IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job (Paperback)
暫譯: IT安全面試揭秘:獲得下一份資訊安全工作的秘訣 (平裝本)
Chris Butler, Russ Rogers, Mason Ferratt, Greg Miles, Ed Fuller, Chris Hurley, Rob Cameron, Brian Kirouac
買這商品的人也買了...
-
$640$608 -
$550Writing Information Security Policies
-
$380$300 -
$700$686 -
$620$608 -
$2,210$2,100 -
$480$408 -
$2,180$2,071 -
$1,029Discrete Mathematics for Computer Science (Hardcover)
-
$650$514 -
$850$672 -
$780$624 -
$650$507 -
$450$356 -
$620$490 -
$350$298 -
$680$537 -
$600$480 -
$880$695 -
$580$383 -
$1,200$1,020 -
$269$229 -
$450$356 -
$480$408 -
$490$382
相關主題
商品描述
Description
- Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will help
- Divided into two parts: how to get the job and a security crash course to prepare for the job interview
- Security is one of today's fastest growing IT specialties, and this book will appeal to technology professionals looking to segue to a security-focused position
- Discusses creating a resume, dealing with headhunters, interviewing, making a data stream flow, classifying security threats, building a lab, building a hacker's toolkit, and documenting work
- The number of information security jobs is growing at an estimated rate of 14 percent a year, and is expected to reach 2.1 million jobs by 2008
Table of Contents
Acknowledgments.Introduction.
Chapter 1: Finding, Interviewing for, and Getting the Job.
Qualifications.
Pursuing a Degree.
The Perfect Job.
Job Search.
Interviewing.
Money Talks.
Accepting or Rejecting the Offer.
Summary.
Nontechnical Interview Questions.
Chapter 2: Knowing Networks: Fundamentals.
Introduction.
Questions.
Recommended Reading.
Chapter 3: Knowing Security: Fundamentals.
Adjust Your Thinking.
Core Values.
Basic Concepts.
Managing Risk.
Data Classification and Labeling.
Ethics in Information Security.
Daily Security Responsibilities.
Summary.
Interview Q&A.
Recommended Reading.
Chapter 4: Understanding Regulations, Legislation, and Guidance.
Regulations, Legislation, and Guidance Defined.
Why Does an Employer Care?
Why Should You Care?
Government- and DoD-Specific Information.
Commercial Information Security.
Using This Information in the Interview.
Summary.
Interview Q&A.
Recommended Reading.
Chapter 5: Knowing Firewalls: Fundamentals.
Firewall Technologies.
Major Vendors.
Device Types.
Management.
Deployment Strategies.
Summary.
Interview Q&A.
Recommended Reading.
Chapter 6: Knowing Virtual Private Networks.
Goals and Assumptions.
The Cryptography of VPNs.
IP Security Review.
Implementing IPsec.
Alternatives to IPsec.
Summary.
Interview Q&A.
Recommended Reading.
Chapter 7: Knowing IDS/IPS/IDP.
Introduction.
Questions.
What Questions Do You Want to Ask Me?
Recommended Reading.
Chapter 8: Everything You Ever Wanted to Know about Wireless but Were Afraid They' Ask.
The Fundamentals.
Wireless Cards and Chipsets.
Wireless Drivers for Linux.
WLAN Detection (WarDriving).
Wireless Security.
Rogue Wireless Devices.
Summary.
Interview Q&A.
Recommended Reading.
Chapter 9: Finding Your Posture.
History of Information Security.
Modern Information Security.
Security Objectives.
Determining the Security Posture.
Prioritizing the Vulnerabilities.
Vulnerability Management.
Summary.
Interview Q&A.
Recommended Reading.
Chapter 10: Tools.
Enumeration, Port Scanning, and Banner Grabbing.
Wireless Enumeration.
Vulnerability Scanning.
Password Compliance Testing.
Network Sniffing.
Penetration Testing.
Learning.
Summary.
Interview Q&A.
Recommended Reading.
Additional Resources.
Index.
商品描述(中文翻譯)
**描述**
- 尋求高薪安全工作的技術專業人士需要了解安全基礎知識,以便獲得工作——本書將提供幫助。
- 分為兩個部分:如何獲得工作和準備工作面試的安全速成課程。
- 安全是當今增長最快的IT專業之一,本書將吸引希望轉向安全專注職位的技術專業人士。
- 討論撰寫履歷、與獵頭打交道、面試、數據流動、分類安全威脅、建立實驗室、建立駭客工具包以及文檔記錄工作。
- 資訊安全工作的數量以每年約14%的速度增長,預計到2008年將達到210萬個工作崗位。
**目錄**
- 感謝詞。
- 介紹。
- **第1章:尋找、面試和獲得工作。**
- 資格。
- 追求學位。
- 完美的工作。
- 求職。
- 面試。
- 薪資談判。
- 接受或拒絕報價。
- 總結。
- 非技術性面試問題。
- **第2章:了解網絡:基礎知識。**
- 介紹。
- 問題。
- 推薦閱讀。
- **第3章:了解安全:基礎知識。**
- 調整思維。
- 核心價值。
- 基本概念。
- 風險管理。
- 數據分類和標記。
- 資訊安全中的倫理。
- 日常安全責任。
- 總結。
- 面試問答。
- 推薦閱讀。
- **第4章:理解法規、立法和指導。**
- 法規、立法和指導的定義。
- 雇主為何關心?
- 你為何應該關心?
- 政府和國防部特定資訊。
- 商業資訊安全。
- 在面試中使用這些資訊。
- 總結。
- 面試問答。
- 推薦閱讀。
- **第5章:了解防火牆:基礎知識。**
- 防火牆技術。
- 主要供應商。
- 設備類型。
- 管理。
- 部署策略。
- 總結。
- 面試問答。
- 推薦閱讀。
- **第6章:了解虛擬私人網絡。**
- 目標和假設。
- VPN的加密技術。
- IP安全回顧。
- 實施IPsec。
- IPsec的替代方案。
- 總結。
- 面試問答。
- 推薦閱讀。
- **第7章:了解IDS/IPS/IDP。**
- 介紹。
- 問題。
- 你想問我什麼問題?
- 推薦閱讀。
- **第8章:你想知道的無線技術但又害怕被問到的所有問題。**
- 基礎知識。
- 無線卡和晶片組。
- Linux的無線驅動程式。
- WLAN檢測(WarDriving)。
- 無線安全。
- 騙子無線設備。
- 總結。
- 面試問答。
- 推薦閱讀。
- **第9章:找到你的安全姿態。**
- 資訊安全的歷史。
- 現代資訊安全。
- 安全目標。
- 確定安全姿態。
- 優先處理漏洞。
- 漏洞管理。
- 總結。
- 面試問答。
- 推薦閱讀。
- **第10章:工具。**
- 列舉、端口掃描和橫幅抓取。
- 無線列舉。
- 漏洞掃描。
- 密碼合規性測試。
- 網絡嗅探。
- 滲透測試。
- 學習。
- 總結。
- 面試問答。
- 推薦閱讀。
- 附加資源。
- 索引。