Josh has over fifteen years of experience in IT, and ten years working in Security. Though today, he primarily works as a security consultant, he has also worked in roles ranging from user to developer to system administrator. He holds several security and technical certifications and serves in a leadership position on several security-focused groups. He writes a blog on security at www.starmind.org and www.rjssoftware.com. As security works best from a holistic approach, he works all angles: risk assessments, posture analysis, incident response, malware analysis, infrastructure defense, system forensics, employee training and business strategy. Josh More works at RJS Software Systems, a national data management and security company. Anthony J. Stieber has over 18 years of experience in the information technology industry working in academia, banks, retail, and insurance; designing enterprise security architectures, installing military and commercial firewalls; engineering medical diagnostic systems; reverse-engineering Internet stores; encrypting Fortune 100 enterprises; providing expertise for court cases; speaking at information security conferences; becoming an apprentice locksmith and a published writer. Chris Liu has over 15 years of information technology experience, a CISSP, CISM, and no idea how he ended up where is. He has been a help desk technician, network administrator, quality assurance engineer, release manager, IT manager, instructor, developer, consultant, and product development manager, and is currently an information security professional. He is proof that careers sometimes only make sense in retrospect.
Everyone within the infosec industry can find some value in this book.Individuals who look to break into it...will find it most interesting, especially if they can't find people to advise them about which road to take. --Help Net Security, Breaking into Information Security ...a handy guide that takes a broad approach to helping those enter the information security field.helpful for everyone from computer science majors, those currently in IT, from junior-level information security professionals all the way to those looking to make the move into the information security field. --RSAConference.com, Breaking into Information Security