Me - the author
Yes, despite having written the Cybersecurity Hyperglossary, composing and compiling the entries, creating the plain-English definitions, cross-linking terms extensively and spending an inordinate amount of time and energy on readying it for publication, I use my own book. Routinely. The well-thumbed printed book sits right beside me on the desk with the electronic version just clicks away.

The book has value for:
Checking whether cybersecurity terms are listed, properly defined, readable, make sense, cover the nuances, that sort of thing. I have been refining the content for at least 25 years and see no reason to stop - since the field is alive, it's never really "done"!
Looking up and reminding myself about the meanings of the more obscure terms and abbreviations within the glossary's 5,555 entries.
Contemplating and making sense of neologisms, novel terms, unusual interpretations and wrinkles in the language.
Spotting acronym collisions - integrity issues similar to hash collisions.
Exploring concepts through links, research and comparison.
Responding to reader queries/comments and community feedback.
Parsing other published glossaries and 'official' sources for new terms and definitions worth adding.
Looking for and addressing errors and omissions, of course, plus ambiguity - opportunities to expand, improve, simplify or refine the content, maintaining my working copy of the Cybersecurity Hyperglossary.
Browsing just for fun - yes, really, I'm that nerdy!

