20
Ben Rothke CISSP, CISA Twitter: @benrothke Tales of plagiarism, copyists and some really good books from the Security Reading Room

Tales of plagiarism, copyists and some really good books from the security reading room

Embed Size (px)

DESCRIPTION

Tales of plagiarism, copyists and some really good books from the Security Reading Room

Citation preview

Page 1: Tales of plagiarism, copyists and some really good books from the security reading room

Ben Rothke CISSP, CISA

Twitter: @benrothke

Tales of plagiarism, copyists and some really

good books from the Security Reading Room

Page 2: Tales of plagiarism, copyists and some really good books from the security reading room

I see security book reviews…..

2

Page 3: Tales of plagiarism, copyists and some really good books from the security reading room

My criteria for a great security book

� Takes a broad, pragmatic and holistic look at the topic

� Bigger than a single technology

� Challenges the status quo and makes you think

3

Page 4: Tales of plagiarism, copyists and some really good books from the security reading room

Security Strategy: From Requirements to Reality

4

Page 5: Tales of plagiarism, copyists and some really good books from the security reading room

Security Strategy: From Requirements to Reality

5

Page 6: Tales of plagiarism, copyists and some really good books from the security reading room

Securing the Smart Grid: Next Generation Power Grid Security

6

Page 7: Tales of plagiarism, copyists and some really good books from the security reading room

Cryptography Engineering: Design Principles and Practical Applications

7

Page 8: Tales of plagiarism, copyists and some really good books from the security reading room

Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

8

Page 9: Tales of plagiarism, copyists and some really good books from the security reading room

Managing an Information Security and Privacy Awareness and Training Program

9

Page 10: Tales of plagiarism, copyists and some really good books from the security reading room

Self-publishing: a perfect plagiarism storm

10

Page 11: Tales of plagiarism, copyists and some really good books from the security reading room

The Security Policy Cookbook: A Guide for IT and Security Professionals

11

Page 12: Tales of plagiarism, copyists and some really good books from the security reading room

Security policy from the Heart of Texas

12

Page 13: Tales of plagiarism, copyists and some really good books from the security reading room

Amazon: we ain’t gonna remove no stinkin plagiarized books

13

Page 14: Tales of plagiarism, copyists and some really good books from the security reading room

William Manning – international certification man of mystery

14

Page 15: Tales of plagiarism, copyists and some really good books from the security reading room

William Manning – certification machine

15

Page 16: Tales of plagiarism, copyists and some really good books from the security reading room

How To Become The Worlds No. 1 Hacker

16

Page 17: Tales of plagiarism, copyists and some really good books from the security reading room

Portrait of the plagiarist

17

Page 18: Tales of plagiarism, copyists and some really good books from the security reading room

Shooting the messenger

18

Page 19: Tales of plagiarism, copyists and some really good books from the security reading room

Never said I actually wrote the book

19

Page 20: Tales of plagiarism, copyists and some really good books from the security reading room

Some of the best books yet to be written

20