{"id":182,"date":"2014-03-24T16:20:37","date_gmt":"2014-03-24T22:20:37","guid":{"rendered":"http:\/\/cybersecurity.bellevue.edu\/?p=182"},"modified":"2021-08-30T13:10:09","modified_gmt":"2021-08-30T19:10:09","slug":"my-security-bookshelf","status":"publish","type":"post","link":"https:\/\/cybersecurity.bellevue.edu\/index.php\/2014\/03\/24\/my-security-bookshelf\/","title":{"rendered":"My Security Bookshelf"},"content":{"rendered":"<p>I recently was asked, \u201cWhat books, article, websites, blogs, or videos do you recommend for those just beginning in Cybersecurity?\u201d<br \/>\nIt\u2019s a great question with many answers. Too bad you can&#8217;t just come to my office and look on my bookshelf&#8230;<\/p>\n<p>There are many reading and viewing options for cybersecurity.\u00a0 The challenge isn\u2019t the lack of material, but the overabundance (which is a good topic for another blog post).<br \/>\nThe following resources are great for all levels of cybersecurity professionals.<\/p>\n<p><b>Blogs &amp; websites<\/b>:<\/p>\n<p>&#8211; Bruce Schneier on Security: <a href=\"https:\/\/www.schneier.com\/\">https:\/\/www.schneier.com\/<\/a><br \/>\n&#8211; Dark Reading: <a href=\"http:\/\/www.darkreading.com\/\">http:\/\/www.darkreading.com\/<\/a><br \/>\n&#8211; CSO Online: <a href=\"http:\/\/www.csoonline.com\/\">http:\/\/www.csoonline.com\/<\/a><br \/>\n&#8211; Threatpost: <a href=\"http:\/\/threatpost.com\/\">http:\/\/threatpost.com\/<\/a><\/p>\n<p><b>Videos<\/b>:<\/p>\n<p>&#8211; RSA Conference 2014 On-Demand Sessions: <a href=\"http:\/\/www.rsaconference.com\/events\/us14\/downloads-and-media\/video-index\">http:\/\/www.rsaconference.com\/events\/us14\/downloads-and-media\/video-index<\/a><br \/>\n&#8211; TED Talks Playlist, Who are the hackers? &#8211; <a href=\"http:\/\/www.ted.com\/playlists\/10\/who_are_the_hackers.html\">http:\/\/www.ted.com\/playlists\/10\/who_are_the_hackers.html<\/a><br \/>\n&#8211; TED Talk, Bruce Schneier: The security mirage: <a href=\"http:\/\/www.ted.com\/talks\/bruce_schneier.html\">http:\/\/www.ted.com\/talks\/bruce_schneier.html<\/a><br \/>\n&#8211; \u00a0Cambridge Ideas, Professor Risk (Dr. David Spiegelhalter): <a href=\"http:\/\/www.youtube.com\/watch?v=a1PtQ67urG4\">http:\/\/www.youtube.com\/watch?v=a1PtQ67urG4<\/a><\/p>\n<p><b>Books<\/b>:<\/p>\n<p>&#8211; &#8220;The Cuckoo&#8217;s Egg,&#8221; Clifford Stoll,<br \/>\n&#8211; &#8220;Secrets &amp; Lies,&#8221; Bruce Schneier<br \/>\n&#8211; &#8220;The Art of Deception,&#8221; Kevin Mitnick<br \/>\n&#8211; &#8220;Spies Among Us,&#8221; Ira Winkler<\/p>\n<p><b>Book Reviews &amp; Commentary: <\/b><\/p>\n<p>&#8211; At the 2014 RSA Conference, <a href=\"https:\/\/plus.google.com\/+RickHoward\/posts\">Rick Howard<\/a> of Palo Alto Networks\u00a0 gave a talk titled, \u201c<a href=\"http:\/\/www.careersinfosecurity.com\/cybersecurity-canon-must-reads-a-6561\">The Cybersecurity Canon: Must-Reads<\/a>.\u201d You can also find the list of his favorite cyber\/security books on his Terebrate blog at <a href=\"http:\/\/terebrate.blogspot.com\/2014\/02\/books-you-should-have-read-by-now.html\">http:\/\/terebrate.blogspot.com\/2014\/02\/books-you-should-have-read-by-now.html<\/a>.<\/p>\n<p>&#8211; Ben Rothke, a well-known security guru \/ speaker \/ writer, provides numerous book reviews for RSA including <a href=\"http:\/\/www.rsaconference.com\/blogs\/502\/rothke\/the-best-new-books-from-rsa-2014\">The Best New Books from RSA Conference 2014<\/a>.\u00a0 You can see all of his RSA blog posts at <a href=\"http:\/\/www.rsaconference.com\/blogs?keywords=rothke\">www.rsaconference.com\/blogs?keywords=rothke<\/a>.<\/p>\n<p>The time you spend on these resources will be well spent in developing yourself as a cybersecurity professional.\u00a0 If you have one you think is missing, please provide a reply or <a href=\"mailto:ronald.woerner@bellevue.edu?subject=Cyber%20Blog%20Resources\">email me<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I recently was asked, \u201cWhat books, article, websites, blogs, or videos do you recommend for those just beginning in Cybersecurity?\u201d It\u2019s a great question with many answers. Too bad you can&#8217;t just come to my office and look on my bookshelf&#8230; There are many reading and viewing options for cybersecurity.\u00a0 The challenge isn\u2019t the lack [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[32,8,3],"tags":[],"class_list":["post-182","post","type-post","status-publish","format-standard","hentry","category-concepts","category-security-education","category-security-management"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/comments?post=182"}],"version-history":[{"count":1,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/182\/revisions"}],"predecessor-version":[{"id":183,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/182\/revisions\/183"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/media?parent=182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/categories?post=182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/tags?post=182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}