Книга: Peter H. Gregory «Blocking Spam&Spyware For Dummies»
Производитель: "Неизвестный" Blocking Spam&Spyware For Dummies ISBN:9780764575914 Издательство: "Неизвестный" (2005)
ISBN: 9780764575914 |
Peter H. Gregory
Peter H. Gregory,
Biography
Gregory is a member of the Board of Advisors and lecturer for the As an InfraGard member, Gregory served as an expert witness in the 2006 cybercrime case, United States vs. Christopher Maxwell. Gregory is the founder and organizer of several online communities; the largest are the Career Gregory studied Publications * Gregory, Peter. "CISA Certified Information Systems Auditor All-in-One Exam Guide", McGraw-Hill Osborne Media, 2009. ISBN 0-071-48755-7 Gregory has written several articles for Gregory has been interviewed by trade publications including Information Security Magazinecite web |url=http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1257071_idx1,00.html | title=Moving On Up | accessdate=2008-04-20 | last=Damore | first=Kelley | work=Information Security Magazine] cite web |url=http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1257115_idx2,00.html | title=Token Support Isn’t Enough | accessdate=2008-04-20 | last=Damore | first=Kelley | work=Information Security Magazine] cite web |url=http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1256996,00.html | title=Peer to Peer | accessdate=2008-04-20 | last=Sherman | first=Erik | work=Information Security Magazine] cite web |url=http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1257032,00.html | title=Best Advice | accessdate=2008-04-20 | last=Mimoso | first=Michael | work=Information Security Magazine] , CIO Magazinecite web |url=http://www.cio.com/article/12541 | title=Data Breach History Includes Plenty of Big Names | accessdate=2008-04-20 | last=Brandel | first=Mary | work=CIO Magazine] , and See also * References External links * [http://extension.washington.edu/ext/certificates/inf/inf_gen.asp University of Washington Certificate Program in Information Assurance & Cybersecurity] Источник: Peter H. Gregory
* Gregory, Peter. "Solaris Security", Prentice-Hall, 1999. ISBN 0-130-96053-5
* Gregory, Peter. "Sun Certified System Administrator for Solaris 8 Study Guide", Prentice-Hall, 2001. ISBN 0-130-40933-2
* Gregory, Peter. "Enterprise Information Security", Financial Times Management, 2003. ISBN 0-273-66157-4
* Gregory, Peter; Miller, Lawrence. "CISSP for Dummies", John Wiley & Sons, 2003. ISBN 0-764-51670-1
* Gregory, Peter; Miller, Lawrence. "Security+ Certification for Dummies", John Wiley & Sons, 2003. ISBN 0-764-52576-X
* Gregory, Peter. "Computer Viruses for Dummies", John Wiley & Sons, 2004. ISBN 0-764-57418-3
* Gregory, Peter; Simon, Mike. "Blocking Spam and Spyware for Dummies", John Wiley & Sons, 2005. ISBN 0-764-57591-0
* Gregory, Peter. "VoIP Security for Dummies, Avaya Limited Edition", John Wiley & Sons, 2006. ISBN 0-764-03744-X
* Gregory, Peter. "SIP Communications for Dummies, Avaya Limited Edition", John Wiley & Sons, 2006. ISBN 0-470-04149-8
* Gregory, Peter. "Converged Network Security for Dummies, Avaya Limited Edition", John Wiley & Sons, 2007. ISBN 0-470-12098-9
* Gregory, Peter. "IP Multimedia Subsystems for Dummies, Radisys Limited Edition", John Wiley & Sons, 2007. ISBN 0-470-13587-7
* Gregory, Peter. "Midsized Communications Solutions for Dummies, Avaya Limited Edition", John Wiley & Sons, 2007. ISBN 0-470-16552-2
* Gregory, Peter. "Unified Communications for Dummies, Avaya Limited Edition", John Wiley & Sons, 2007. ISBN 0-470-17495-1
* Gregory, Peter. "Securing the Vista Environment", O'Reilly Media, 2007. ISBN 0-596-51430-1
* Gregory, Peter; Miller, Lawrence. "CISSP for Dummies", Second Edition, John Wiley & Sons, 2007. ISBN 0-470-12426-1
* Gregory, Peter. "IT Disaster Recovery Planning for Dummies", John Wiley & Sons, 2007. ISBN 0-470-03973-6
* Gregory, Peter; Simon, Mike. "Biometrics for Dummies", John Wiley & Sons, 2008. ISBN 0-470-29288-7
* "Protect Apps and Data with a Disaster Recovery Plan"cite web |url=http://www.softwaremag.com/L.cfm?Doc=1157-8/2008 | title=Protect Apps and Data with a Disaster Recovery Plan | accessdate=2008-08-24 | last=Gregory | first=Peter | work=Software Magazine]
* "Identify Vulnerabilities with Application Scanning Tools"cite web |url=http://softwaremag.com/L.cfm?Doc=1058-5/2007 | title=Identify Vulnerabilities with Application Scanning Tools | accessdate=2008-04-20 | last=Gregory | first=Peter | work=Software Magazine]
* "Integrity begins within: Security pros lead by example"cite web |url=http://www.computerworld.com/securitytopics/security/story/0,,91832,00.html?SKC=security-91832 | title=Integrity begins within: Security pros lead by example | accessdate=2008-04-20 | last=Gregory | first=Peter | work=Computerworld]
* "Vulnerability Management Ushers an Era of Technical Risk Management"cite web |url=http://www.softwaremag.com/L.cfm?Doc=2003-11/2003-11security | title=Vulnerability Management Ushers an Era of Technical Risk Management | accessdate=2008-04-20 | last=Gregory | first=Peter | work=Software Magazine]
* "Security in the software development life cycle"cite web |url=http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci915821,00.html | title=Security in the software development life cycle | accessdate=2008-04-20 | last=Gregory | first=Peter | work=SearchSecurity]
* "Tipping sacred cows: Make bold decisions to protect your information"cite web |url=http://www.computerworld.com/securitytopics/security/story/0,10801,81788,00.html | title=Tipping sacred cows: Make bold decisions to protect your information | accessdate=2008-04-20 | last=Gregory | first=Peter | work=Computerworld]
* "Lessons learned from the blaster worm"cite web |url=http://www.computerworld.com/securitytopics/security/story/0,10801,85247,00.html | title=Lessons learned from the blaster worm | accessdate=2008-04-20 | last=Gregory | first=Peter | work=Computerworld]
* "For an infosecurity career, get the technical basics first"cite web |url=http://www.computerworld.com/newsletter/0,4902,96090,00.html?nlid=SEC2 | title=For an infosecurity career, get the technical basics first | accessdate=2008-04-20 | last=Gregory | first=Peter | work=Computerworld]
*
*
*
* [http://extension.washington.edu/ext/certificates/iss/iss_gen.asp University of Washington Certificate Program in Information Systems Security]
* [http://www.infragard.net/ InfraGard]
* [http://www.isecbooks.com/ Personal website]
См. также в других словарях:
Peter H. Gregory — Peter H. Gregory, CISA, CISSP is an American information security manager, computer security specialist, and writer. He is the author of several books on computer security and information technology. Biography Gregory is a member of the Board of… … Wikipedia