Solved

Could you please point out some reputable IT security journals, publications, or magazines that I should subscribe to?

Posted on 2006-11-28
4
337 Views
Last Modified: 2010-04-11
Greetings,

I am thinking of moving into the field of IT security. Could you please point out some reputable IT security journals, publications, or magazines that I should subscribe to?
0
Comment
Question by:wnexpert
4 Comments
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 18034291
http://www.schneier.com/blog/ Anything by Mr Schneier is great, I recommend his books: http://www.schneier.com/books.html
Wired is good: http://blog.wired.com/27bstroke6/2006/11/boarding_pass_h.html
The 2600 is classic: http://www.2600.com/ but SANS and CERT are better:
http://sans.org/  http://www.cert.org/ http://secunia.com/
Hacking Exposed series of books are a great place to start as well: http://www.hackingexposed.com/
-rich
0
 
LVL 14

Expert Comment

by:JohnK813
ID: 18037555
Here's one thing to add to Rich's list (which includes some sources that are new to me and that I will definitely have to check out): Sign up for some of Security Focus' mailing lists.  Even if you don't participate in them (by sending emails to the list), it's still very educational to watch other IT security experts converse - especially when they discover and solve new vulnerabilities.

http://www.securityfocus.com/archive
0
 
LVL 14

Expert Comment

by:chris_calabrese
ID: 18069291
On the paper side Information Security (http://informationsecurity.techtarget.com/) is pretty decent.
0
 

Accepted Solution

by:
billyrials earned 25 total points
ID: 18078562
In addition to the ones pointed out by rich and john you might check out these on the paper side
Computer World (www.computerworld.com)
Messaging News (www.messagingnews.com)
Storage Magazine (www.storagemagazine.com)
-billy
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Using Outlook for iOS securely 2 44
Site-To-site VPN Natting inbound traffic? 9 71
How to keep XP in VM over Ubuntu from being Virus'd 22 92
PCI compliance 16 33
Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question