Warehouse Stock Clearance Sale

Grab a bargain today!


On Cyber
By

Rating

Product Description
Product Details

About the Author

Gregory Conti ran West Point's cybersecurity research and education programs for almost a decade and is currently Director of Research at IronNet Cybersecurity. He holds a Ph.D. in Computer Science from Georgia Tech and is the author of Security Data Visualization (No Starch Press) and Googling Security (Addison-Wesley) as well as over 70 articles and papers covering cyber warfare, online privacy, usable security, and security data visualization. Greg has served as Officer in Charge of a forward deployed expeditionary cyber team, acted as a Senior Advisor in the US Cyber Command Commander's Action Group, and co-created US Cyber Command's flagship Joint Advanced Cyber Warfare Course (JACWC). He has spoken at numerous security conferences, including Black Hat, DEFCON, HOPE, ShmooCon, RSA, the NATO Conference on Cyber Conflict, and numerous academic conferences. His work can be found at www.gregconti.com and @cyberbgone

David Raymond is on faculty at Virginia Tech, where he teaches computer networking and cybersecurity courses and runs a cybersecurity research lab for graduate students and undergraduates studying computer science and computer engineering. He is also Director of the Virginia Cyber Range and serves as deputy to the Virginia Tech CISO, helping lead security efforts for the university network. David holds a Ph.D. in Computer Engineering and taught West Point's capstone course in cybersecurity for four years. David created West Point's cyber-competition team, and currently serves as faculty advisor to Virginia Tech's student Cybersecurity club. He has published over 25 papers and articles on topics including computer architecture, wireless security, online privacy, and cyber warfare, and has spoken at academic and industry conferences, including Black Hat, RSA, ShmooCon, and the NATO Conference on Cyber Conflict.

Ask a Question About this Product More...
 
Look for similar items by category
Home » Books » Computers » Security » Networking
This title is unavailable for purchase as none of our regular suppliers have stock available. If you are the publisher, author or distributor for this item, please visit this link.

Back to top