Enviar pesquisa
Carregar
Tales of plagiarism, copyists and some really good books from the security reading room
•
1 gostou
•
921 visualizações
Ben Rothke
Seguir
Tales of plagiarism, copyists and some really good books from the Security Reading Room
Leia menos
Leia mais
Educação
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 20
Baixar agora
Baixar para ler offline
Recomendados
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
Ben Rothke
Securing your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Ben Rothke
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
Ben Rothke
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
Ben Rothke
E5 rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
Ben Rothke
Locking down server and workstation operating systems
Locking down server and workstation operating systems
Ben Rothke
Recomendados
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
Ben Rothke
Securing your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Ben Rothke
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
Ben Rothke
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
Ben Rothke
E5 rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
Ben Rothke
Locking down server and workstation operating systems
Locking down server and workstation operating systems
Ben Rothke
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
Ben Rothke
Securing your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
Ben Rothke
Lessons from ligatt
Lessons from ligatt
Ben Rothke
Interop 2011 las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
Ben Rothke
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
Ben Rothke
Rothke effective data destruction practices
Rothke effective data destruction practices
Ben Rothke
Rothke computer forensics show 2010
Rothke computer forensics show 2010
Ben Rothke
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
Ben Rothke
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Ben Rothke
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
Ben Rothke
Rothke secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Ben Rothke
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
Ben Rothke
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Ben Rothke
Rothke stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
Ben Rothke
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
Ben Rothke
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke
Virtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci Dss
Ben Rothke
Ben Rothke RSA PK 2010
Ben Rothke RSA PK 2010
Ben Rothke
Rothke Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security Posture
Ben Rothke
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
Shobhayan Kirtania
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
Mais conteúdo relacionado
Mais de Ben Rothke
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
Ben Rothke
Securing your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
Ben Rothke
Lessons from ligatt
Lessons from ligatt
Ben Rothke
Interop 2011 las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
Ben Rothke
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
Ben Rothke
Rothke effective data destruction practices
Rothke effective data destruction practices
Ben Rothke
Rothke computer forensics show 2010
Rothke computer forensics show 2010
Ben Rothke
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
Ben Rothke
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Ben Rothke
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
Ben Rothke
Rothke secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Ben Rothke
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
Ben Rothke
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Ben Rothke
Rothke stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
Ben Rothke
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
Ben Rothke
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke
Virtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci Dss
Ben Rothke
Ben Rothke RSA PK 2010
Ben Rothke RSA PK 2010
Ben Rothke
Rothke Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security Posture
Ben Rothke
Mais de Ben Rothke
(20)
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
Securing your presence at the perimeter
Securing your presence at the perimeter
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt
Lessons from ligatt
Interop 2011 las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
Rothke effective data destruction practices
Rothke effective data destruction practices
Rothke computer forensics show 2010
Rothke computer forensics show 2010
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
Rothke secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Virtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci Dss
Ben Rothke RSA PK 2010
Ben Rothke RSA PK 2010
Rothke Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security Posture
Último
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
Shobhayan Kirtania
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
eniolaolutunde
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
nomboosow
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
GeoBlogs
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
chloefrazer622
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
VS Mahajan Coaching Centre
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
Sayali Powar
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
National Information Standards Organization (NISO)
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
Association for Project Management
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
SafetyChain Software
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
Thiyagu K
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
9548086042 for call girls in Indira Nagar with room service
9548086042 for call girls in Indira Nagar with room service
discovermytutordmt
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
Disha Kariya
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
Último
(20)
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
9548086042 for call girls in Indira Nagar with room service
9548086042 for call girls in Indira Nagar with room service
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
Tales of plagiarism, copyists and some really good books from the security reading room
1.
Tales of plagiarism, copyists
and some really good books from the Security Reading Room Ben Rothke CISSP, CISA Twitter: @benrothke
2.
I see security
book reviews….. 2
3.
My criteria for
a great security book Takes a broad, pragmatic and holistic look at the topic Bigger than a single technology Challenges the status quo and makes you think 3
4.
Security Strategy: From Requirements
to Reality 4
5.
Security Strategy: From Requirements
to Reality 5
6.
Securing the Smart
Grid: Next Generation Power Grid Security 6
7.
Cryptography Engineering: Design Principles
and Practical Applications 7
8.
Fatal System Error:
The Hunt for the New Crime Lords Who are Bringing Down the Internet 8
9.
Managing an Information
Security and Privacy Awareness and Training Program 9
10.
Self-publishing: a perfect
plagiarism storm 10
11.
The Security Policy
Cookbook: A Guide for IT and Security Professionals 11
12.
Security policy from
the Heart of Texas 12
13.
Amazon: we ain’t
gonna remove no stinkin plagiarized books 13
14.
William Manning –
international certification man of mystery 14
15.
William Manning –
certification machine 15
16.
How To Become
The Worlds No. 1 Hacker 16
17.
Portrait of the
plagiarist 17
18.
Shooting the messenger 18
19.
Never said I
actually wrote the book 19
20.
Some of the
best books yet to be written 20
Baixar agora