User:Sa144ka
SeyedSaman Karimi, who holds a Ph.D. in technology and international certifications such as CISSP (Certified Information Systems Security Professional), CHFI (Computer Hacking Forensic Investigator), CEH (Certified Ethical Hacker), Cisco CCNA and CCNP, and Microsoft MCT, MCSE, and MCITP. First book is information security strategy in financial organizations, this book is the result of Dr. SeyedSaman Karimi's research is useful for individuals interested in research and study in the field of information security, information systems management and strategy management, as well as financial management. As the field of information system security is relatively young and developing, the text of this book covers a wide range of information security and information system management, including stakeholder sections and elements that have a direct impact on strategy. The purpose of this study is to examine the relationships between information security strategy and the essential roles for implementing information security programs in order to meet organizational security requirements. Additionally, if the output of the argumentation theory method results in the creation of a formal solution for selecting an information security strategy that goes beyond technical controls, it can be useful for information security professionals. Furthermore, if a model can act as a predictive tool for selecting roles, it can be beneficial in forming an action-oriented solution for information security strategy. The author of the book conducted interviews with 32 Chief Information Security Officers (CISOs) and their deputies (DCISOs). Initially, 25 interviews were conducted from units of a large financial organization. Seven other interviews were conducted with CISOs and DCISOs from similar or affiliated units in other large financial organizations, indicating how CISOs and DCISOs of the main organization compare to other organizations.
- REDIRECT This Book https://www.parsbook.com/%D8%A7%D9%85%D9%86%DB%8C%D8%AA-%D8%A7%D8%B7%D9%84%D8%A7%D8%B9%D8%A7%D8%AA-%D8%AF%D8%B1-%D8%B3%D8%A7%D8%B2%D9%85%D8%A7%D9%86-%D9%87%D8%A7%DB%8C-%D9%85%D8%A7%D9%84%DB%8C
Second book is "Information System Security: A Comprehensive Reference for CISSP Exam to Persian language" . which has been selected as the best technical and engineering work in the field of computer and information technology at the 28th National Student Book Festival in Iran. This book covers a wide range of information security and management and auditing of information systems. The important topics covered in this book include an introduction to security and information security management, management responsibilities, security policies, information classification, roles and responsibilities, risk management, security awareness, access control systems and methodologies, secure design and architecture, encryption, communication security, network and internet security, business continuity planning (BCP) and disaster recovery planning (DRP), legal and regulatory issues, computer crimes, system and application development security, information security governance and risk management, and physical and environmental security. Since information system security is a relatively young and evolving field, this book covers a wide spectrum of information security and management and auditing of information systems. The target audience for this book includes information security managers, security managers of organizations, information and security systems specialists, network managers, information security consultants, and anyone interested in information security management.
- REDIRECT this book
Third book is "Penetration Testing " is a book written by Dr. Seyedsaman Karimi. Important topics covered in the book "Penetration Testing " include: • Introduction to penetration testing • Standards • Cryptography • Reconnaissance • Malware • Hacking Windows • Web Hacking • Vulnerability Scanning • Introduction to Linux • Linux Hacking • Introduction to Kali Linux • General hacking techniques • Introduction to Metasploit • Additional topics on Metasploit • Introduction to Ruby scripting • Metasploit exploit writing with Ruby • Common hacking knowledge • Additional penetration testing topics • A complete sample penetration testing project In fact, this book is not just about teaching hacking; it is designed for both novice and experienced penetration testers. A novice gains the necessary knowledge in the field of penetration testing, which is very accurate, and an experienced specialist will fill the gaps in their knowledge regarding standards and methods.
- REDIRECT this book
Among his works in the field of information security is the Invention: security model for IOT-Based Technology transfer.