Robert Slade

Robert Michael Slade, also known as Robert M. Slade and Rob Slade, is a Canadian information security consultant, researcher and instructor. He is the author of Robert Slade's Guide to Computer Viruses, Software Forensics, Dictionary of Information Security and co-author of Viruses Revealed. Slade is the author of thousands of technical book reviews, today published on the techbooks mailing list and in the RISKS Digest, and archived in his Internet Review Project. An expert on computer viruses and malware, he is also the Mr. Slade of "Mr. Slade's lists".

Robert Slade
NationalityCanadian
Alma materUniversity of British Columbia
University of Oregon
Regent College
Scientific career
FieldsInformation security
Malware
Professional certification

Family and education

Slade married Gloria J. Slade who edits much of his work[1] and is the editor of Slade's book reviews. He holds a bachelor's degree from the University of British Columbia, a master's in computer and information science education from the University of Oregon and a diploma in Christian studies from Regent College.[1]

Malware and forensics

Slade became one of a small number of researchers who can be called the world's experts on malware. Fred Cohen named Slade's early work organizing computer viruses, software, BBSes and book reviews Mr. Slade's lists.[2][3] Slade is one of fewer than thirty people worldwide who are credited for contributions in the final version of the VIRUS-L FAQ, which, with the Usenet group comp.virus and the VIRUS-L mailing list, was the public group of record for computer virus issues from 1988 to 1995.[4] Until 1996 he maintained the Antiviral Software Evaluation FAQ, a quick reference for users seeking antivirus software and a vendor contacts list.[5] He was a contributor as well to at least three[6] other group computer virus FAQs before the Web came to prominence. He has written two books about viruses: he was sole author of Robert Slade's Guide to Computer Viruses, first published in 1994 (2nd edition 1996) and co-wrote Viruses Revealed with David Harley and Urs Gattiker in 2001.

Slade advanced the field of computer forensics when through his antivirus research he found that the intentions and identity of virus authors can be discovered in their program code.[7] He created the first course ever offered in forensic programming.[8][9] His book Software Forensics was published in 2004[10] and his chapter on the subject is in print in the Information Security Management Handbook as of the fifth edition.[11]

Information security

Today Slade is a consultant to businesses and government—among his client list are Fortune 500 companies and the government of Canada[12]—as well as to educational institutions.[12] Slade creates seminars for local, federal and international training groups. He is a senior instructor for (ISC)² where he develops courses in information security and quality assurance (QA) for those who seek certification.[12][13] Slade himself is one of the world's approximately 60,000[14] CISSPs,[11] a certification used in private industry as well as, at least in the United States, in government and defense.[15][16][17]

Slade moved his online security glossary in 2006 to the book Dictionary of Information Security.[18] Virus Bulletin remarked about the unusual collection of five forewords,[19] "that so many acknowledged experts are willing to contribute says something about the author's standing in the field"—the forewords were written by Fred Cohen, Jack Holleran, Peter G. Neumann, Harold Tipton and Gene Spafford.[19] The dictionary is considered to be "dependable baseline definitions"[19] and a "citable, common source".[20]

Internet Review Project

Slade has "surveyed most of the literature" in his field and shared his knowledge in the Internet Review Project, a collection of his published book reviews.[20] While his first priority to information security, he reviews works in other fields as well. His reviews are often critical; to the project FAQ question "Don't you like any books?", Slade replies "I'm a cruel reviewer. But fair!"[21]

Bibliography

  • Slade, Robert (2021). Cybersecurity Lessons from CoVID-19. CRC Press. ISBN 978-0367682699. Retrieved 2021-07-04.
  • Slade, Robert (2006). Dictionary of Information Security. Syngress. ISBN 1-59749-115-2. Retrieved 2008-05-20.
  • Slade, Robert M. (2004). Software Forensics : Collecting Evidence from the Scene of a Digital Crime. McGraw-Hill Professional. ISBN 0-07-142804-6.
  • Harley, David; Slade, Slade; Gattiker, Urs E. (2001). Viruses Revealed. McGraw-Hill Companies. ISBN 0-07-213090-3.
  • Slade, Robert (1996). Robert Slade's Guide to Computer Viruses: How to Avoid Them, How to Get Rid of Them, and How to Get Help (2 ed.). Springer. ISBN 0-387-94311-0.

Notes

  1. Slade, Robert (2006). Dictionary of Information Security. Syngress. pp. Front. ISBN 1-59749-115-2.
  2. "Dr. Fred Cohen". Robert Slade. Retrieved 2008-05-22.
  3. "Editorial reviews of Software Forensics". Various via Amazon.com. July 2004. Retrieved 2008-05-21.
  4. FitzGerald, Nick (October 9, 1995). "VIRUS-L/comp.virus Frequently Asked Questions (FAQ) v2.00". Advameg. Retrieved 2008-05-22.
  5. "Antiviral Software Evaluation FAQ". Robert Slade. November 13, 1996. Retrieved 2008-05-22.
  6. Wenzel, George (August 19, 1999). "alt.comp.virus (Frequently Asked Questions) Version 1.1". Advameg. Retrieved 2008-05-22. and Wenzel, George (August 23, 1999). "Mini-FAQ: alt.comp.virus (version 1.2)". Advameg. Retrieved 2008-05-22. and Harley, David (January 7, 2000). "Viruses and the Mac FAQ Version 1.6b". Advameg. Retrieved 2008-05-22.
  7. Slade, Robert M. (2004). Software Forensics : Collecting Evidence from the Scene of a Digital Crime. McGraw-Hill Professional. p. 5. ISBN 0-07-142804-6.
  8. "Speaker Bios". (ISC)². Retrieved 2008-05-20.
  9. "Software Forensics/Forensic Programming course table of contents". Robert Slade. Retrieved 2008-05-20.
  10. "Software Forensics". McGraw-Hill (mcgraw-hill.com.au). Archived from the original on 2008-08-03. Retrieved 2008-05-20.
  11. Tipton, Harold F.; Krause, Micki, eds. (2003). Information Security Management Handbook. Auerbach. p. Table of Contents. ISBN 0-8493-1997-8.
  12. "Author Biography". McGraw-Hill (mcgraw-hill.com.au). Archived from the original on 2008-08-03. Retrieved 2008-05-20.
  13. Hansche, Susan; Berti, John; Hare, Hare (2003). Official (ISC)2 guide to the CISSP exam. CRC Press. p. xiii. ISBN 0-8493-1707-X.
  14. Member count was 59,797 as of May 20, 2008 in "Member Counts". (ISC)². Retrieved 2008-05-20.
  15. "CISSP (Certified Information Systems Security Professional) (Management Level 2 & 3 Training %2F Technical Level 3 Training)". U.S. Army Information Assurance Training Center. Retrieved 2008-05-22.
  16. "NSA Certifies Information Security Staff; CISSP Designation Awarded to 51 Employees" (Press release). (ISC)2, NSA via CNET Networks (BNET). November 18, 2002. Retrieved 2008-05-22.
  17. "(ISC)² Launches New Certification for U.S. National Security Information Security Professionals" (Press release). (ISC)². July 23, 2003. Retrieved 2008-05-22.
  18. "Rob Slade's Dictionary Errata Page". Robert Slade. Retrieved 2008-05-20.
  19. Harley, David (September 2006). "War of the Words". Virus Bulletin: 13–14. ISSN 1749-7027. Retrieved 2008-05-20.
  20. Eugene Spafford in Slade, Robert (2006). Dictionary of Information Security. Syngress. pp. Front. ISBN 1-59749-115-2.
  21. "Rob Slade's Book Reviews FAQ". Retrieved 2008-05-20.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.