Shon Harris

Shon Harris

Shon Harris, CISSP, MCSE is the president of Logical Security, a security consultant, a former engineer in the Air Force’s Information Warfare unit, an instructor and an author. She has authored two CISSP books, was a contributing author to the book, "Hacker’s Challenge] ", and a contributing author to the book "Gray Hat Hacking".

Experience

Shon was recognized as one of the top 25 women in the Information Security field by Information Security Magazine. Fact|date=November 2007 She develops Enterprise Risk Management and Control Programs which included legal and regulatory compliance as well as privacy programs. She specializes in development of secure enterprise infrastructures, security governance, and enterprise wide risk management.

Published Work

Books

* CISSP All-In-One Study Guide -- "4th edition; November 9th, 2007"
* Gray Hat Hacking -- "2nd edition; December 20th, 2007"
* CISSP Passport -- "1st edition; October 17th, 2002"
* CISA All-In-One Study Guide --- "Due to be released April 2008"
* IT Regulatory Compliance --- "Due to be released July 2008"

Articles

* "Role-Based Access Control Model", TechTarget [ [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1257133,00.html Role Model - Information Security Magazine ] ]

* "Security Governance", TechTarget [ [http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1210565,00.html Information Security Governance Guide ] ]

* "Risk Management Guide", TechTarget [ [http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1158732,00.html Understanding risk ] ]

* "Standards for Risk Management and Standards", TechTarget [ [http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1191926,00.html Alphabet soup: Understanding standards for risk management and compliance ] ]

* "To Catch a Thief – Forensics", TechTarget [ [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1257042,00.html To Catch a Thief - Information Security Magazine ] ]

* "Risks on Outsourcing", TechTarget [ [http://searchsecurity.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid14_gci1173166,00.html Outsourcing: Understanding the business risks ] ]

* "Vulnerability Management", TechTarget [ [http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1256997,00.html Vulnerability Mismanagement - Information Security Magazine ] ]

* "Learning from SQL Slammer", SQL Magazine [ [http://www.sqlmag.com/Authors/Index.cfm?AuthorID=1204 SQL Server Welcome ] ]

* "Various Articles on Wireless Security", Windows IT Pro [ [http://www.windowsitpro.com/Authors/AuthorID/1204/1204.html Shon Harris ] ]

References

External links

* [http://searchsecurity.techtarget.com/expert/KnowledgebaseBio/0,289623,sid14_cid945908,00.html Shon Harris Expert Answer Page]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • List of people with surname Harris — Harris is an English language surname with a variety of spellings.A list of notable people sharing the surname Harris is shown here. Only the Harris spelling is considered here.List of well known people with surname HarrisA* A. J. Harris (born… …   Wikipedia

  • Certified Information Systems Security Professional — Der Certified Information Systems Security Professional (CISSP) ist eine Zertifizierung, die vom International Information Systems Security Certification Consortium, Inc. (auch: (ISC)²) angeboten wird. Es handelt sich bei dem Zertifikat um einen… …   Deutsch Wikipedia

  • CyberEthics — is a branch of ethics that studies ethical dilemma brought on by the emergence of digital technologies. The emergence of personal computers and the internet have led to conflicts over privacy, intellectual property rights, software ownership,… …   Wikipedia

  • Pittsburgh Steelers — Establecido en 1933 Juegan en Pittsburgh, Pensilvania Afiliaciones de Liga/Conferencia National Football League (1933–actualmente) División Este (1933–1943; 1945–1949) División Oeste (1944) Americano Conferencia (1950–1952) Este… …   Wikipedia Español

  • Computer insecurity — This article is about computer security exploits and defenses. For computer security through design and engineering, see computer security. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • Pittsburg High School (California) — Infobox Secondary school name = Pittsburg High School established = 1924 type = public high school grades = 9–12 city = Pittsburg state = California country = USA district = Pittsburg Unified School District principal = Todd Whittmire vice… …   Wikipedia

  • Maurice Evans (American football) — Maurice Evans No.       Free Agent Defensive end Personal information Date of birth: August 14, 1988 (1988 08 14) (age 23) Plac …   Wikipedia

  • Process isolation — is a set of different hardware and software technologies[1] designed to protect each operating system process from other processes. It does so by preventing process A from writing into process B. Process isolation can be implemented by with… …   Wikipedia

  • David Johnson (tight end) — For other people named David Johnson, see David Johnson (disambiguation). David Johnson No. 85     Pittsburgh Steelers Fullback (American football) Personal information Date of birth: August 26, 1987 (1987 08 26 …   Wikipedia

  • Mike Wallace (American football) — Mike Wallace Mike Wallace standing on the sidelines in December 2009. No. 17     Pittsburgh Steelers Wide Receiver …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”