
Download App
ISBN
:
9788126513871
Publisher
:
Wiley India Pvt Ltd
Binding
:
paperback
Pages
:
238
Year
:
2007
₹
179.0
₹
168.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View DetailsEstimated Shipping Time : 5-7 Business Days
View DetailsDescription
This book is a Security Crash Course to prepare for the all-important job interview, where even technology professionals seeking the higher-paying coveted security jobs, will have to know security fundamentals to land the job.
Author Biography
Chris Butler is a Network Security engineering and management professional responsible for projects and staffing at leading companies such as Edward Jones, Discovery Communications, GCI, OPNET, Butler University. He is certified as a CISSP, CCNA, and CCSE/CCSA Checkpoint Expert. Russ Rogers is Principal Security Consultant for Security Horizon with contract support for the National Security Agency and the Defense Information Systems Agency. He is editor-in-chief of The Security Journal and Professor of Network Security at the University of Advancing Technology in Tempe, AZ and co-founder of the Security Tribe information security research web site at www.securitytribe.com. Greg Miles Ph.D., CISSP, CISM, IAM, is VP of Security Horizon with years of information security experience in Federal and commercial sectors and contract support for the National Security Agency, Defense Information Systems Agency, Air Force Space Command, and NASA. Greg holds a Ph.D. in Engineering Management, a Masters in Business Administration, and a Bachelors in Electrical Engineering. Mason Ferratt MSEE, BSME is a senior network security analyst with large-scale network security engineering experience for numerous government clients. He holds an MS in Electrical Engineering and BS in Mechanical Engineering, holds a Top Secret/SCI clearance, and is an IEEE member. Chris Hurley (Roamer) is a Senior Penetration Tester. He is the founder of WorldWide WarDrive, spurred by security professionals and hobbyists to generate awareness of insecurities in wireless networks and is the lead of DEF CON's WarDriving Conest. Ed Fuller CISSP, GSEC, IAM , has over 26 years of experience in Operations, Tactical, and Computer Information Systems and Security. Ed serves as a Lead Instructor for the National Security Agencies (NSA) Information Assurance Methodology (IAM). Ed holds a B.S. degree in Information Systems Management, certification in SANS GSEC and CISSP. Table of Contents Acknowledgments. Introduction. Chapter 1: Finding, Interviewing for, and Getting the Job. o Qualifications. o Pursuing a Degree. o The Perfect Job. o Job Search. o Interviewing. o Money Talks. o Accepting or Rejecting the Offer. o Summary. o Nontechnical Interview Questions. Chapter 2: Knowing Networks: Fundamentals. o Introduction. o Questions. o Recommended Reading. Chapter 3: Knowing Security: Fundamentals. o Adjust Your Thinking. o Core Values. o Basic Concepts. o Managing Risk. o Data Classification and Labeling. o Ethics in Information Security. o Daily Security Responsibilities. o Summary. o Interview Q&A. o Recommended Reading. Chapter 4: Understanding Regulations, Legislation, and Guidance. o Regulations, Legislation, and Guidance Defined. o Why Does an Employer Care? o Why Should You Care? o Government- and DoD-Specific Information. o Commercial Information Security. o Using This Information in the Interview. o Summary. o Interview Q&A. o Recommended Reading. Chapter 5: Knowing Firewalls: Fundamentals. o Firewall Technologies. o Major Vendors. o Device Types. o Management. o Deployment Strategies. o Summary. o Interview Q&A. o Recommended Reading. Chapter 6: Knowing Virtual Private Networks. o Goals and Assumptions. o The Cryptography of VPNs. o IP Security Review. o Implementing IPsec. o Alternatives to IPsec. o Summary. o Interview Q&A. o Recommended Reading. Chapter 7: Knowing IDS/IPS/IDP. o Introduction. o Questions. o What Questions Do You Want to Ask Me? o Recommended Reading. Chapter 8: Everything You Ever Wanted to Know about Wireless but Were Afraid They' Ask. o The Fundamentals. o Wireless Cards and Chipsets. o Wireless Drivers for Linux. o WLAN Detection (WarDriving). o Wireless Security. o Rogue Wireless Devices. o Summary. o Interview Q&A. o Recommended Reading. Chapter 9: Finding Your Posture. o History of Information Security. o Modern Information Security. o Security Objectives. o Determining the Security Posture. o Prioritizing the Vulnerabilities. o Vulnerability Management. o Summary. o Interview Q&A. o Recommended Reading. Chapter 10: Tools. o Enumeration, Port Scanning, and Banner Grabbing. o Wireless Enumeration. o Vulnerability Scanning. o Password Compliance Testing. o Network Sniffing. o Penetration Testing. o Learning. o Summary. o Interview Q&A. o Recommended Reading. o Additional Resources. o Index.
Related Items
-
of
Professional Asp.Net 3.5 Security, Membership, And Role Management With C# And Vb
Bilal Haidar
Starts At
545.0
699.0
22% OFF
Administering Windows Vista Security:The Big Surprises
Byron Hynes Mark Minasi
Starts At
314.0
349.0
10% OFF
Network Security Essentials : Applications and Standards
William Stallings
Starts At
486.0
649.0
25% OFF
RFID Handbook:Applications, Technology, Security, and Privacy
Syed A. Ahson
Starts At
2660.0
3500.0
24% OFF
Use of Risk Analysis in Computer-Aided Persuasion (Nato Science for Peace and Security Series: E: Human and Societal Dynamics)
E. Duman
Starts At
10890.0
12663.0
14% OFF
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes: Volume 23 NATO Science for Peace and Security Series - D: Information ... D: Information and Communication Security)
B. Preneel
Starts At
9276.0
10787.0
14% OFF
Engineering Methods and Tools for Software Safety and Security - Volume 22 NATO Science for Peace and Security Series -D: Information and Communication Security
W. Sitou and T. Hoare
Starts At
8892.0
11256.0
21% OFF
Internet Security Protocols: Protecting IP Traffic
Uyless D. Black
Starts At
224.0
295.0
24% OFF
Are you sure you want to remove the item from your Bag?
Yes
No
Added to Your Wish List
OK
Your Shopping Bag
- 1 Item
Item
Delivery
Unit Price
Quantity
Sub Total
Order Summary