Created for cyber engineers who choose to preserve security where others would take it away, the anthology establishes a new verbal and visual language for the cybersecurity industry. One that reflects the distributed vulnerabilities of a connected, digital world. Story content is rendered in a matter-of-fact tone and formatted to mirror an integrated development environment. Case study designs run valid code and are anchored by 8-bit footers. Additional Easter eggs—like symbols of hacker groups hidden between the gate folds of industrial control systems stories—offer satirical nods to larger security conversations. You can read excepts from the publication here.