Russ Rogers (CISSP, CISM, IAM, IEM, Hon. Sc.D.), author of the popular "Hacking a Terror Network: The Silent Threat of Covert Channels" (Syngress, ISBN: 978-1-928994-98-5), co-author of multiple books, including the best-selling "Stealing the Network: How to Own a Continent" (Syngress, ISBN: 978-1-931836-05-0) and "Network Security Evaluation Using the NSA IEM" (Syngress, ISBN: 978-1-59749-035-1), and former editor-in-chief of The Security Journal, is currently a penetration tester for a federal agency and the co-founder and chief executive officer of Peak Security, Inc., a veteran-owned small business based in Colorado Springs, CO. Russ has been involved in information technology since 1980 and has spent the past 20 years working as both an IT and InfoSec consultant. Russ has worked with the U.S. Air Force (USAF), National Security Agency (NSA), Defense Information Systems Agency (DISA), and other federal agencies. He is a globally renowned security expert, speaker, and author who has presented at conferences around the world in Amsterdam, Tokyo, Singapore, São Paulo, Abu Dhabi, and cities all over the United States. Russ has an honorary doctorate of science in information technology from the University of Advancing Technology, a master's degree in computer systems management from the University of Maryland, a bachelor of science degree in computer information systems from the University of Maryland, and an associate's degree in applied communications technology from the Community College of the Air Force. He is a member of ISSA and (ISC)2® (CISSP). Russ also teaches at and fills the role of professor of network security for the University of Advancing Technology (www.uat.edu).
Télécharger le livre :  The Hacker's Guide to OS X

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless...
Editeur : Syngress
Parution : 2012-12-31

Format(s) : epub sans DRM
41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Nessus Network Auditing

The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth...
Editeur : Syngress
Parution : 2011-10-13

Format(s) : PDF, epub sans DRM
48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  WarDriving and Wireless Penetration Testing

Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that...
Editeur : Syngress
Parution : 2006-11-08

Format(s) : epub sans DRM
42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Network Security Evaluation Using the NSA IEM

Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, including the...
Editeur : Syngress
Parution : 2005-08-26

Format(s) : PDF sans DRM
51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hacking a Terror Network: The Silent Threat of Covert Channels

Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically...
Editeur : Syngress
Parution : 2005-01-27

Format(s) : PDF sans DRM
34,76

Téléchargement immédiat
Dès validation de votre commande