Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Frequently bought together
What other items do customers buy after viewing this item?
From the Publisher
|Tribe of Hackers||Tribe of Hackers Red Team||Tribe of Hackers Security Leaders||Tribe of Hackers Blue Team|
|Subtitle:||Cybersecurity Advice from the Best Hackers in the World||Tribal Knowledge from the Best in Offensive Cybersecurity||Tribal Knowledge from the Best in Cybersecurity Leadership||Tribal Knowledge from the Best in Defensive Cybersecurity|
|Authors:||Marcus J. Carey and Jennifer Jin||Marcus J. Carey and Jennifer Jin||Marcus J. Carey and Jennifer Jin||Marcus J. Carey and Jennifer Jin|
|Publication Date:||August 2019||August 2019||March 2020||September 2020|
From the Back Cover
THE BEST ADVICE ON CYBERSECURITY FROM DOZENS OF RECOGNIZED EXPERTS―ANSWERING EVERYTHING FROM HOW TO GET STARTED IN THE FIELD, TO HOW TO ADVANCE YOUR CAREER, TO WHERE TO FIND THE BEST BANG-FOR-YOUR-BUCK TOOLS!
Even though there are currently hundreds of thousands of cybersecurity professionals around the world, the demand for skilled practitioners far exceeds supply. The goal of Tribe of Hackers is to help you work and succeed in the ever-expanding information security industry. This invaluable book provides real-world insights drawn from 70 inspiring and thought-provoking interviews with noteworthy hackers and influential security specialists.
Security is a field in which there are many ways to approach and solve problems. Tribe of Hackers offers multiple perspectives on a range of technical and professional issues from some of the world's top security experts―such as Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street. The authors have included contact information where you can find each hacker on the web, as well as on social media. A must-have resource for every information security professional and anyone aspiring to enter the industry, this book answers commonly-asked questions including:
- What is the biggest myth in cybersecurity?
- How do you get started in the cybersecurity field?
- Do you need a college degree or certification to work in cybersecurity?
- What qualities do all successful cybersecurity professionals share?
- What is your advice for getting hired, climbing the corporate ladder, or starting a company in cybersecurity?
- What life hacks do you use to make your own life easier?
- What is some practical cyber- security advice in the age of social media and the Internet of Things?
About the Author
MARCUS J. CAREY is a cybersecurity community advocate and startup founder with over 25 years of experience protecting government and commercial sensitive data. He started his cybersecurity career in U.S. Navy cryptology with further service in the National Security Agency (NSA). He is the co-author of the Tribe of Hackers series of books.
JENNIFER JIN is a communications and marketing professional focused on the cybersecurity, gaming, and tech industries. She is passionate about non-profit work and mentorship, and is the co-author of the Tribe of Hackers series of books.
There was a problem filtering reviews right now. Please try again later.
The questions answered are the same for everyone but the answers give many insights on most aspects of this industry.
I might be a bit biased but this is really a book for everyone - In and out of the InfoSec industry.
Anyway, for those of us n00bs entering the field, or who have fewer than 2^5 years in the field, it is very easy to feel overwhelmed and intimidated by the long-time pros we admire and respect. This book helps address that intimidation on so many levels because it gives snapshots of people in the hacker/infosec/cybersecurity fields in their own words.
The questions asked by the authors/editors are questions I hear all the time, and that I have asked more than a few times, myself. And the answers given range from snarky and short, to long, thoughtful, and detailed. The resulting amalgam is the best picture I have seen of the culture that is the hacker/infosec community.
I already knew that hackers are my tribe. This book just confirmed and reinforced that knowledge, and deepened my respect and admiration of the community that calls me one of its own as well.
Since there are 70 interviews you really get an unbiased view into the cybersecurity industry
HIGHLY RECOMMEND. All proceeds from the book will go towards Bunker Labs, Sickle Cell Disease Association of America, Rainforest Partnership, and Start-Up! Kid’s Club 👏🏾
1) Were voluntold that was their new job was in InfoSec
--- and their review about education was,"No you don't need it look at me."
2) Did IT Ops for years and moved into ITSec
--- and their review about certs was, " No you don't need them, look at me"
3) people with education and certs who never had a day in IT Ops
--- and their reviews about both Certs and Education was, " you absolutely them", but couldn't screw in a light bulb- probably
There was about 3 persons that answered the questionnaire, as that is the format of this book, I would consider hitting up on LinkedIn or following on Twitter. But lots of fluff and redundant answers. It was hard for me to get past the first 20 or so questionnaires. again, the format of this book it a bunch of ITsec people answering a questionnaire about how to do ITSecs as a job.
Im not sure why this was a book though, seems like it would have been better on a weekly website update.
This book would be especially valuable to someone looking to start a cybersecurity firm at some point... The author, Marcus J Carey, is the founder of a pen-testing firm himself, and this bizdev focus is reflected in his questioning.
I would not recommend reading this book cover to cover, or in one sitting. The standardized format may be grating after so much repetition. Rather, this should be seen as a reference book; a source of advice that any hacker could find useful.