• A Must-Read List of Security Books

    From Ogg@21:4/106.21 to All on Wed Apr 29 23:22:00 2020

    ==================================================================<
    ** Original area : "/grc/security"
    ** Original message from : jeff@jeffroot.us (Jeff Root)
    ** Original message to :
    ** Original date/time : 22 Apr 20, 11:23 >==================================================================<

    Palo Alto Networks has created a "Cyber Canon"; a list of computer and
    network security books that are "must-reads" for the professional.

    https://cybercanon.paloaltonetworks.com/

    Most of these are non-fiction, but some fictional works are included,
    like Neal Stephenson's "Cryptonomicon", and one of Steve's favorites,
    "Daemon" and "Freedom (TM)".

    I thought I was well-read in this area (I'm a "book person"), but when
    I clicked on the "Hall of Fame" filter, I'd only read 4 out of the 11
    listed.

    This should help keep you busy during the pandemic, and tune up your
    skills at the same time.

    Jeff



    --- OpenXP 5.0.43
    * Origin: Ogg's WestCoast Point (21:4/106.21)
  • From Renagademaster@21:1/172 to Ogg on Thu Apr 30 21:27:46 2020
    Palo Alto Networks has created a "Cyber Canon"; a list of computer and network security books that are "must-reads" for the professional.

    https://cybercanon.paloaltonetworks.com/

    Thank you Ogg for the list. My hobby these days seems to be collecting book lists, one day I hope to have the time to read!

    I spotted a couple of bloggers I follow, Bruce Schneier and Brian Krebs, any other authors with good blogs?

    RenMas

    --- Mystic BBS v1.12 A45 2020/02/18 (Linux/64)
    * Origin: The Bottomless Abyss BBS * bbs.bottomlessabyss.net (21:1/172)
  • From Ogg@21:4/106.21 to Renagademaster on Thu Apr 30 22:12:00 2020
    Hello Renagademaster!

    ** On 30.04.20 - 21:27, Renagademaster wrote to Ogg:

    Palo Alto Networks has created a "Cyber Canon"; a list of computer and
    network security books that are "must-reads" for the professional.

    https://cybercanon.paloaltonetworks.com/

    Thank you Ogg for the list. My hobby these days seems to be collecting book
    lists, one day I hope to have the time to read!

    I wasn't surprised to see Clifford Stoll's book Cuckoos Egg on the list.
    It reads like fast-paced thriller. Stoll pioneered many of the first
    methods of tracking hackers. So, it you say you don't have time to read, Stoll's book might convince you to make time. ;)


    I spotted a couple of bloggers I follow, Bruce Schneier and Brian Krebs,
    any other authors with good blogs?

    I discovered Schneier's fine blog only recently.

    Krebs' blog is another good one, thanks. I remember seeing the name
    attached to the book "Spam Nation". In it he says.. "Not only are
    hundreds of thousands ... exposing themselves to fraud ... but even those
    who never open junk messages are at risk."
    ^^^^^^^^^^^^^^^^^^^^^^^^


    His post "23 Apr 20, When in Doubt: Hang Up, Look Up, & Call Back" ..is an incredible story. Phone number spoofing seems to be a popular tool for spammers.


    --- OpenXP 5.0.43
    * Origin: Ogg's WestCoast Point (21:4/106.21)
  • From Avon@21:1/101 to Ogg on Fri May 1 16:17:28 2020
    On 29 Apr 2020 at 11:22p, Ogg pondered and said...

    Palo Alto Networks has created a "Cyber Canon"; a list of computer and network security books that are "must-reads" for the professional.

    https://cybercanon.paloaltonetworks.com/

    Thanks for sharing this :)

    --- Mystic BBS v1.12 A46 2020/04/20 (Windows/32)
    * Origin: Agency BBS | Dunedin, New Zealand | agency.bbs.nz (21:1/101)
  • From BitByter@21:4/105 to Ogg on Sat May 9 03:38:40 2020
    Hello Ogg!

    30 Apr 20 22:12, you wrote to Renagademaster:

    I wasn't surprised to see Clifford Stoll's book Cuckoos Egg on the
    list. It reads like fast-paced thriller. Stoll pioneered many of the first methods of tracking hackers. So, it you say you don't have
    time to read, Stoll's book might convince you to make time. ;)

    I've read that one several times. I consider it time well spent.

    BitByter

    --- GoldED+/LNX 1.1.5-b20180707
    * Origin: Phoenix BBS * phoenix.bnbbbs.net (21:4/105)
  • From BitByter@21:4/10 to Ogg on Wed Jun 3 08:32:46 2020
    l$$_,ggggg,_ $ :$$lll$S#*s,._ ::$$_., ;$$$▒░▒$$ll Users Welcome
    $$l__., ,.__ `ⁿ╩l l$$ll_.,┬g#S$$$$ ll$$╩ⁿ`` __., l░$_.,┬g#S$$$$| l$$$$S#g┬,._$$l:: d░P╩ⁿ````ⁿ$$$ _.,┬! :$$P╩ⁿ`````l$$l l$$l╝"```ⁿ╩S$$$ggggg:$l$$ll$$ll$P╩ⁿ`````l UseNet $$l d$$░ :$$$ $$$: ░$$l l$$`l░▓$ll$$$$$yy#S$$$$$l $$l ░$3$$ 0 Apr 20 22:12, you wrote to $$$ $$` l$$$ $$$l ll` $$$ `l$$b, , ,$$l$$$'~ yy: et[mVkradio-net
    l$$l ⁿ` ,d$░$$ll$░$$g,._.,g$$l `S$$g,,d$S' l$$__.,,gl$> I wasn't surprised to see Clifford :$$ll ~``ⁿ╩SllS╩ⁿ"```"ⁿ╩S$$; _,g`ⁿ╩╩╩ⁿ' :$$S╩ⁿ"``~~ book Cuckoos Egg on the _,d$$$$yyyll> list. It reads like fast-paced thriller. Stoll pioneered many of the Og> first methods of tracking hackers. So, it you say you don't have Og> time to read, Stoll's book might convince you to make time. ;) I've read that one several times. I consider it time well spent.
    BitByter

    --- GoldED+/LNX 1.1.5-b20180707
    # Origin: Phoenix BBS * phoenix.bnbbbs.net (21:4/105)
    ■ Synchronet ■ fsxNet FTN<>QWK Gateway
    havens.synchro.net
    ---
    ■ Synchronet ■ Havens BBS havens.synchro.net
    * Origin: fsxNet FTN<>QWK Gateway (21:4/10)