One Article Review

Accueil - L'article:
Source Blog.webp taosecurity
Identifiant 2024923
Date de publication 2020-11-09 08:30:17 (vue: 2020-11-09 14:31:03)
Titre New Book! The Best of TaoSecurity Blog, Volume 3
Texte  Introduction I published a new book!The Best of TaoSecurity Blog, Volume 3: Current Events, Law, Wise People, History, and Appendices is the third title in the TaoSecurity Blog series. It's in the Kindle Store, and if you have an Unlimited account, it's free. I also published a print edition, which is 485 pages. Book DescriptionThe book features the following description on the back cover:Since 2003, cybersecurity author Richard Bejtlich has been publishing posts on TaoSecurity Blog, a site with 15 million views since 2011. Now, after re-reading over 3,000 stories and approximately one million words, he has selected and republished the very best entries from 17 years of writing, along with commentaries and additional material. In the third volume of the TaoSecurity Blog series, Mr. Bejtlich addresses the evolution of his security mindset, influenced by current events and advice from his so-called set of "wise people." He talks about why speed is not the key to John Boyd's OODA loop, and why security strategies designed for and by the "security 1%" may be irrelevant at best, or harmful at worst, for the remaining "99%". His history section explores the origins of the terms threat hunting and indicators of compromise, and reveals who really created the quote "there are two types of companies." His chapter on law highlights traps that might catch security teams, with advice to chief information security officers.This volume contains some of Mr. Bejtlich's favorite posts, such as Marcus Ranum's answer to what happens when security teams confront professionals, or how the Internet continues to function despite constant challenges, or reactions to comments by Dan Geer, Bruce Schneier, Marty Roesch, and other security leaders. Mr. Bejtlich has written new commentaries to accompany each post, some of which would qualify as blog entries in their own right.  Read how the security industry, defensive methodologies, and strategies to improve national security have evolved in this new book, written by one of the authors who has seen it all and survived to blog about it.Writing the SeriesAlthough I had written and self-published a book in early 2019, I had used Blurb and stayed in print format. 
Envoyé Oui
Condensat  book  conclusioni  for  i  in  introduction i  it 000 030 050 185 190 2003 2011 2019 2020 214 224 238 271 288 300 357 375 400 429 485 508 abandoned about accompany account add adding additional addresses advice after all almost along also amazon another answer any appendices appreciate approximately are arrived assign author authors back because become been before began bejtlich believe best better beyond bit blog blogspot blurb book books boyd break bruce but called candidates catch categories category challenges chapter chief chose collected collecting columns com commentaries commentary commenting comments companies compromise confront constant contains continues copyright cover:since created current cybersecurity dan decided defensive description descriptionthe designed despite discovered docs don double during each early edition editions effort end entries essentially events eventually evolution evolved expect explores farther favorite fear features following format four free from function future geer give goal good google great had handle happens harmful has have helped highlights his history how hunting improve inch include includes inclusion indicators industry influenced information internet irrelevant items its john journey key kindle labelling large last law leaders loop march marcus marty material may methodologies might million mindset moment more most national necessary never new next not november now number officers one only ooda originally origins other out outside over own page pagenow pages papers past people per perhaps phd plus positive post posts primarily print professionals project publish published publishing qualify quickly quote ranum reaches reactions read reading real realized really reflowable related remaining replica republished result resulted reveals review revisiting richard right roesch save say schneier section security seen selected self september series seriesalthough set since site size some sorting speed standard started statement stayed store stories strategies such supported survived talks taosecurity teams terms testimonies thank thanksgiving the taosecurity third thought threat three through time title too total traps twelve two types understand unlimited unwieldy used versions very views volume volumes wanted weeks what when which who why wise words work worst would writing written wrote www year years you
Tags Threat Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: