<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Introductory  books or reading for the security curios? in Exam Preparation</title>
    <link>https://community.isc2.org/t5/Exam-Preparation/Introductory-books-or-reading-for-the-security-curios/m-p/11861#M2917</link>
    <description>&lt;P&gt;I always start the list of books to understand computer-, network-, information-, and cyber-security with Cliff Stoll's&amp;nbsp;&lt;EM&gt;The&amp;nbsp;Cuckoo's&lt;/EM&gt;&lt;SPAN&gt;&lt;EM&gt;&amp;nbsp;Egg: Tracking a Spy Through the Maze of Computer Espionage&lt;/EM&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;That book is an easy read, draws the reader in like a good novel, and a great intro to why we all do what we do&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Many items of understanding our field are embedded in that real world tale, including the very important fact that "this ain't new, folks." The book was published three decades ago, describing events even farther back.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1. Malicious hacking is not only by geeky introvert teenagers in mom's basement. Foreign nations do it, too. (No longer as an essential lesson to blow out a myth than ten years ago.)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2. It's not always for kicks; real espionage has been online all along.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;3. "Lilly pad hopping" using multiple intermediary computers for packet transport to obscure the source is not new. (That term is not used in the book.)&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;4. Cliff implemented the first publicly known honeypot computer protection program, complete with live out-of-channel alert notification.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;(That term is not used in the book.)&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;5. Law enforcement and counter-intelligence agencies of multiple nations are hide-bound organizations resistant to major new information "not invented here," that is, information that is already on the list they already know they&amp;nbsp;need to monitor or investigate.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 28 Jun 2018 14:13:55 GMT</pubDate>
    <dc:creator>CraginS</dc:creator>
    <dc:date>2018-06-28T14:13:55Z</dc:date>
    <item>
      <title>Introductory  books or reading for the security curios?</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Introductory-books-or-reading-for-the-security-curios/m-p/8453#M2913</link>
      <description>&lt;P&gt;Keep hearing people ask for books or material from people asking to get started in security. Currently, I am recommending Ben Grimes latest book below. Any other suggestions?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.amazon.com/Data-Driven-Computer-Security-Defense-Should/dp/1549836536/ref=sr_1_fkmr0_1?s=books&amp;amp;ie=UTF8&amp;amp;qid=1521041607&amp;amp;sr=1-1-fkmr0&amp;amp;keywords=ben+grimes+security" target="_blank"&gt;https://www.amazon.com/Data-Driven-Computer-Security-Defense-Should/dp/1549836536/ref=sr_1_fkmr0_1?s=books&amp;amp;ie=UTF8&amp;amp;qid=1521041607&amp;amp;sr=1-1-fkmr0&amp;amp;keywords=ben+grimes+security&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Brent&lt;/P&gt;</description>
      <pubDate>Wed, 14 Mar 2018 15:34:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Introductory-books-or-reading-for-the-security-curios/m-p/8453#M2913</guid>
      <dc:creator>Beads</dc:creator>
      <dc:date>2018-03-14T15:34:14Z</dc:date>
    </item>
    <item>
      <title>Re: Introductory  books or reading for the security curios?</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Introductory-books-or-reading-for-the-security-curios/m-p/8458#M2914</link>
      <description>&lt;P&gt;Depending on whether you are focusing on technical security, organization security, data security or another domain I'd add these books to the "new to security" reading list as they are informative, without being overly complex and will likely help inspire a dialogue:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Data &amp;amp; Goliath: The Hidden Battles to Capture Your Data, Bruce Schneier, 2016&lt;/P&gt;&lt;P&gt;The Art of Invisibility, Kevin Mitnick, 2017&lt;/P&gt;&lt;P&gt;Everybody Lies, Seth Stephens-Davidowitz, 2017&lt;/P&gt;&lt;P&gt;Future Crimes, Marc Goodman, 2015&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have&amp;nbsp;someone who wants to go way back in time here are a few oldies (but goodies) that help formulate many of the foundations of insecurity in the hope of espionage:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Puzzle Palace, James Bamford&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Secrets and Lies, Bruce Schneier&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;...and if you want to cheat and use someone else's list, here's an obligatory DuckDuckGo top result:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://heimdalsecurity.com/blog/best-cyber-security-books/&amp;nbsp;" target="_blank"&gt;https://heimdalsecurity.com/blog/best-cyber-security-books/&amp;nbsp;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Mar 2018 20:39:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Introductory-books-or-reading-for-the-security-curios/m-p/8458#M2914</guid>
      <dc:creator>Ben_Mead</dc:creator>
      <dc:date>2018-03-14T20:39:11Z</dc:date>
    </item>
    <item>
      <title>Re: Introductory  books or reading for the security curios?</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Introductory-books-or-reading-for-the-security-curios/m-p/8474#M2915</link>
      <description>&lt;P&gt;Lots of possibilities, but for a departure from the purely technical, one of my favorites is Bruce Sterling's "The Hacker Crackdown." Well written account&amp;nbsp;that covers the early days of battle between law enforcement and cyber thieves, vandals and explorers. Sure, it may be a bit dated, but bear in mind that in cybersecurity, the more things change, the more we keep writing passwords on post-it-notes &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;BR /&gt;&lt;A href="https://en.wikipedia.org/wiki/The_Hacker_Crackdown" target="_blank"&gt;https://en.wikipedia.org/wiki/The_Hacker_Crackdown&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Mar 2018 18:13:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Introductory-books-or-reading-for-the-security-curios/m-p/8474#M2915</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2018-03-15T18:13:52Z</dc:date>
    </item>
    <item>
      <title>Re: Introductory  books or reading for the security curios?</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Introductory-books-or-reading-for-the-security-curios/m-p/11713#M2916</link>
      <description>&lt;P&gt;You want &lt;A href="https://groups.yahoo.com/neo/groups/techbooks/conversations/messages" target="_blank"&gt;security books&lt;/A&gt;?&amp;nbsp; There are tons of &lt;A href="http://victoria.tc.ca/int-grps/books/techrev/mnbksc.htm" target="_blank"&gt;security books&lt;/A&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sometimes there are even &lt;A href="http://victoria.tc.ca/int-grps/books/techrev/mnbksccd.htm" target="_blank"&gt;security books that I recommend people read&lt;/A&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You want one, single security book?&amp;nbsp; Read "&lt;A href="http://victoria.tc.ca/int-grps/books/techrev/bkseceng.rvw" target="_blank"&gt;Security Engineering&lt;/A&gt;," by Ross Anderson.&amp;nbsp; Best single volume security book I know.&amp;nbsp; (And I know hundreds.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(You don't even have to buy it, although I recommend you do, since he puts the &lt;A href="http://www.cl.cam.ac.uk/~rja14/book.html" target="_blank"&gt;previous edition up on the Web&lt;/A&gt;, so you can read that for free.)&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jun 2018 17:39:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Introductory-books-or-reading-for-the-security-curios/m-p/11713#M2916</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2018-06-21T17:39:50Z</dc:date>
    </item>
    <item>
      <title>Re: Introductory  books or reading for the security curios?</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Introductory-books-or-reading-for-the-security-curios/m-p/11861#M2917</link>
      <description>&lt;P&gt;I always start the list of books to understand computer-, network-, information-, and cyber-security with Cliff Stoll's&amp;nbsp;&lt;EM&gt;The&amp;nbsp;Cuckoo's&lt;/EM&gt;&lt;SPAN&gt;&lt;EM&gt;&amp;nbsp;Egg: Tracking a Spy Through the Maze of Computer Espionage&lt;/EM&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;That book is an easy read, draws the reader in like a good novel, and a great intro to why we all do what we do&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Many items of understanding our field are embedded in that real world tale, including the very important fact that "this ain't new, folks." The book was published three decades ago, describing events even farther back.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1. Malicious hacking is not only by geeky introvert teenagers in mom's basement. Foreign nations do it, too. (No longer as an essential lesson to blow out a myth than ten years ago.)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2. It's not always for kicks; real espionage has been online all along.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;3. "Lilly pad hopping" using multiple intermediary computers for packet transport to obscure the source is not new. (That term is not used in the book.)&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;4. Cliff implemented the first publicly known honeypot computer protection program, complete with live out-of-channel alert notification.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;(That term is not used in the book.)&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;5. Law enforcement and counter-intelligence agencies of multiple nations are hide-bound organizations resistant to major new information "not invented here," that is, information that is already on the list they already know they&amp;nbsp;need to monitor or investigate.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jun 2018 14:13:55 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Introductory-books-or-reading-for-the-security-curios/m-p/11861#M2917</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2018-06-28T14:13:55Z</dc:date>
    </item>
  </channel>
</rss>

