Soumettre la recherche
Mettre en ligne
Tales of plagiarism, copyists and some really good books from the security reading room
•
1 j'aime
•
921 vues
Ben Rothke
Suivre
Tales of plagiarism, copyists and some really good books from the Security Reading Room
Lire moins
Lire la suite
Formation
Technologie
Signaler
Partager
Signaler
Partager
1 sur 20
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
Ben Rothke
Securing your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Ben Rothke
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
Ben Rothke
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
Ben Rothke
E5 rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
Ben Rothke
Locking down server and workstation operating systems
Locking down server and workstation operating systems
Ben Rothke
Recommandé
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
Ben Rothke
Securing your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Ben Rothke
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
Ben Rothke
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
Ben Rothke
E5 rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
Ben Rothke
Locking down server and workstation operating systems
Locking down server and workstation operating systems
Ben Rothke
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
Ben Rothke
Securing your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
Ben Rothke
Lessons from ligatt
Lessons from ligatt
Ben Rothke
Interop 2011 las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
Ben Rothke
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
Ben Rothke
Rothke effective data destruction practices
Rothke effective data destruction practices
Ben Rothke
Rothke computer forensics show 2010
Rothke computer forensics show 2010
Ben Rothke
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
Ben Rothke
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Ben Rothke
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
Ben Rothke
Rothke secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Ben Rothke
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
Ben Rothke
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Ben Rothke
Rothke stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
Ben Rothke
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
Ben Rothke
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke
Virtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci Dss
Ben Rothke
Ben Rothke RSA PK 2010
Ben Rothke RSA PK 2010
Ben Rothke
Rothke Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security Posture
Ben Rothke
Visit to a blind student's school🧑🦯🧑🦯(community medicine)
Visit to a blind student's school🧑🦯🧑🦯(community medicine)
lakshayb543
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
Celine George
Contenu connexe
Plus de Ben Rothke
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
Ben Rothke
Securing your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
Ben Rothke
Lessons from ligatt
Lessons from ligatt
Ben Rothke
Interop 2011 las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
Ben Rothke
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
Ben Rothke
Rothke effective data destruction practices
Rothke effective data destruction practices
Ben Rothke
Rothke computer forensics show 2010
Rothke computer forensics show 2010
Ben Rothke
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
Ben Rothke
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Ben Rothke
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
Ben Rothke
Rothke secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Ben Rothke
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
Ben Rothke
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Ben Rothke
Rothke stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
Ben Rothke
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
Ben Rothke
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke
Virtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci Dss
Ben Rothke
Ben Rothke RSA PK 2010
Ben Rothke RSA PK 2010
Ben Rothke
Rothke Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security Posture
Ben Rothke
Plus de Ben Rothke
(20)
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
Securing your presence at the perimeter
Securing your presence at the perimeter
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt
Lessons from ligatt
Interop 2011 las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
Rothke effective data destruction practices
Rothke effective data destruction practices
Rothke computer forensics show 2010
Rothke computer forensics show 2010
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
Rothke secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Virtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci Dss
Ben Rothke RSA PK 2010
Ben Rothke RSA PK 2010
Rothke Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security Posture
Dernier
Visit to a blind student's school🧑🦯🧑🦯(community medicine)
Visit to a blind student's school🧑🦯🧑🦯(community medicine)
lakshayb543
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
Celine George
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
MaryGraceBautista27
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
mary850239
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
Seán Kennedy
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
KayeClaireEstoconing
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
PoojaSen20
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
9953056974 Low Rate Call Girls In Saket, Delhi NCR
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
9953056974 Low Rate Call Girls In Saket, Delhi NCR
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
Celine George
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
TechSoup
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
Anupkumar Sharma
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Jemuel Francisco
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
ErwinPantujan2
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
MiaBumagat1
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Celine George
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
Celine George
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
Conquiztadors- the Quiz Society of Sri Venkateswara College
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
Conquiztadors- the Quiz Society of Sri Venkateswara College
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
MIPLM
Dernier
(20)
Visit to a blind student's school🧑🦯🧑🦯(community medicine)
Visit to a blind student's school🧑🦯🧑🦯(community medicine)
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
Tales of plagiarism, copyists and some really good books from the security reading room
1.
Tales of plagiarism, copyists
and some really good books from the Security Reading Room Ben Rothke CISSP, CISA Twitter: @benrothke
2.
I see security
book reviews….. 2
3.
My criteria for
a great security book Takes a broad, pragmatic and holistic look at the topic Bigger than a single technology Challenges the status quo and makes you think 3
4.
Security Strategy: From Requirements
to Reality 4
5.
Security Strategy: From Requirements
to Reality 5
6.
Securing the Smart
Grid: Next Generation Power Grid Security 6
7.
Cryptography Engineering: Design Principles
and Practical Applications 7
8.
Fatal System Error:
The Hunt for the New Crime Lords Who are Bringing Down the Internet 8
9.
Managing an Information
Security and Privacy Awareness and Training Program 9
10.
Self-publishing: a perfect
plagiarism storm 10
11.
The Security Policy
Cookbook: A Guide for IT and Security Professionals 11
12.
Security policy from
the Heart of Texas 12
13.
Amazon: we ain’t
gonna remove no stinkin plagiarized books 13
14.
William Manning –
international certification man of mystery 14
15.
William Manning –
certification machine 15
16.
How To Become
The Worlds No. 1 Hacker 16
17.
Portrait of the
plagiarist 17
18.
Shooting the messenger 18
19.
Never said I
actually wrote the book 19
20.
Some of the
best books yet to be written 20
Télécharger maintenant