- SQL Injection Strategies
- Ettore Galluccio Edoardo Caselli Gabriele Lombari
- 453字
- 2021-06-18 18:34:26
Contributors
About the authors
Ettore Galluccio has 20+ years' experience in secure system design and cyber risk management and possesses wide-ranging expertise in the defense industry, with a focus on leading high-impact cyber transformation and critical infrastructure programs. Ettore has headed up cybersecurity teams for numerous companies, working on a variety of services, including threat management, secure system life cycle design and implementation, and common criteria certification and cybersecurity program management. Ettore has also directed the EY Cybersecurity Master in collaboration with CINI (National Interuniversity Consortium for Computer Science) and holds various international certifications in information security. His true passion is working on ethical hacking and attack models.
Edoardo Caselli is a security enthusiast in Rome, Italy. Ever since his childhood, he has always been interested in information security in all of its aspects, ranging from penetration testing to computer forensics. Edoardo works as a security engineer, putting into practice most aspects in the world of information security, both from a technical and a strategic perspective. He is a master's graduate in computer science engineering, with a focus on cybersecurity, and wrote his thesis on representation models for vulnerabilities in computer networks. Edoardo is also a supporter of the Electronic Frontier Foundation, which advocates free speech and civil rights on online platforms and on the internet.
Gabriele Lombari is a cybersecurity professional and enthusiast. During his professional career, he has had the opportunity to participate in numerous projects involving different aspects, concerning both strategic and technical issues, with a particular focus on the power and utilities industry. The activities he has made a contribution to have largely involved application security, architecture security, and infrastructure security. He graduated cum laude in computer science. During his free time, he is passionate about technology, photography, and loves to consolidate his knowledge of topics related to security issues.
- 信息安全導論(在線實驗+在線自測)
- 數據恢復方法及案例分析
- 網絡安全應急管理與技術實踐
- Web安全與攻防入門很輕松(實戰超值版)
- Preventing Digital Extortion
- 云原生安全技術實踐指南
- Digital Forensics with Kali Linux
- 信息安全等級保護測評與整改指導手冊
- End to End GUI Development with Qt5
- 實用黑客攻防技術
- CTF特訓營:技術詳解、解題方法與競賽技巧
- 隱私計算:推進數據“可用不可見”的關鍵技術
- 復雜信息系統網絡安全體系建設指南
- Hands-On Artificial Intelligence for Cybersecurity
- 聯邦學習原理與算法