Книга: Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty «How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat)»
Производитель: "Неизвестный" The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter. * Take Inventory See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate. * Use Nmap Learn how Nmap has more features and options than any other free scanner. * Implement Firewalls Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable. * Perform Basic Hardening Put an IT security policy in place so that you have a concrete set of... ISBN:1597491705 Издательство: "Неизвестный" (2007)
ISBN: 1597491705 |
Michael Gregg
Michael Gregg is an American computer security specialist, noted speaker at security related events, and an author/coauthor of multiple books such as Build Your Own Network Security Lab and Inside Network Security Assessment [1] He is CEO of Superior Solutions, Inc.
Contents |
Biography
Gregg holds two associate’s degrees, a bachelor’s degree, and a master’s degree.[2] Gregg’s certifications include CISSP and CISA. Gregg has been quoted in newsprint and featured on various television and radio shows including, NPR, The New York Times, ABC, CBS,[3] Fox TV[4] and others discussing cybersecurity and ethical hacking. He is the lead faculty member for Villanova University's online Cyber Security program.[5]
President of Superior Solutions, Inc., a Houston-based security assessment and training firm, Mr. Gregg has more than 20 years of experience in the IT field. He has earned more than 20 certifications, including CISSP®, MCSE, CCNA®, CTT+™, CIW™ Security Analyst, CEH™, NSA IAM, SCNP™ and TICSA. Mr. Gregg has consulted and taught for many Fortune 500 companies. Although consulting consumes the bulk of his time, he also writes for several publications and is the author of “CISSP® Exam Cram 2” and creator of the Assessing IT Infrastructure Vulnerabilities training class. Mr. Gregg holds two associate’s degrees, a bachelor’s degree and a master’s degree.
Publications
Gregg has contributed to the following published works:
- CISSP Exam Cram Questions 2nd edition Que Publishing ISBN 978-0789738073
- CISSP Exam Cram Que 2nd edition Publishing ISBN 978-0789738066
- CISSP Exam Cram Que 1st edition Publishing ISBN 978-0789734464
- Inside Network Security Assessment Sams Publishing ISBN 978-0672328091
- Certified Ethical Hacker Exam Prep Que Publishing ISBN 978-0789735317
- Hack the Stack Syngress Publishing ISBN 978-1597491099
- Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious ISBN 978-1597490566
- Security Administrator Street Smarts 2nd edition Sybex ISBN 978-0470404850
- Security + Study Guide Syngress ISBN 978-1597491532
- CHFI Study Guide Syngress ISBN 978-1597491976
- InfoSecurity 2008 Threat Analysis Syngress ISBN 978-1597492249
- CompTIA Security+ Certification Kit ISBN 978-0470404867
- CISA Exam Prep Que ISBN 978-0789735737
- Build Your Own Security Lab Wiley ISBN 978-0470179864
Gregg has written articles for print and Internet publications such as:
- http://www.certmag.com/issues/dec02/feature_gregg.cfm
- http://gocertify.com/article/ceh.shtml
- http://searchnetworking.techtarget.com/generic/0,295582,sid7_gci1226646,00.html
- http://www.cramsession.com/articles/get-article.asp?aid=1084
References
- ^ "A Review of Inside Network Security Assessment". http://www.left-brain.com/tabId/65/itemId/1586/pageId/2/Inside-Network-Security-Assessment-Guarding-Your.aspx.
- ^ "CIPS Connections". http://www.stephenibaraki.com/cips/dec04/mgregg.html.
- ^ "Michael Gregg discusses browser hijacking". http://cbs5.com/video/?id=59120@kpix.dayport.com.
- ^ "Cyber expert discusses online safety". http://www.youtube.com/watch?v=x9U2DrKovSg.
- ^ "Villanova University Government IS Security Program". http://www.villanovau.com/online-information-security/.
External links
- CNBC video on iPhone application vulnerabilities
- Fox News Report on Google hack leaked to Internet
- Villanova University Gains CNSS National Standard 4011 NSA Certification
- Experts warn of IE vulnerability
- Cybersecurity
- 5 tips for safe online shopping
- Network penetration testing
- Phone hacking threat low but it does exist
- Michael Gregg discusses browser hijacking on CBS5
- Cyberwar could cause global collateral damage
- Hackers target cell phones
- Hacker Halted presenters
- Michael Gregg Expert Answer Page
- MALC caucus
- Author interview
- Network security, taking the layered approach
- Cyber-security expert teaches how to guard against hackers
- Consultant to e-commerce group
- Living people
- American technology writers
- People in information technology
- People associated with computer security
Источник: Michael Gregg
Angela Orebaugh
Angela Orebaugh (
She currently serves as a technology advisor and consultant for commercial and government clients.Fact|date=November 2007 She is a contractor supporting the
Ms. Orebaugh is a Research Fellow and Adjunct Professor for
Ms. Orebaugh is known for her work in security architecture design and analysis, perimeter defenseFact|date=November 2007,
Personal life
Ms. Orebaugh has been active in the
Published works
Ms. Orebaugh has numerous books and articles published in information security:
Books
*Orebaugh, A. et.al. "Wireshark & Ethereal Network Protocol Analyzer Toolkit", Syngress Publishing, 2006.
*Orebaugh, A., Biles, S., Babbin, J., "Snort Cookbook", OReilly Publishing, ISBN 0596007914, 2005.
*Orebaugh, A., Rash, M., Babbin, J. and Pinkard, B., "Intrusion Prevention and Active Response: Deploying Network and Host IPS", Syngress Publishing, ISBN 193226647X, 2005.
*Orebaugh, A., "Ethereal Packet Sniffing", Syngress Publishing, Boston, MA., ISBN 1932266828, 2004.Journal Papers (refereed)
*Orebaugh, A., "Proactive Forensics", Journal of Digital Forensic Practice, Volume 1, Issue 1, March 2006.Conference Papers (refereed)
*Orebaugh, A. "An Instant Messaging Intrusion Detection System Framework: Using Character Frequency Analysis for Authorship Identification and Validation". IEEE International Carnahan Conference on Security Technology (ICCST). 2006.Invited Talks
*Orebaugh, A. "Deep Packet Inspection", SANS, 2004.
*Orebaugh, A. "The Importance of Information Security Certifications", FISSEA, 2004.
*Orebaugh, A. "Wireless: Ready or Not", NEXPO 2004.Magazine Articles
*Orebaugh, A. and Cole, E., "Intrusion Prevention and Active Response: Implementing an Open Source Defense", SysAdmin Magazine, 2005.
*Orebaugh, A. "Special Report: Cognitive Computing and Machine Learning". IANewsletter. Information Assurance Technology Analysis Center. Volume 6, Number 4. 2004.
External links
* [http://www.securityknox.com/ Securityknox] — home page
Источник: Angela Orebaugh
См. также в других словарях:
Mobile operating system — A mobile operating system, also known as a mobile OS, mobile software platform or a handheld operating system, is the operating system that controls a mobile device or information appliance similar in principle to an operating system such as… … Wikipedia
Microsoft Exchange Server — Developer(s) Microsoft Corporation Initial release June 11, 1996 (1996 06 11) Stable release Microsoft Exchange Server 2010 SP1[1] / A … Wikipedia