Andy Oram

Andy Oram

Editor

  • @praxagora

Areas of Expertise:

  • free and open source software
  • health IT
  • writing

Andy Oram is an editor at O'Reilly Media, a highly respected book publisher and technology information provider. An employee of the company since 1992, Andy currently specializes in open source, software engineering, and health IT, but his editorial output has ranged from a legal guide covering intellectual property to a graphic novel about teenage hackers. His work for O'Reilly includes the influential 2001 title Peer-to-Peer, the 2005 ground-breaking book Running Linux, and the 2007 best-seller Beautiful Code.

Andy also writes often for O'Reilly's Radar site (http://radar.oreilly.com/) and other publications on policy issues related to the Internet and on trends affecting technical innovation and its effects on society. Print publications where his work has appeared include The Economist, Communications of the ACM, Copyright World, the Journal of Information Technology & Politics, Vanguardia Dossier, and Internet Law and Business. His web site is www.praxagora.com/andyo.

Making Software Making Software
by Andy Oram , Greg Wilson
October 2010
Print: $44.99
Ebook: $35.99

Beautiful Security Beautiful Security
by Andy Oram , John Viega
April 2009
Print: $39.99
Ebook: $31.99

Beautiful Code Beautiful Code
by Andy Oram , Greg Wilson
June 2007
Print: $44.99
Ebook: $35.99

Peer-to-Peer Peer-to-Peer
by Nelson Minar , Marc Hedlund , Clay Shirky , Tim O'Reilly , Dan Bricklin , David Anderson , Jeremie Miller , Adam Langley , Gene Kan , Alan Brown , Marc Waldman , Lorrie Faith Cranor , Aviel Rubin , Roger Dingledine , Michael Freedman , David Molnar , Rael Dornfest , Dan Brickley , Theodore Hong , Richard Lethin , Jon Udell , Nimisha Asthagiri , Walter Tuvell , Brandon Wiley
February 2001
Print: $29.95

Programming with GNU Software Programming with GNU Software
by Andy Oram , Mike Loukides
December 1996
Print: $39.95

Managing Projects with make Managing Projects with make
by Andy Oram , Steve Talbott
Second Edition October 1991
OUT OF PRINT

Recent Posts | All O'Reilly Posts

Recent Posts | All O'Reilly Posts

Webcast: Crowdsourced news and professional journalists: pulling together to replace the tug-of-war
March 27, 2012
This webcast covers both the threat and the promise presented to professional journalism by citizen journalism, social networking, and other crowdsourcing. We'll look at some of the proposals made by leaders in journalism to modernize the practices...

"I found it a very interesting book that examined the actual empirical evidence to support or refute some of the sacred cows in software engineering. I think this this is a refreshing step forward for our profession."
--Kim Moir, Releng of the Nerds

"Overall I found the book a very fascinating and enjoyable read, and since no jargon is used it should be accessible to any audience. If you want to find out what the cyber criminals are up to and what security professionals are doing to counteract, then this is a very good place to start."
--Mehmet Hurer, ITNOW

"Right from the beginning, this book offers a startlingly fresh perspective on the realm of computer security...This work is a must for anyone investigating security on a professional or cursory level."
--T. D. Richardson, South University, CHOICE, February 2010 Vol. 47 No. 06

"This is a book that you, the programmer and designer, will find worth your time. "
--David H. Bushnell, IOS Press

"Beautiful Security is an enjoyable book that answers many questions and does so in a simple, yet effective way. It is particularly suitable for all those people who have been around the net for a while and have learned many terms and phrases concerning information security, but they have still only a vague idea of the notion they represent."
--Zeljka Zorz, Help Net Security

"As with any good security book, there’s plenty of well-done content which will likely scare you in to re-thinking how you and your company approach security. Beautiful Security can help you identify practices, problems, and mindsets which leave you, your company, or your clients at risk."
--Jim Holmes, FrazzledDad

"Beautiful Security goes well beyond the confines of traditional security books that dive into technical minutia and bore you to tears. Yes there is technical jargon to be seen throughout, but the real hook to this collection of ideas and best practices is the thinking and logic the various contributors gracefully convey through the pages within. "
--Wesley M. Talbert, Amazon.com

"...a required read. For those that have an interest in information security or those that are frustrated by it, Beautiful Security is an eye-opening book that will challenge you, and change the way you think about information security."
--Ben Rothke, Slashdot.org

"The preface states that the purpose of the book is to convince the reader that security is not bureaucratic drudgery but is an exciting career, and I think the book is successful at this."
--Allen Stenger, SPUG Nuggets, July 2009 Issue

"In Beautiful Security, experienced insiders share some rarely spoken truths about the real problems in information security today, and point the way towards how the situation could or should be improved. The challenges we face in security and personal privacy are not always purely technical--in fact they rarely are. Instead, they are social, geo-political, legacy, or simply when interests are not in alignment. Taking into account all the external factors, the authors behind Beautiful Security explore more modern and practical information security approaches, with a healthy skepticism for conventional wisdom."
--Jeremiah Grossman, Chief Technology Officer, WhiteHat Security, Inc.

"There is no doubt that the way we manage information security in the future will need to evolve as significantly and swiftly as the technology itself and adapt to the new ways we choose to embrace it. Information security plays a critical role in enabling a secure and reliable business that earns the trust of our customers. The thoughts and ideas shared by the authors in this book can shape the security "cogs and levers" of tomorrow."
--Tony Scott, Corporate Vice President and Chief Information Officer, Microsoft Corporation

"Whereas a lot of books are either narrowly focused (and convinced that their focus is all that matters), or too wide to be useful, Beautiful Security draws a wide net and collects a representative view of the state of the problem in infosecurity today."
--Michael Collins, Chief Scientist at RedJack, creator of the SiLK Analysis Suite

"Computer security is quite possibly the most intellectually challenging field today, an interdisciplinary and rapidly evolving arena that straddles the realms of people and technology. Hacking, both positive and negative, is simply the activity of smart people stretching the limits and repurposing what a computer can do for their own objectives. Beautiful Security gives us a window into the minds of the passionate people who defend us by out-thinking and staying one step ahead of our black hat adversaries. "
--Chris Wysopal, CTO & co-founder of Veracode, a software security company; pioneering vulnerability researcher at the L0pht

"Any project that undertakes to get students and professionals interested in security issues is laudable. This book is no exception. I found Jim Routh's chapter on 'Forcing Firms to Focus' to be profound. It is not often we get to look under the hood with leaders actually doing the work--rather than listening to vendors and experts talk about what 'might' work."
--Mason Brown, Director, SANS Institute

"This collection of thoughtful essays catapults the reader well beyond deceptively shiny security FUD (the drum major of the bug parade) toward the more subtle beauty of building security in. Security is an essential emergent property for all modern systems--something that most people implicitly expect and few people explicitly enjoy. This book demonstrates the yin and the yang of security, and the fundamental creative tension between the spectacularly destructive and the brilliantly constructive. Read. Learn. Emulate."
--Gary McGraw, CTO, Cigital, author of Software Security and 9 other books

"What a spectacular book--each chapter written by someone who actually knows the topic--and each chapter short enough that it is full of interesting stuff. And most of them are quite timely."
--Alan Paller, Director of Research, SANS Institute

"This isn't a book you have to read – but if you are a programmer at almost any skill level you will find it deeply enjoyable. "
--Mike James, I Programmer

"A collection of thirty three chapters from experts in their fields, Beautiful Code comes as a whiff of fresh air into the book shelf of the programmer...The book will give color to imagination of programmers used to reading bland text-book type documentation and programming manuals."
--Ganadeva Bandyopadhyay, Desicritics.org

"Beautiful Code seems the rare kind of computer programming book that tends to resist well the test of time; while it is quite technical and full of code samples, the ideas being discussed are mostly independent of the programming language in question. "
--Rafael Chaves, Vancouver Island Java User Group

"If you want to take your mindset as a developer to the next level, this is a good book. It's also an interesting insight into certain programming problems and their solutions."
--Iain Laskey, PC Book Review