Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 4 of 4 matches in All Departments
There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and one that most people only practice every few years. " Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game "explains the job hunting process, why the most commonly followed models fail and how to better approach the search. It covers the entire job hunt process from when to decide to leave your current job, research new possible job opportunities, targeting your new boss, controlling the job interview process and negotiating your new compensation and the departure from your current job. This is not a complete all-in-one job-hunting book. This book assumes that the reader is reasonably competent and has already heard most of the "standard" advice, but is having difficulty putting the advice into practice. The goal is to fill in the gaps of the other books and to help the readers use their technical skills to their advantage in a different context. The emphasis in "Job Reconnaissance "is for infosec and IT job
seekers to leverage the same skills they use in penetration testing
and recon toward job-hunting success. These skills include
targeting, reconnaissance and profiling combined with a technical
look at skills other career search bookscommonly miss.
Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and the organizations. Smaller organizations don't know what to look for and, as a result, often wind up selecting based on price instead of value. This results in service failures and vendors that just milk their customers for as long as they can. " Assessing Vendors "shows you how to walk the line between under-
and over-assessing, so decisions can be made on sufficient data
without wasting time, digging too deeply, or making decisions too
quickly. This hands-on guide will show you how to use an iterative
approach to vendor analysis, so you can rapidly filter out the
vendors that are clear failures and then select likely winners. It
will then show you how to do progressively deeper dives into the
likely winners so you can select a preferred vendor. Finally, you
will learn how to negotiate with your preferred vendor to get
reasonable prices and services. Provides an iterative approach to
vendor assessment, showing you how to make decisions on sufficient
data without wasting time Includes checklists to help you navigate
the decision-making process, while considering all the important
factors needed to make a sound decision Helps you understand and
evaluate vendors based on key concepts such as performance
criteria, functional testing, production, and price
Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role. Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren't always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there. From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.
Traditionally, network security (firewalls to block unauthorized
users, Intrusion Prevention Systems (IPS)to keep attackers out, Web
filters to avoid misuse of Internet browsing, and antivirus
software to block malicious programs) required separate boxes with
increasedcost and complexity. Unified Threat Management (UTM)makes
network security less complex, cheaper, and more effective by
consolidating all these components. This book explains the
advantages of using UTM and how it works, presents best practices
on deployment, and is a hands-on, step-by-step guide to deploying
Fortinet's FortiGate in the enterprise.
|
You may like...
|