Anton Chuvakin

Anton Chuvakin

Anton Chuvakin is a computer security specialist, currently Chief Logging Evangelist with LogLogic, a U.S. Log Management and Intelligence company. His past positions included a role of a Security Strategist with netForensics, a U.S. Security Information Management company.

A physicist by education (M.S. Moscow State University,
Ph.D. State University of New York at Stony Brook), he is an author of many publications and invited talks on computer and network security and aco-author of "Security Warrior" published in
2004 by O'Reilly (ISBN 0-596-00545-8) and later translated and published in German and Japanese. His other books include "PCI Compliance" published in 2007 by Syngress Publishing (ISBN 978-1597491655).

ee also

*Computer security
*Computer insecurity
*Reverse engineering

External links

* [http://www.chuvakin.com/newsecurity.html Anton Chuvakin information security publications]
* [http://chuvakin.blogspot.com Anton Chuvakin Security Blog]
* [http://books.google.com/books?ie=UTF-8&hl=en&id=JaJg-6x3FvEC&dq=security+warrior&prev=http://books.google.com/books?lr=&q=security+warrior&pg=PP1&printsec=0&lpg=PP1&sig=gWdyj7uHG0zCaCMKojHWory8f80 Security Warrior] at Google Books


Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • Rootkit — Pronunciation of Rootkit in US English Un rootkit (le nom « outil de dissimulation d activité » est également utilisé[1]), parfois simplement « kit », est un ensemble de techniques mises en œuvre par un ou plusieurs logiciels …   Wikipédia en Français

  • Computer insecurity — This article is about computer security exploits and defenses. For computer security through design and engineering, see computer security. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • IT Underground — is one of the biggest hacking conferences in Middle East Europe. Series of events dedicated to information security have been held in Warsaw and Prague. In 2009 IT Underground will be also organised in Germany.The Conference is focused on IT… …   Wikipedia

  • Windows Security Log — The Security Log, in Microsoft Windows, is a log that contains records of login/logout activity and/or other security related events specified by the system s audit policy. Auditing allows administrators to configure Windows to record operating… …   Wikipedia

  • Forkbomb — Rekursive Prozesserzeugung Eine Forkbomb ist ein Programm, dessen einziger Zweck es ist, rekursiv Kopien seiner selbst zu starten und so alle verfügbaren Systemressourcen zu verbrauchen und das System zu blockieren. Unter Unix geschieht das im… …   Deutsch Wikipedia

  • Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… …   Wikipedia

  • Reverse engineering — is the process of discovering the technological principles of a device, object, or system through analysis of its structure, function, and operation. It often involves taking something (e.g., a mechanical device, electronic component, software… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”