- Shon Harris
Shon Harris,
CISSP , MCSE is the president of Logical Security, a security consultant, a former engineer in the Air Force’s Information Warfare unit, an instructor and an author. She has authored two CISSP books, was a contributing author to the book, "Hacker’s Challenge] ", and a contributing author to the book "Gray Hat Hacking".Experience
Shon was recognized as one of the top 25 women in the Information Security field by Information Security Magazine. Fact|date=November 2007 She develops Enterprise Risk Management and Control Programs which included legal and regulatory compliance as well as privacy programs. She specializes in development of secure enterprise infrastructures, security governance, and enterprise wide risk management.
Published Work
Books
* CISSP All-In-One Study Guide -- "4th edition; November 9th, 2007"
* Gray Hat Hacking -- "2nd edition; December 20th, 2007"
* CISSP Passport -- "1st edition; October 17th, 2002"
* CISA All-In-One Study Guide --- "Due to be released April 2008"
* IT Regulatory Compliance --- "Due to be released July 2008"Articles
* "Role-Based Access Control Model", TechTarget [ [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1257133,00.html Role Model - Information Security Magazine ] ]
* "Security Governance", TechTarget [ [http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1210565,00.html Information Security Governance Guide ] ]
* "Risk Management Guide", TechTarget [ [http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1158732,00.html Understanding risk ] ]
* "Standards for Risk Management and Standards", TechTarget [ [http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1191926,00.html Alphabet soup: Understanding standards for risk management and compliance ] ]
* "To Catch a Thief – Forensics", TechTarget [ [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1257042,00.html To Catch a Thief - Information Security Magazine ] ]
* "Risks on Outsourcing", TechTarget [ [http://searchsecurity.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid14_gci1173166,00.html Outsourcing: Understanding the business risks ] ]
* "Vulnerability Management", TechTarget [ [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1256997,00.html Vulnerability Mismanagement - Information Security Magazine ] ]
* "Learning from SQL Slammer", SQL Magazine [ [http://www.sqlmag.com/Authors/Index.cfm?AuthorID=1204 SQL Server Welcome ] ]
* "Various Articles on Wireless Security", Windows IT Pro [ [http://www.windowsitpro.com/Authors/AuthorID/1204/1204.html Shon Harris ] ]
References
External links
* [http://searchsecurity.techtarget.com/expert/KnowledgebaseBio/0,289623,sid14_cid945908,00.html Shon Harris Expert Answer Page]
Wikimedia Foundation. 2010.