Bullseye Breach by Greg Scott {Bindaredundat}

seeders: 0
leechers: 1
Added on April 25, 2015 by Bindaredundatin Books > Academic
Torrent verified.



Bullseye Breach by Greg Scott {Bindaredundat} (Size: 1.85 MB)
 Bullseye Breach Anatomy of an Electronic Break-In - Greg Scott.epub313.09 KB
 Bullseye Breach Anatomy of an Electronic Break-In - Greg Scott.mobi411.32 KB
 Bullseye Breach Anatomy of an Electronic Break-In - Greg Scott.pdf952.26 KB
 Bullseye Breach by Greg Scott (cover).png213.59 KB

Description

Bullseye Breach: Anatomy of an Electronic Break-In – April 19th 2015 by Greg Scott (Author)
{Bindaredundat}


image

Format: epub / mobi / pdf


Product Details

Paperback: 240 pages
Publisher: Beaver's Pond Press (April 19th 2015)
Language: English
ISBN-10: 1592988776
ISBN-13: 978-1592988778


Ripped from recent headlines, this gripping cyber-attack tale has all the elements of an international thriller, including a floating corpse in the Gulf of Finland.
Meet an underground criminal supply chain, its innocent victims, and an unlikely midwestern IT group with an ingenious way to fight back against the theft of millions of credit-card numbers. If data breaches were not routine by now, this story would be unbelievable. Instead, it's a snapshot of life in today's interconnected world, and an unforgettable Internet safety education. IT security has never been so riveting!


Review

''A Michael Crichton-like whirlwind story that's very hard to put down once you pick it up. Part mystery, part suspense, part education, part technology, and all entertainment.'' - Ken Steinhardt, computer scientist and retired former VP, EMC Corporation


''A perfect foray into how things can go terribly wwrrroonnggg... And all it took to get started was One Thoughtless 'Click'.'' - Winn Schwartau, CEO of The Security Awareness Company and author of Information Warfare and Pearl Harbor Dot Com (Die Hard IV)


''After reading the book, I actually have a better idea of how a multi-vector compromise happens, and how the little signs that should have been caught were missed. Hits the nail squarely.'' --Al Gillen, program VP, Servers and System Software, IDC


About the Author

Greg Scott is a veteran of the tumultuous IT industry, and the founder of Infrasupport Corporation, with a laser focus on infrastructure and security. In the 1990s, he was a popular columnist for magazines ENT and Enterprise Linux. He currently lives in the Twin Cities with his wife, daughter, and two grandchildren.


Greg Scott Biography

Greg Scott is a veteran of the tumultuous IT industry. After working as a consultant at Digital Equipment Corporation, a large computer company in its day, Scott branched out on his own in 1994 and started Scott Consulting. A larger firm bought Scott Consulting in 1999, just as the dot com bust devastated the IT Service industry. Scott went out on his own again in late 1999 and started Infrasupport Corporation, this time with a laser focus on infrastructure and security.
He currently lives in the Minneapolis/St. Paul metro area with wife, daughter, and two grandchildren. He holds several IT industry certifications, including CISSP number 358671.
He uses a middle name - his full name is Daniel Gregory Scott - that's why the Amazon author page is .../dgregscott.
Scott graduated from Wabash College in Crawfordsville, Indiana, in 1979 with a double major of math and speech. He earned an MBA from the University of St. Thomas in Minneapolis in 1996.


In the 1990s, he wrote a popular column on the back page of IT industry publication ENT Magazine titled, "NT Heartland," and another column in Enterprise Linux Magazine titled, "Converts Corner."Inspired by The Goal, by Eliyahu Goldratt, a business textbook disguised as a fiction story about the resurgence of a rundown factory, Scott decided to write what would become Bullseye Breach after becoming frustrated from too many sensational headlines about preventable data breaches.

image

Sharing Widget


Download torrent
1.85 MB
seeders:0
leechers:1
Bullseye Breach by Greg Scott {Bindaredundat}