0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (4)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Breaking into Information Security - Crafting a Custom Career Path to Get the Job You Really Want (Paperback): Josh More,... Breaking into Information Security - Crafting a Custom Career Path to Get the Job You Really Want (Paperback)
Josh More, Anthony Stieber, Chris Liu
R873 Discovery Miles 8 730 Ships in 9 - 15 working days

Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role. Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren't always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there. From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.

Job Reconnaissance - Using Hacking Skills to Win the Job Hunt Game (Paperback, New): Josh More Job Reconnaissance - Using Hacking Skills to Win the Job Hunt Game (Paperback, New)
Josh More
R628 Discovery Miles 6 280 Ships in 12 - 17 working days

There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and one that most people only practice every few years. "

Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game "explains the job hunting process, why the most commonly followed models fail and how to better approach the search. It covers the entire job hunt process from when to decide to leave your current job, research new possible job opportunities, targeting your new boss, controlling the job interview process and negotiating your new compensation and the departure from your current job.

This is not a complete all-in-one job-hunting book. This book assumes that the reader is reasonably competent and has already heard most of the "standard" advice, but is having difficulty putting the advice into practice. The goal is to fill in the gaps of the other books and to help the readers use their technical skills to their advantage in a different context.

The emphasis in "Job Reconnaissance "is for infosec and IT job seekers to leverage the same skills they use in penetration testing and recon toward job-hunting success. These skills include targeting, reconnaissance and profiling combined with a technical look at skills other career search bookscommonly miss.
Covers the entire job hunt process from when to decide to leave your current job to the departure of your current jobSuggests how to research new possible job opportunitiesShows how to target your new boss, controlling the job interview process and negotiating your new compensation "

Assessing Vendors - A Hands-On Guide to Assessing Infosec and IT Vendors (Paperback, New): Josh More Assessing Vendors - A Hands-On Guide to Assessing Infosec and IT Vendors (Paperback, New)
Josh More
bundle available
R671 R616 Discovery Miles 6 160 Save R55 (8%) Ships in 12 - 17 working days

Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and the organizations. Smaller organizations don't know what to look for and, as a result, often wind up selecting based on price instead of value. This results in service failures and vendors that just milk their customers for as long as they can. "

Assessing Vendors "shows you how to walk the line between under- and over-assessing, so decisions can be made on sufficient data without wasting time, digging too deeply, or making decisions too quickly. This hands-on guide will show you how to use an iterative approach to vendor analysis, so you can rapidly filter out the vendors that are clear failures and then select likely winners. It will then show you how to do progressively deeper dives into the likely winners so you can select a preferred vendor. Finally, you will learn how to negotiate with your preferred vendor to get reasonable prices and services. Provides an iterative approach to vendor assessment, showing you how to make decisions on sufficient data without wasting time Includes checklists to help you navigate the decision-making process, while considering all the important factors needed to make a sound decision Helps you understand and evaluate vendors based on key concepts such as performance criteria, functional testing, production, and price
Provides an iterative approach to vendor assessment, showing you how to make decisions on sufficient data without wasting time Includes checklists to help you navigate the decision-making process, while considering all the important factors needed to make a sound decision Helps you understand and evaluate vendors based on key concepts such as performance criteria, functional testing, production, and price

UTM Security with Fortinet - Mastering FortiOS (Paperback, New): Kenneth Tam, Martin H. Hoz Salvador, Ken McAlpine, Rick... UTM Security with Fortinet - Mastering FortiOS (Paperback, New)
Kenneth Tam, Martin H. Hoz Salvador, Ken McAlpine, Rick Basile, Bruce Matsugu, …
R1,179 R912 Discovery Miles 9 120 Save R267 (23%) Ships in 12 - 17 working days

Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS)to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increasedcost and complexity. Unified Threat Management (UTM)makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise.
Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementationsPresents topics that are not covered (or are not covered in detail) by Fortinet s documentation Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area "

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Crystal Aire Concentrates Set (Pack of…
R859 R729 Discovery Miles 7 290
Lucky Metal Cut Throat Razer Carrier
R30 Discovery Miles 300
Roald Dahl's The Witches
Anne Hathaway, Octavia Spencer, … DVD  (1)
R137 Discovery Miles 1 370
Golf Groove Sharpener (Black)
R249 Discovery Miles 2 490
Home Classix Placemats - Beachwood (Set…
R59 R51 Discovery Miles 510
Poor Things
Emma Stone, Mark Ruffalo, … DVD R357 Discovery Miles 3 570
Baby Dove Rich Moisture Wipes (50Wipes)
R40 Discovery Miles 400
Tommy Hilfiger - Tommy Cologne Spray…
R1,218 R694 Discovery Miles 6 940
Luca Distressed Peak Cap (Khaki)
R249 Discovery Miles 2 490
JCB Chukka Steel Toe Safety Boot (Black)
R739 Discovery Miles 7 390

 

Partners