0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (4)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Breaking into Information Security - Crafting a Custom Career Path to Get the Job You Really Want (Paperback): Josh More,... Breaking into Information Security - Crafting a Custom Career Path to Get the Job You Really Want (Paperback)
Josh More, Anthony Stieber, Chris Liu
R873 Discovery Miles 8 730 Ships in 9 - 15 working days

Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role. Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren't always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there. From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.

Job Reconnaissance - Using Hacking Skills to Win the Job Hunt Game (Paperback, New): Josh More Job Reconnaissance - Using Hacking Skills to Win the Job Hunt Game (Paperback, New)
Josh More
R628 Discovery Miles 6 280 Ships in 12 - 17 working days

There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and one that most people only practice every few years. "

Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game "explains the job hunting process, why the most commonly followed models fail and how to better approach the search. It covers the entire job hunt process from when to decide to leave your current job, research new possible job opportunities, targeting your new boss, controlling the job interview process and negotiating your new compensation and the departure from your current job.

This is not a complete all-in-one job-hunting book. This book assumes that the reader is reasonably competent and has already heard most of the "standard" advice, but is having difficulty putting the advice into practice. The goal is to fill in the gaps of the other books and to help the readers use their technical skills to their advantage in a different context.

The emphasis in "Job Reconnaissance "is for infosec and IT job seekers to leverage the same skills they use in penetration testing and recon toward job-hunting success. These skills include targeting, reconnaissance and profiling combined with a technical look at skills other career search bookscommonly miss.
Covers the entire job hunt process from when to decide to leave your current job to the departure of your current jobSuggests how to research new possible job opportunitiesShows how to target your new boss, controlling the job interview process and negotiating your new compensation "

Assessing Vendors - A Hands-On Guide to Assessing Infosec and IT Vendors (Paperback, New): Josh More Assessing Vendors - A Hands-On Guide to Assessing Infosec and IT Vendors (Paperback, New)
Josh More
bundle available
R671 R616 Discovery Miles 6 160 Save R55 (8%) Ships in 12 - 17 working days

Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and the organizations. Smaller organizations don't know what to look for and, as a result, often wind up selecting based on price instead of value. This results in service failures and vendors that just milk their customers for as long as they can. "

Assessing Vendors "shows you how to walk the line between under- and over-assessing, so decisions can be made on sufficient data without wasting time, digging too deeply, or making decisions too quickly. This hands-on guide will show you how to use an iterative approach to vendor analysis, so you can rapidly filter out the vendors that are clear failures and then select likely winners. It will then show you how to do progressively deeper dives into the likely winners so you can select a preferred vendor. Finally, you will learn how to negotiate with your preferred vendor to get reasonable prices and services. Provides an iterative approach to vendor assessment, showing you how to make decisions on sufficient data without wasting time Includes checklists to help you navigate the decision-making process, while considering all the important factors needed to make a sound decision Helps you understand and evaluate vendors based on key concepts such as performance criteria, functional testing, production, and price
Provides an iterative approach to vendor assessment, showing you how to make decisions on sufficient data without wasting time Includes checklists to help you navigate the decision-making process, while considering all the important factors needed to make a sound decision Helps you understand and evaluate vendors based on key concepts such as performance criteria, functional testing, production, and price

UTM Security with Fortinet - Mastering FortiOS (Paperback, New): Kenneth Tam, Martin H. Hoz Salvador, Ken McAlpine, Rick... UTM Security with Fortinet - Mastering FortiOS (Paperback, New)
Kenneth Tam, Martin H. Hoz Salvador, Ken McAlpine, Rick Basile, Bruce Matsugu, …
R1,179 R912 Discovery Miles 9 120 Save R267 (23%) Ships in 12 - 17 working days

Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS)to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increasedcost and complexity. Unified Threat Management (UTM)makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise.
Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementationsPresents topics that are not covered (or are not covered in detail) by Fortinet s documentation Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area "

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Snappy Tritan Bottle (1.2L)(Coral)
R209 R169 Discovery Miles 1 690
Elektra Health 8076 Electrode Hot Steam…
 (14)
R580 R474 Discovery Miles 4 740
Maxi-Cosi See Wi-Fi Baby Monitor
R2,799 R2,399 Discovery Miles 23 990
Simba Steffie Love Girls - Glitter…
R199 R119 Discovery Miles 1 190
Rogz Lounge Walled Oval Pet Bed (Navy…
R625 Discovery Miles 6 250
Is The Party Over?
Oscar van Heerden Paperback R280 R140 Discovery Miles 1 400
The Expendables 2
Sylvester Stallone, Jason Statham, … Blu-ray disc  (1)
R64 Discovery Miles 640
Jurassic Park Trilogy Collection
Sam Neill, Laura Dern, … Blu-ray disc  (1)
R362 R311 Discovery Miles 3 110
Meta Office Chair (Black)
R599 R385 Discovery Miles 3 850
ZA Cute Butterfly Earrings and Necklace…
R712 R499 Discovery Miles 4 990

 

Partners