9781952809057-1952809053-The Best of TaoSecurity Blog, Volume 3: Current Events, Law, Wise People, History, and Appendices

The Best of TaoSecurity Blog, Volume 3: Current Events, Law, Wise People, History, and Appendices

ISBN-13: 9781952809057
ISBN-10: 1952809053
Author: Richard Bejtlich
Publication date: 2020
Publisher: TaoSecurity LLC
Format: Paperback 485 pages
FREE US shipping

Book details

ISBN-13: 9781952809057
ISBN-10: 1952809053
Author: Richard Bejtlich
Publication date: 2020
Publisher: TaoSecurity LLC
Format: Paperback 485 pages

Summary

The Best of TaoSecurity Blog, Volume 3: Current Events, Law, Wise People, History, and Appendices (ISBN-13: 9781952809057 and ISBN-10: 1952809053), written by authors Richard Bejtlich, was published by TaoSecurity LLC in 2020. With an overall rating of 3.7 stars, it's a notable title among other books. You can easily purchase or rent The Best of TaoSecurity Blog, Volume 3: Current Events, Law, Wise People, History, and Appendices (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.49.

Description

Since 2003, cybersecurity author Richard Bejtlich has been publishing posts on TaoSecurity Blog, a site with 15 million views since 2011. Now, after re-reading over 3,000 stories and approximately one million words, he has selected and republished the very best entries from 17 years of writing, along with commentaries and additional material. In the third volume of the TaoSecurity Blog series, Mr. Bejtlich addresses the evolution of his security mindset, influenced by current events and advice from his so-called set of "wise people." He talks about why speed is not the key to John Boyd's OODA loop, and why security strategies designed for and by the "security 1%" may be irrelevant at best, or harmful at worst, for the remaining "99%". His history section explores the origins of the terms threat hunting and indicators of compromise, and reveals who really created the quote "there are two types of companies." His chapter on law highlights traps that might catch security teams, with advice to chief information security officers.This volume contains some of Mr. Bejtlich's favorite posts, such as Marcus Ranum's answer to what happens when security teams confront professionals, or how the Internet continues to function despite constant challenges, or reactions to comments by Dan Geer, Bruce Schneier, Marty Roesch, and other security leaders. Mr. Bejtlich has written new commentaries to accompany each post, some of which would qualify as blog entries in their own right. Read how the security industry, defensive methodologies, and strategies to improve national security have evolved in this new book, written by one of the authors who has seen it all and survived to blog about it.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book