posted 17 years ago
Gladly.
Study Java.
That may seem an overly brief answer. It is not. I have put much effort into computer studies. In all of my studies I have never found a single rich-field of information of the degree, kind, caliber and depth of Java. Java is a large, world effort in computer science that is done spontaneously by people who enjoy the work.
There are lots of products avaliable commercially, and many of them are well worth the investment for a business that needs the paticular skills and knowledge a product has. Ususally, an investment in a commercially packaged application of computer science to a definite business need allows the business to get on with their core business - the commercial software package has ( ususally ) people who can get the thing running to do the work the business wishes done.
Learning computer science is another matter. I abandoned traditional education finding the arena overly packed with what in my native linguistic is ( idiomatic ) called "degree mill" - which conveys a concept of students who are mostly interested in the degree, the prestige it brings and the order out of chaos such a system brings to the employment market.
My direct advice, respondent to your invitation, is to obtain all available information you can on Java: I have sat in on classes in the second semester in the second term of a two-year program devoted to teaching computer science at a technical institution, observing devotion to trivial matters and weighing the simplest of issues as advanced matters to be left to the experts.
Java introductory material can in reasonable effort totally outpace such a course in a matter of months. This statement skips some practical issues, but if you find my previous advice productive I can without reservation state that the most advanced work in computer science commonly shows up while studying java. Security is no exception.
Often, security is oversimplified as Cryptology. Google for "simon singh" - there you will read the work of masters, masters from all places and cultures, in every arena and skill and obtain an overview of what a carrer in information security should be guided by.
"The differential equations that describe dynamic interactions of power generators are similar to that of the gravitational interplay among celestial bodies, which is chaotic in nature."