglossary.

  • Browsing just for fun - yes, really, I'm that nerdy!

bottom of page