> drobinson138 (Newcomer I) posted a new reply in Welcome on 12-13-2020 06:13 AM
> Appreciate the insight. Definitely something to consider.
OK, maybe that seemed like a bit of a daunting challenge. I'll give you a tip:
review security books.
Lots of 'em.
By the time I sat the exam, I was already known, at meetings and conferences and
online, as "the book guy." At that time I had reviewed over 300 books in the
security literature catalogue. Reviewed, which means I a) had to read them (all the
way through), b) had to understand them, and c) had to test my understanding by
sending my opinion out onto the Internet. (Believe me, if you get it wrong, the
net will let you know.)
Start with "Security Engineering," by Ross Anderson. It's the best. Anything Ross
writes is worth reading. You should get a copy. But, if you're a little pressed for
cash, you can also read it for free, online:
http://www.cl.cam.ac.uk/~rja14/book.htmlThen you can see what your library has, also for free.
By that time you might start to get a name for yourself, and you can start
contacting publishers and asking for review copies. To find the addresses of
publishers, you can check out the reviews I did. Most of them have the addresses
in the reviews:
http://victoria.tc.ca/int-grps/books/techrev/mnbksc.htm(If you just want to start out with the best of the bunch, because there's a lot of
[pr0n filter] out there, then start with:
http://victoria.tc.ca/int-grps/books/techrev/mnbksccd.htm )
It's a really good way to make sure you know the field.
====================== (quote inserted randomly by Pegasus Mailer)
rslade@gmail.com rmslade@outlook.com rslade@computercrime.org
You can't have privacy without security, and I think we have
glaring failures in computer security in problems that we've been
working on for 40 years. You really should not live in fear of
opening an attachment to a message. It ought to be confined;
your computer ought to be able to handle it. And the fact that
we have persisted for decades without solving these problems is
partly because they're very difficult, but partly because there
are lots of people who want you to be secure against everyone but
them. And that includes all of the major computer manufacturers
who, roughly speaking, want to manage your computer for you.
- Whitfield Diffie
victoria.tc.ca/techrev/rms.htm
http://twitter.com/rsladehttp://blogs.securiteam.com/index.php/archives/author/p1/https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413
............
Other posts: https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413
This message may or may not be governed by the terms of
http://www.noticebored.com/html/cisspforumfaq.html#Friday or
https://blogs.securiteam.com/index.php/archives/1468