THANK YOU!

Live Hacking published on October 21, 2009 and a week after became available at  Amazon.com. In other words, Live Hacking stepped in the Market 33 days ago and in these days I had received a great number of emails from readers and experts about the book in addition to the critics and questions. I really like to thank all of you for being so supportive to me and the result of my work. Thank you, Thank you and THANK YOU!

LiveHacking.Com

Live Hacking has a new online home at  www.livehacking.com . This is an exciting moment for the Live Hacking fans in addition to free access to chapter 12 of Live Hacking book: Wireless Network Hacking . Enjoy and keep me posted about your thoughts.

Live Hacking has a new online home at www.livehacking.com , this is an exciting moment for the Live Hacking fans. Further, I am glad to invite you to study chapter 12 of Live Hacking book: Wireless Network Hacking at www.livehacking.com . Enjoy and keep me posted about your thoughts!

Information Security Career Path

I receive many emails every week about information security career path. Here is my answer to most of them:

If you are looking for the practical knowledge then you need to go for EC-Council Certified Ethical Hacker (CEH). However, you need to be good with networking, OS, programming in both Windows and Web base applications. If you are looking to have knowledge in Information Security Management then you need to go toward, CISSP or CISM and ITIL. If you want to practice in the area of Information Security Management System standard then you need to study and work on ISO27001 implementation and Audit.

Live Hacking is Not a Hacking Manual!

Live Hacking is not a hacking manual! I had mentioned about this issue many times in my workshops and lectures and even there is a users’ acknowledgment and terms of use for Live Hacking book after copyright page. An information security expert needs to know the hacking techniques to create a secure network and system. Therefore it is essential to know about the hacking techniques to implements the possible countermeasures and mitigate the malicious activities.