tag:blogger.com,1999:blog-4088979.post116425294457717156..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Three Seven-Book Lists for Novice, Intermediate, Advanced ReadersRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-4088979.post-1164392931145045062006-11-24T13:28:00.000-05:002006-11-24T13:28:00.000-05:00I also will suggest "Computer Viruses: From Theory...I also will suggest "Computer Viruses: From Theory to Applications" by Eric Filiol in the Advanced list.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-1164387472295702872006-11-24T11:57:00.000-05:002006-11-24T11:57:00.000-05:00I would list Stevens TCP/IP Illustrated Part 1 in ...I would list Stevens TCP/IP Illustrated Part 1 in the Novice list, then TCP/IP Illustrated Part 2 & 3 in Intermediate or Advanced lists.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-1164380331081658912006-11-24T09:58:00.000-05:002006-11-24T09:58:00.000-05:00why you don't devide your lists to those catigorie...why you don't devide your lists to those catigories:<BR/>1.pen testing/hacking <BR/>2.forensics<BR/>3.security perimeter<BR/>4.operating systems/hardening<BR/>5.security managament<BR/>6.secure coding/developing secure applications<BR/>7.security requirement/backgroundAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-1164318111574211482006-11-23T16:41:00.000-05:002006-11-23T16:41:00.000-05:00Interesting categorization.You seem to emphasize p...Interesting categorization.<BR/><BR/>You seem to emphasize practice over theory toward the "bootcamp" end of the spectrum, gradually changing the balance toward postgrad. For example, Radia Perlman doesn't show up until stage three.<BR/><BR/>I can't criticize this approach, but it certainly is different from how I came at the subject (perhaps this is because back in the day much of the "practical" stuff had yet to be written. Perlman's 1st edition preceded Cheswick and Bellovin by two years, eg.).<BR/><BR/>Personally, I found it extremely useful to read Perlman, and Stallings, and more RFCs than I care to remember, and to get the "practical" side of things through the school of hard knocks and working with people who had been in the game longer. I wonder whether the increasing prominence of "practical" writing reflects a change in how people learn infosec -- less through mentoring, for example?Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-1164288910610340672006-11-23T08:35:00.000-05:002006-11-23T08:35:00.000-05:00I am not familiar with the newest Comer book. I l...I am not familiar with the newest Comer book. I listed books I had read and reviewed, with only one or two exceptions.Richard Bejtlichhttps://www.blogger.com/profile/13512184196416665417noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-1164260720344376702006-11-23T00:45:00.000-05:002006-11-23T00:45:00.000-05:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-1164259083902550542006-11-23T00:18:00.000-05:002006-11-23T00:18:00.000-05:00Thanks for the updated lists, Richard. In my opini...Thanks for the updated lists, Richard. In my opinion, they are very well-organized, and much more useful for those of us searching for the right books to start reading.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-1164255308186125972006-11-22T23:15:00.000-05:002006-11-22T23:15:00.000-05:00i see you chose Farrel over Stevens. I understand...i see you chose Farrel over Stevens. I understand your reason - but I'm wondering how it compares to the other classic from the (still living and updating) Comer - search for ISBN:0131876716. If you know it, could you advise whether Farrel is worth tracking down, does he add anything?Anonymousnoreply@blogger.com