#CoSoSec query (and especially to @th3j35t3r): I have someone writing an article on books recommended by the Computer Security experts.
Which books were important in your own life? (In what way?) Which books would you recommend to anyone entering the field now? (And why would you choose THOSE?)
(Modeling it a bit on this article by @sjvn https://www.hpe.com/us/en/insights/articles/top-linux-developers-recommended-programming-books-1808.html )
@SheepOverboard
Would you still recommend it?
@estherschindler -- Short answer, yes, long: working on it; will get back to you :0)
@estherschindler - despite its age and the arcane environment, yes, definitely. Maybe as extra-curric.
These two reviews by people more qualified say what's good & bad about the story:
1. https://bit.ly/2DCMxKO
2. https://bit.ly/2B0FIQG
And how's about this video by the man himself, an older Clifford, with his crazy under-house storage robot :0)
https://youtu.be/-k3mVnRlQLU
@SheepOverboard If my author wanted to include your suggestion... how should she refer to you? (You can PM me a real name or other way for people to recognize, "This opinion is worthy of consideration.")
@estherschindler ~ hi, sorry for delay. Though I don't mind, my thoughts were hardly worthy. The two reviews I linked were far more informed, and the author would find much value in them. They are also quite well informed reviewers. PS, if need be, @SheepOverboard me on Twitter, where I more regularly monitor stuff.
@estherschindler @th3j35t3r @sjvn ~ for hands-on physicality and to grasp the essence (and required persistence) of detecting, then tracking a hacker, Stoll's The Cuckoo's Egg.
https://en.wikipedia.org/wiki/The_Cuckoo%27s_Egg