ISW Security Papers Contest
 

Reviewer Details:

Name: Charles Hornat
Occupation: Information Security Analyst
Info: Charles Hornat has more than a decade of computer industry experience in sales, technical and executive management positions on Wall Street, with a focus on Information Security for the past 5 years. He is an active participant in SANS for the last few years and currently serving on the SANS GISO/GISF board.

Reviews by Charles Hornat

HackNotes(tm) Linux and Unix Security Portable Reference by Nitesh Dhanjani
Incident Response: Computer Forensics Toolkit by Douglas Schweitzer
Exploiting Software: How to Break Code by Greg Hoglund
Malware: Fighting Malicious Code by Ed Skoudis, Lenny Zeltser
Information Trickery: The Great IT Upgrade Scam by Brian Hitchen and Mike Lee
Astalavista Security Toolbox DVD v1.0 by Astalavista
Malicious Cryptography: Exposing Cryptovirology by Adam L. Young, Moti Yung
Anti-Spam Tool Kit by Paul Wolfe, Charlie Scott, Mike Erw
Execution: The Discipline of Getting Things Done by Larry Bossidy, Ram Charan, et al.
Introduction to Computer Security by Matt Bishop
Security Warrior by Anton Chuvakin
Mapping Security by Tom Patterson w/ Scott Gleeson Blue
The Art of Computer Virus Research and Defense by Peter Szor
Inside Network Perimeter Security by Stephen Northcutt, et al
The Art of intrusion by Kevin D. Mitnick & William L. Simon
Rootkits: Subverting the Windows Kernel by Greg Hoglund & James Butler
The Little Black Book of Computer Security by Joel Dubin
Cryptography in the Database by Kevin Kenan
Extrusion Detection: Security Monitoring for Internal Intrusions by Richard Bejtlich
Counter Hack Reloaded by Ed Skoudis
How to Break Web Software by Mike Andrews and James A. Whittaker
Stealing the Network: How to Own an Indentity by Raven Adler, Jay Beale, Riley “Caez

Other reviewers

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , Infosecwriters.com. All rights reserved. Comments are property of the respective posters.