- Nmap 6:Network exploration and security auditing Cookbook
- Paulino Calderon Pale
- 263字
- 2021-08-05 18:30:59
About the Reviewers
Carlos A. Ayala Rocha is an Information Security Consultant with more than 10 years of experience in Network Security, Intrusion Detection/Prevention, Forensic Analysis, and Incident Response. He has analyzed, designed, and implemented solutions, procedures, and mechanisms focused on risk mitigation for large companies, governments, internet service providers, and homeland security agencies in Mexico and several Latin American countries. He is an Advisory Board Member, Proctor, and Mentor for the SANS Institute, and a founding member of the Mexican Information Security Association (ASIMX). He holds many security industry certifications, such as CISSP, GCIH, GCFA, and GPEN, among others. He currently works as a Consulting Engineer at Arbor Networks for Latin America.
David Shaw has extensive experience in many aspects of information security. Beginning his career as a Network Security Analyst, he monitored perimeter firewalls and intrusion detection systems in order to identify and neutralize threats in real time. After working in the trenches of perimeter analysis, he joined an External Threat Assessment Team as a Security Researcher, working closely with large financial institutions to mitigate external risk and combat phishing attacks. He has particular interests in exploit development and unconventional attack vectors, and was a speaker at ToorCon 12 in San Diego, CA. He is currently the Director of Penetration Testing Technology at Redspin, specializing in external and application security assessments, and managing a team of highly-skilled engineers.
- Android應(yīng)用安全實(shí)戰(zhàn):Frida協(xié)議分析
- Learning Veeam? Backup & Replication for VMware vSphere
- 數(shù)字化轉(zhuǎn)型浪潮下的數(shù)據(jù)安全最佳實(shí)踐指南
- 移動(dòng)APT:威脅情報(bào)分析與數(shù)據(jù)防護(hù)
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)(第2版)
- 云原生安全與DevOps保障
- 信息安全案例教程:技術(shù)與應(yīng)用(第2版)
- 網(wǎng)絡(luò)安全與攻防入門很輕松(實(shí)戰(zhàn)超值版)
- 人工智能安全(精裝版)
- SQL Injection Strategies
- INSTANT Apple Configurator How-to
- 企業(yè)數(shù)據(jù)安全防護(hù)指南
- 交換機(jī)·路由器·防火墻(第2版)
- 信息組織
- 動(dòng)態(tài)賦能網(wǎng)絡(luò)空間防御