• Re: A Must-Read List of Security Books

    From Renagademaster@21:1/172 to Ogg on Thu Apr 30 21:27:46 2020
    Palo Alto Networks has created a "Cyber Canon"; a list of computer and network security books that are "must-reads" for the professional.

    https://cybercanon.paloaltonetworks.com/

    Thank you Ogg for the list. My hobby these days seems to be collecting book lists, one day I hope to have the time to read!

    I spotted a couple of bloggers I follow, Bruce Schneier and Brian Krebs, any other authors with good blogs?

    RenMas

    --- Mystic BBS v1.12 A45 2020/02/18 (Linux/64)
    * Origin: The Bottomless Abyss BBS * bbs.bottomlessabyss.net (21:1/172)
  • From Avon@21:1/101 to Ogg on Fri May 1 16:17:28 2020
    On 29 Apr 2020 at 11:22p, Ogg pondered and said...

    Palo Alto Networks has created a "Cyber Canon"; a list of computer and network security books that are "must-reads" for the professional.

    https://cybercanon.paloaltonetworks.com/

    Thanks for sharing this :)

    --- Mystic BBS v1.12 A46 2020/04/20 (Windows/32)
    * Origin: Agency BBS | Dunedin, New Zealand | agency.bbs.nz (21:1/101)
  • From BitByter@21:4/105 to Ogg on Sat May 9 03:38:40 2020
    111
    Hello Ogg!

    30 Apr 20 22:12, you wrote to Renagademaster:

    I wasn't surprised to see Clifford Stoll's book Cuckoos Egg on the
    list. It reads like fast-paced thriller. Stoll pioneered many of the first methods of tracking hackers. So, it you say you don't have
    time to read, Stoll's book might convince you to make time. ;)

    I've read that one several times. I consider it time well spent.

    BitByter

    --- GoldED+/LNX 1.1.5-b20180707
    * Origin: Phoenix BBS * phoenix.bnbbbs.net (21:4/105)
  • From BitByter@21:4/10 to Ogg on Wed Jun 3 08:32:46 2020
    112
    l$$_,ggggg,_ $ :$$lll$S#*s,._ ::$$_., ;$$$±°±$$ll Users Welcome
    $$l__., ,.__ `üÊl l$$ll_.,Âg#S$$$$ ll$$Êü`` __., l°$_.,Âg#S$$$$| l$$$$S#gÂ,._$$l:: d°PÊü````ü$$$ _.,Â! :$$PÊü`````l$$l l$$l¼"```üÊS$$$ggggg:$l$$ll$$ll$PÊü`````l UseNet $$l d$$° :$$$ $$$: °$$l l$$`l°²$ll$$$$$yy#S$$$$$l $$l °$3$$ 0 Apr 20 22:12, you wrote to $$$ $$` l$$$ $$$l ll` $$$ `l$$b, , ,$$l$$$'~ yy: et[mVkradio-net
    l$$l ü` ,d$°$$ll$°$$g,._.,g$$l `S$$g,,d$S' l$$__.,,gl$> I wasn't surprised to see Clifford :$$ll ~``üÊSllSÊü"```"üÊS$$; _,g`üÊÊÊü' :$$SÊü"``~~ book Cuckoos Egg on the _,d$$$$yyyll> list. It reads like fast-paced thriller. Stoll pioneered many of the Og> first methods of tracking hackers. So, it you say you don't have Og> time to read, Stoll's book might convince you to make time. ;) I've read that one several times. I consider it time well spent.
    BitByter

    --- GoldED+/LNX 1.1.5-b20180707
    # Origin: Phoenix BBS * phoenix.bnbbbs.net (21:4/105)
    þ Synchronet þ fsxNet FTN<>QWK Gateway
    havens.synchro.net
    ---
    þ Synchronet þ Havens BBS havens.synchro.net
    * Origin: fsxNet FTN<>QWK Gateway (21:4/10)