#3,860 in Computers & technology books
Use arrows to jump to the previous/next product

Reddit mentions of Think Like a Hacker: A Sysadmin's Guide to Cybersecurity

Sentiment score: 1
Reddit mentions: 1

We found 1 Reddit mentions of Think Like a Hacker: A Sysadmin's Guide to Cybersecurity. Here are the top ones.

Think Like a Hacker: A Sysadmin's Guide to Cybersecurity
Buying options
View on Amazon.com
or
    Features:
  • ⭐️ AWARD WINNING - Reviewed by OB/GYN’s & Chiropractors. Won awards from Baby Maternity Magazine, Mom’s Choice and the New York Baby Show. Other pregnancy pillow brands can’t say that.
  • ⭐️ POOL OR BED - Cozy Bump's extra thick bed allows you to feel secure as you're lying on the pillow in the pool or bed. Other prenatal brands are thin and you can feel your pregnant stomach touching the ground.
  • ⭐️ RELIEVE LOWER BACK PAIN - The patented decline in the leg section of the pillow allows gravity to kick in and decompress your spine. Other maternity cushions don’t have a decline so there is no back support.
  • ⭐️ FITS ALL BELLYS - The adjustable bump allows you to adjust the size of the hole in sleeper to fit your tummy. If you need an even larger hole for your body, you can flip the bed over to find your comfort.
  • ⭐️ INFLATABLE - Float and rest in the pool or ocean. Blow up the Cozy Bump easily with an air pump (sold separately) and use it alternately as a raft.
Specs:
Height9 Inches
Length6 Inches
Number of items1
Weight0.35 Pounds
Width0.23 Inches

idea-bulb Interested in what Redditors like? Check out our Shuffle feature

Shuffle: random products popular on Reddit

Found 1 comment on Think Like a Hacker: A Sysadmin's Guide to Cybersecurity:

u/PowershellPoet · 1 pointr/cybersecurity

Unfortunately, most of the university programs lag significantly behind industry. I've interviewed candidates with graduate degrees in cybersecurity that were not aware of most modern techniques used to find persistent adversaries. The good things those programs provide is a broad coverage of information security as a whole.

I saw you mention "finding the vulnerabilities before the bad guys do". Unfortunately, in the real world the code is either unpublished and you're a software security consultant, analyst, or tester, or it is published and you're fixing a hole that the adversary has already discovered. If your interest is in the software security side, I would recommend two books above all others.

The 24 Deadly Sins of Software Security: https://www.amazon.com/Deadly-Sins-Software-Security-Programming/dp/0071626751?_encoding=UTF8&%2AVersion%2A=1&%2Aentries%2A=0

Writing Secure Code: https://www.amazon.com/Writing-Secure-Code-Strategies-Applications/dp/0735617228/ref=sr_1_1?s=books&ie=UTF8&qid=1499038741&sr=1-1&keywords=writing+secure+code

That said, there is also a lot of work in the systems engineering side of the house - along the lines of credential theft and secure enterprise design. If you think this might be interesting to you, I would recommend reading papers such as these:

Microsoft Pass the Hash Whitepaper: https://www.microsoft.com/en-us/download/details.aspx?id=36036

Think Like a Hacker (shameless plug for my book): https://www.amazon.com/Think-Like-Hacker-Sysadmins-Cybersecurity/dp/0692865217/ref=sr_1_sc_1?ie=UTF8&qid=1499038880&sr=8-1-spell

Cybersecurity is typically broken into various subfields, such as reverse engineering, forensics, threat intelligence, and the like - each with its own set of tools and skills. Ultimately, I would recommend attending a decent hacking conference such as DEFCON, DerbyCon, ShmooCon, or the like to get familiar with the field.