Robert Slade

Robert Michael Slade, also known as Robert M. Slade and Rob Slade, is a Canadian information security consultant, researcher and instructor. He is the author of Robert Slade's Guide to Computer Viruses, Software Forensics, Dictionary of Information Security and co-author of Viruses Revealed. Slade is the author of thousands of technical book reviews, today published on the techbooks mailing list and in the RISKS Digest, and archived in his Internet Review Project. An expert on computer viruses and malware, he is also the Mr. Slade of "Mr. Slade's lists".

Robert Slade
NationalityCanadian
Alma materUniversity of British Columbia
University of Oregon
Regent College
Scientific career
FieldsInformation security
Malware
Professional certification

Family and education

Slade married Gloria J. Slade who edits much of his work[1] and is the editor of Slade's book reviews.[2] Their grandchildren appear in the From field of every review, in 2008 from "Rob, grandpa of Ryan, Trevor, Devon & Hannah".[3] He holds a bachelor's degree from the University of British Columbia, a master's in computer and information science education from the University of Oregon and a diploma in Christian studies from Regent College.[1]

Malware and forensics

Slade became one of a small number of researchers who can be called the world's experts on malware. Fred Cohen named Slade's early work organizing computer viruses, software, BBSes and book reviews Mr. Slade's lists.[4][5] Slade is one of fewer than thirty people worldwide who are credited for contributions in the final version of the VIRUS-L FAQ, which, with the Usenet group comp.virus and the VIRUS-L mailing list, was the public group of record for computer virus issues from 1988 to 1995.[6] Until 1996 he maintained the Antiviral Software Evaluation FAQ, a quick reference for users seeking antivirus software and a vendor contacts list.[7] He was a contributor as well to at least three[8] other group computer virus FAQs before the Web came to prominence. He has written two books about viruses: he was sole author of Robert Slade's Guide to Computer Viruses, first published in 1994 (2nd edition 1996) and co-wrote Viruses Revealed with David Harley and Urs Gattiker in 2001.

Slade advanced the field of computer forensics when through his antivirus research he found that the intentions and identity of virus authors can be discovered in their program code.[9] He created the first course ever offered in forensic programming.[10][11] His book Software Forensics was published in 2004[12] and his chapter on the subject is in print in the Information Security Management Handbook as of the fifth edition.[13]

Information security

Today Slade is a consultant to businesses and government—among his client list are Fortune 500 companies and the government of Canada[14]—as well as to educational institutions. He created curricula and taught courses for Simon Fraser University, MacDonald Dettwiler, and the University of Phoenix.[14] Slade creates seminars[15] for local, federal and international training groups. He is a senior instructor for (ISC)² where he develops courses in information security and quality assurance (QA)[15] for those who seek certification.[14][16] Slade himself is one of the world's approximately 60,000[17] CISSPs,[13] a certification used in private industry as well as, at least in the United States, in government and defense.[18][19][20]

Slade moved his online security glossary in 2006 to the book Dictionary of Information Security.[21] Virus Bulletin remarked about the unusual collection of five forewords,[22] "that so many acknowledged experts are willing to contribute says something about the author's standing in the field"—the forewords were written by Fred Cohen, Jack Holleran, Peter G. Neumann, Harold Tipton and Gene Spafford.[22] The dictionary is considered to be "dependable baseline definitions"[22] and a "citable, common source".[23]

Internet Review Project

Slade has "surveyed most of the literature"[23] in his field and shared his knowledge in the Internet Review Project,[3] the published book reviews for which he is perhaps most widely known. He reviews other works but gave first priority to information security. His reviews are often critical—to the project FAQ question, "Don't you like any books?", Slade replied that he may be cruel but is fair.[24]

Bibliography

  • Slade, Robert (2006). Dictionary of Information Security. Syngress. ISBN 1-59749-115-2. Retrieved 2008-05-20.
  • Slade, Robert M. (2004). Software Forensics : Collecting Evidence from the Scene of a Digital Crime. McGraw-Hill Professional. ISBN 0-07-142804-6.
  • Harley, David, Robert Slade and Urs E. Gattiker (2001). Viruses Revealed. McGraw-Hill Companies. ISBN 0-07-213090-3.CS1 maint: multiple names: authors list (link)
  • Slade, Robert, 1994 (1996). Robert Slade's Guide to Computer Viruses: How to Avoid Them, How to Get Rid of Them, and How to Get Help (2 ed.). Springer. ISBN 0-387-94311-0.CS1 maint: numeric names: authors list (link)

Notes

  1. Slade, Robert (2006). Dictionary of Information Security. Syngress. pp. Front. ISBN 1-59749-115-2.
  2. "BKBUGWRT.RVW". Robert and Gloria Slade. 1995–1998. Retrieved 2008-05-20.CS1 maint: date format (link)
  3. "techbooks: Internet Review Project". Yahoo! Groups. Retrieved 2008-05-20.
  4. "Dr. Fred Cohen". Robert Slade. Retrieved 2008-05-22.
  5. "Editorial reviews of Software Forensics". Various via Amazon.com. July 2004. Retrieved 2008-05-21.
  6. FitzGerald, Nick (maintainer) (October 9, 1995). "VIRUS-L/comp.virus Frequently Asked Questions (FAQ) v2.00". Advameg. Retrieved 2008-05-22.
  7. "Antiviral Software Evaluation FAQ". Robert Slade. November 13, 1996. Retrieved 2008-05-22.
  8. Wenzel, George (maintainer) (August 19, 1999). "alt.comp.virus (Frequently Asked Questions) Version 1.1". Advameg. Retrieved 2008-05-22. and Wenzel, George (maintainer) (August 23, 1999). "Mini-FAQ: alt.comp.virus (version 1.2)". Advameg. Retrieved 2008-05-22. and Harley, David (maintainer) (January 7, 2000). "Viruses and the Mac FAQ Version 1.6b". Advameg. Retrieved 2008-05-22.
  9. Slade, Robert M. (2004). Software Forensics : Collecting Evidence from the Scene of a Digital Crime. McGraw-Hill Professional. p. 5. ISBN 0-07-142804-6.
  10. "Speaker Bios". (ISC)². Retrieved 2008-05-20.
  11. "Software Forensics/Forensic Programming course table of contents". Robert Slade. Retrieved 2008-05-20.
  12. "Software Forensics". McGraw-Hill (mcgraw-hill.com.au). Retrieved 2008-05-20.
  13. Tipton Harold F. and Micki Krause (Eds.) (2003). Information Security Management Handbook. Auerbach. p. Table of Contents. ISBN 0-8493-1997-8.CS1 maint: extra text: authors list (link)
  14. "Author Biography". McGraw-Hill (mcgraw-hill.com.au). Retrieved 2008-05-20.
  15. "Rob Slade". LinkedIn. Retrieved 2008-05-22.
  16. Hansche, Susan, John Berti and Chris Hare (2003). Official (ISC)2 guide to the CISSP exam. CRC Press. p. xiii. ISBN 0-8493-1707-X.CS1 maint: multiple names: authors list (link)
  17. Member count was 59,797 as of May 20, 2008 in "Member Counts". (ISC)². Retrieved 2008-05-20.
  18. "CISSP (Certified Information Systems Security Professional) (Management Level 2 & 3 Training %2F Technical Level 3 Training)". U.S. Army Information Assurance Training Center. Retrieved 2008-05-22.
  19. "NSA Certifies Information Security Staff; CISSP Designation Awarded to 51 Employees" (Press release). (ISC)2, NSA via CNET Networks (BNET). November 18, 2002. Retrieved 2008-05-22.
  20. "(ISC)² Launches New Certification for U.S. National Security Information Security Professionals" (Press release). (ISC)². July 23, 2003. Retrieved 2008-05-22.
  21. "Rob Slade's Dictionary Errata Page". Robert Slade. Retrieved 2008-05-20.
  22. Harley, David (September 2006). "War of the Words". Virus Bulletin: 13–14. ISSN 1749-7027. Retrieved 2008-05-20.
  23. Eugene Spafford in Slade, Robert (2006). Dictionary of Information Security. Syngress. pp. Front. ISBN 1-59749-115-2.
  24. "Rob Slade's Book Reviews FAQ". Retrieved 2008-05-20.
gollark: The connectivity is different, isn't it?
gollark: ```scheme(define gollariosity (lambda (x y z) (if (= (z y x z) 0) 0 1)))```
gollark: Until someone does things and it undergoes !!RECURSION!!.
gollark: My strategy is (marginally) optimal muahahaha.
gollark: Tit-for-tat also needs fixing.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.