From ff557b92662b0953592fc9f75483a8b8c41bbf7d Mon Sep 17 00:00:00 2001 From: Brian Kung <2836167+briankung@users.noreply.github.com> Date: Tue, 6 Nov 2018 19:06:32 -0600 Subject: [PATCH] Fixes Amazon Reading List URLs (#48) --- intro/careers.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/intro/careers.md b/intro/careers.md index 1da07df..85e460b 100644 --- a/intro/careers.md +++ b/intro/careers.md @@ -45,7 +45,7 @@ I primarily split up infosec jobs into internal network security, product securi The roles above each require a different, highly specialized body of knowledge. This website is a great resource for application security and penetration testing, but you should find other resources if you are interested in a different role. ## Learn from a Book -Fortunately, there are dozens of good books written about each topic inside information security. [Dino Dai Zovi](http://www.amazon.com/A-Bug-Hunters-Reading-List/lm/R21POHD6Y2DOLQ) and [Tom Ptacek](http://www.amazon.com/lm/R2EN4JTQOCHNBA/ref=cm_lm_pthnk_view) both have excellent reading lists. We recommend looking at: +Fortunately, there are dozens of good books written about each topic inside information security. [Dino Dai Zovi](https://www.amazon.com/ideas/amzn1.account.AHMETKWTW3WIMNFDCKU6HJOTXOAQ/17DNK7MXJFZPF) and [Tom Ptacek](https://www.amazon.com/ideas/amzn1.account.AFLMETB3SIZ4WEOS2SKTP65RLQDQ/25GGLAA74Q7D4) both have excellent reading lists. We recommend looking at: * [Gray Hat Hacking](http://www.amazon.com/Hacking-Ethical-Hackers-Handbook-Edition/dp/0071832386/) * [The Myths of Security](http://www.amazon.com/Myths-Security-Computer-Industry-Doesnt/dp/0596523025?)