ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب 97 Things Every Information Security Professional Should Know

دانلود کتاب 97 نکته ای که هر متخصص امنیت اطلاعات باید بداند

97 Things Every Information Security Professional Should Know

مشخصات کتاب

97 Things Every Information Security Professional Should Know

ویرایش:  
نویسندگان:   
سری:  
ISBN (شابک) : 9781098101398 
ناشر: O'Reilly Media, Inc. 
سال نشر: 2021 
تعداد صفحات:  
زبان: English 
فرمت فایل : EPUB (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 24 Mb 

قیمت کتاب (تومان) : 37,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 4


در صورت تبدیل فایل کتاب 97 Things Every Information Security Professional Should Know به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب 97 نکته ای که هر متخصص امنیت اطلاعات باید بداند نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Copyright
Table of Contents
Preface
	O’Reilly Online Learning
	How to Contact Us
Chapter 1. Continuously Learn to Protect Tomorrow’s Technology
	Alyssa Columbus
Chapter 2. Fight in Cyber like the Military Fights in the Physical
	Andrew Harris
	The OODA Loop
	Containment Helps to Prevent and Inform
Chapter 3. Three Major Planes
	Andrew Harris
	Not Focusing on Where the Planes Meet
	Identity Versus Privileges
	Not Applying Hypothetical Syllogism
	Wrapping It Up
Chapter 4. InfoSec Professionals Need to Know Operational Resilience
	Ann Johnson
Chapter 5. Taking Control of Your Own Journey
	Antoine Middleton
Chapter 6. Security, Privacy, and Messy Data Webs: Taking Back Control in Third-Party Environments
	Ben Brook
	Establish Technical Visibility
	Exercise Technical Stewardship
Chapter 7. Every Information Security Problem Boils Down to One Thing
	Ben Smith
Chapter 8. And in This Corner, It’s Security Versus the Business!
	Ben Smith
Chapter 9. Don’t Overlook Prior Art from Other Industries
	Ben Smith
Chapter 10. Powerful Metrics Always Lose to Poor Communication
	Ben Smith
Chapter 11. “No” May Not Be a Strategic Word
	Brian Gibbs
Chapter 12. Keep People at the Center of Your Work
	Camille Stewart
Chapter 13. Take a Beat: Thinking Like a Firefighter for Better Incident Response
	Catherine J. Ullman
Chapter 14. A Diverse Path to Better Security Professionals
	Catherine J. Ullman
Chapter 15. It’s Not About the Tools
	Chase Pettet
Chapter 16. Four Things to Know About Cybersecurity
	Chloé Messdaghi
	Hackers Are Not Attackers
	Vulnerability Disclosure Policies Strengthen Defenses
	Burnout Is a Real Risk
	Upskilling: Professional Growth
Chapter 17. Vetting Resources and Having Patience when Learning Information Security Topics
	Christina Lang
Chapter 18. Focus on the What and the Why First, Not the Tool
	Christina Morillo
	“If All You Have Is a Hammer, Everything Looks like a Nail"
	Understanding the Problem
	Understanding Current Processes
	You Cannot Solve for What You Do Not Understand
Chapter 19. Insiders Don’t Care for Controls
	Damian Finol
Chapter 20. Identity and Access Management: The Value of User Experience
	Dane Bamburry
Chapter 21. Lessons from Cross-Training in Law
	Danny Moules
Chapter 22. Ransomware
	David McKenzie
	History
	Types of Ransomware
	Large-Scale Attacks
	Should You Pay?
Chapter 23. The Key to Success in Your Cloud Journey Begins with the Shared Responsibility Model
	Dominique West
	What Is This Framework and Why Should It Apply?
	How to Put This Framework into Action
Chapter 24. Why InfoSec Practitioners Need to Know About Agile and DevOps
	Fernando Ike
Chapter 25. The Business Is Always Right
	Frank McGovern
Chapter 26. Why Choose Linux as Your Secure Operating System?
	Gleydson Mazioli da Silva
Chapter 27. New World, New Rules, Same Principles
	Guillaume Blaquiere
Chapter 28. Data Protection: Impact on Software Development
	Guy Lépine
	Secure Development
	Data Protection
		Data at rest
		Data in transit
		Data in use
	Ethical Data Access
Chapter 29. An Introduction to Security in the Cloud
	Gwyneth Peña-Siguenza
Chapter 30. Knowing Normal
	Gyle dela Cruz
Chapter 31. All Signs Point to a Schism in Cybersecurity
	Ian Barwise
	Attackers Have Always Had the Advantage
Chapter 32. DevSecOps Is Evolving to Drive a Risk-Based Digital Transformation
	Idan Plotnik
	Code Security Is Becoming “Security”
	Shifting from Vulnerabilities to Risky Code Changes
	Code Risk Is Multidimensional
	DevSecOps Is Evolving
Chapter 33. Availability Is a Security Concern Too
	Jam Leomi
Chapter 34. Security Is People
	James Bore
Chapter 35. Penetration Testing: Why Can’t It Be Like the Movies?!
	Jasmine M. Jackson
Chapter 36. How Many Ingredients Does It Take to Make an Information Security Professional?
	Jasmine M. Jackson
Chapter 37. Understanding Open Source Licensing and Security
	Jeff Luszcz
Chapter 38. Planning for Incident Response Customer Notifications
	JR Aquino
Chapter 39. Managing Security Alert Fatigue
	Julie Agnes Sparks
Chapter 40. Take Advantage of NIST’s Resources
	Karen Scarfone
Chapter 41. Apply Agile SDLC Methodology to Your Career
	Keirsten Brager
	Secure Your Identity and Assets
	Look for Unconventional Paths
Chapter 42. Failing Spectacularly
	Kelly Shortridge
Chapter 43. The Solid Impact of Soft Skills
	Kim Z. Dale
Chapter 44. What Is Good Cyber Hygiene Within Information Security?
	Lauren Zink
Chapter 45. Phishing
	Lauren Zink
Chapter 46. Building a New Security Program
	Lauren Zink
Chapter 47. Using Isolation Zones to Increase Cloud Security
	Lee Atchison
	General Isolation Zone Architecture
	Managing Communications Flow
Chapter 48. If It’s Remembered for You, Forensics Can Uncover It
	Lodrina Cherne
Chapter 49. Certifications Considered Harmful
	Louis Nyffenegger
Chapter 50. Security Considerations for IoT Device Management
	Mansi Thakar
Chapter 51. Lessons Learned: Cybersecurity Road Trip
	Mansi Thakar
	Myth Versus Reality
	Unleash Your Growth
Chapter 52. Finding Your Voice
	Maresa Vermulst
Chapter 53. Best Practices with Vulnerability Management
	Mari Galloway
Chapter 54. Social Engineering
	Marina Ciavatta
Chapter 55. Stalkerware: When Malware and Domestic Abuse Coincide
	Martijn Grooten
Chapter 56. Understanding and Exploring Risk
	Dr. Meg Layton
Chapter 57. The Psychology of Incident Response
	Melanie Ensign
	Avoiding Panic
	Anticipating Stakeholder Readiness
	Teaching Stakeholders to Self-Regulate
Chapter 58. Priorities and Ethics/Morality
	Michael Weber
Chapter 59. DevSecOps: Continuous Security Has Come to Stay
	Michelle Ribeiro
Chapter 60. Cloud Security: A 5,000 Mile View from the Top
	Michelle Taggart
Chapter 61. Balancing the Risk and Productivity of Browser Extensions
	Mike Mackintosh
Chapter 62. Technical Project Ideas Towards Learning Web Application Security
	Ming Chow
	Build a Static Website Using HTML, CSS, JavaScript, and Amazon S3
	Create a Blog Using WordPress
	Build a Blog App Using a Web Application Framework
	The Point of These Projects
Chapter 63. Monitoring: You Can’t Defend Against What You Don’t See
	Mitch B. Parker
Chapter 64. Documentation Matters
	Najla Lindsay
Chapter 65. The Dirty Truth Behind Breaking into Cybersecurity
	Naomi Buckwalter
Chapter 66. Cloud Security
	Nathan Chung
Chapter 67. Empathy and Change
	Nick Gordon
	Bringing Change
	Mandates Only Work When Someone Is Watching
	Write It Down
Chapter 68. Information Security Ever After
	Nicole Dorsett
Chapter 69. Don’t Check It In!
	Patrick Schiess
Chapter 70. Threat Modeling for SIEM Alerts
	Phil Swaim
Chapter 71. Security Incident Response and Career Longevity
	Priscilla Li
Chapter 72. Incident Management
	Quiessence Phillips
Chapter 73. Structure over Chaos
	Rob Newby
Chapter 74. CWE Top 25 Most Dangerous Software Weaknesses
	Rushi Purohit
Chapter 75. Threat Hunting Based on Machine Learning
	Saju Thomas Paul and Harshvardhan Parmar
	Case Study
Chapter 76. Get In Where You Fit In
	Sallie Newton
Chapter 77. Look Inside and See What Can Be
	Sam Denard
Chapter 78. DevOps for InfoSec Professionals
	Sasha Rosenbaum
	Culture
	Automation
	Recommended Reading
Chapter 79. Get Familiar with R&R (Risk and Resilience)
	Shinesa Cambric
Chapter 80. Password Management
	Siggi Bjarnason
Chapter 81. Let’s Go Phishing
	Siggi Bjarnason
Chapter 82. Vulnerability Management
	Siggi Bjarnason
Chapter 83. Reduce Insider Risk Through Employee Empowerment
	Stacey Champagne
Chapter 84. Fitting Certifications into Your Career Path
	Steven Becker
Chapter 85. Phishing Reporting Is the Best Detection
	Steven Becker
Chapter 86. Know Your Data
	Steve Taylor
	Known Knowns
	Known Unknowns
	Unknown Unknowns
Chapter 87. Don’t Let the Cybersecurity Talent Shortage Leave Your Firm Vulnerable
	Tim Maliyil
Chapter 88. Comfortable Versus Confident
	Tkay Rice
	Is Lack of Confidence the New Imposter Syndrome?
	Using Offensive/Sensitive Terms
	Top Three Strategies for Displaying Confidence
Chapter 89. Some Thoughts on PKI
	Tarah Wheeler
Chapter 90. What Is a Security Champion?
	Travis F. Felder
	What Is a Security Champion?
	Why Does Your Company Need Security Champions?
	What Do Security Champions Do?
	How to Create a Security Champions Program?
Chapter 91. Risk Management in Information Security
	Trevor Bryant
Chapter 92. Risk, 2FA, MFA, It’s All Just Authentication! Isn’t It?
	Unique Glover
Chapter 93. Things I Wish I Knew Before Getting into Cybersecurity
	Valentina Palacin
Chapter 94. Research Is Not Just for Paper Writing
	Vanessa Redman
Chapter 95. The Security Practitioner
	Wayne A. Howell Jr.
Chapter 96. Threat Intelligence in Two Steps
	Xena Olsen
	Step One: Understand Your Role
	Step Two: Solve Someone Else’s Problem
Chapter 97. Maintaining Compliance and Information Security with Blue Team Assistance
	Yasmin Schlegel
Contributors
	Alyssa Columbus
	Andrew Harris
	Ann Johnson
	Antoine Middleton
	Ben Brook
	Ben Smith
	Brian Gibbs
	Camille Stewart
	Catherine J. Ullman
	Chase Pettet
	Chloé Messdaghi
	Christina Lang
	Christina Morillo (Author/Editor of This Book)
	Damian Finol
	Dane Bamburry
	Danny Moules
	David McKenzie
	Dominique West
	Fernando Ike
	Frank McGovern
	Gleydson Mazioli da Silva
	Guillaume Blaquiere
	Guy Lépine
	Gwyneth Peña-Siguenza
	Gyle dela Cruz
	Harshvardhan Parmar
	Ian Barwise
	Idan Plotnik
	Jam Leomi
	James Bore
	Jasmine M. Jackson
	Jeff Luszcz
	JR Aquino
	Julie Agnes Sparks
	Karen Scarfone
	Keirsten Brager
	Kelly Shortridge
	Kim Z. Dale
	Lauren Zink
	Lee Atchison
	Lodrina Cherne
	Louis Nyffenegger
	Mansi Thakar
	Maresa Vermulst
	Mari Galloway
	Marina Ciavatta
	Martijn Grooten
	Dr. Meg Layton
	Melanie Ensign
	Michael Weber
	Michelle Ribeiro
	Michelle Taggart
	Mike Mackintosh
	Ming Chow
	Mitchell Parker
	Najla Lindsay
	Naomi Buckwalter
	Nathan Chung
	Nick Gordon
	Nicole Dorsett
	Patrick Schiess
	Phil Swaim
	Priscilla Li
	Quiessence Phillips
	Rob Newby
	Rushi Purohit
	Saju Thomas Paul
	Sallie Newton
	Sam Denard
	Sasha Rosenbaum
	Shinesa Cambric
	Siggi Bjarnason
	Stacey Champagne
	Steven Becker
	Steve Taylor
	Tarah Wheeler
	Tim Maliyil
	Tkay Rice
	Travis F. Felder
	Trevor Bryant
	Unique Glover
	Valentina Palacin
	Vanessa Redman
	Wayne A. Howell Jr.
	Xena Olsen
	Yasmin Schlegel
Index
About the Editor
	Christina Morillo




نظرات کاربران