Peter H. Gregory
Peter H. Gregory, CISA, CISSP is an American information security manager, computer security specialist, and writer. He is the author of several books on computer security and information technology.
Biography
Gregory is a member of the Board of Advisors and lecturer for the NSA-certified University of Washington Certificate in Information Security and Risk Management,[1] and on the Board of Advisors and the lead instructor for the University of Washington Certificate in Information Systems Security.[2] He is also a member of the board of directors of the Evergreen State chapter of InfraGard, and a founding member of the Pacific CISO Forum.[3]
As an InfraGard member, Gregory served as an expert witness in the 2006 cybercrime case, United States vs. Christopher Maxwell.
Publications
- Gregory, Peter. Solaris Security, Prentice-Hall, 1999. ISBN 0-130-96053-5
- Gregory, Peter. Solaris Security (Japanese Language Edition), Prentice-Hall, 1999. ISBN 4-881-35974-6
- Gregory, Peter. Solaris Security (Chinese Language Edition), Prentice-Hall, 1999. ISBN 7-115-08728-8
- Gregory, Peter. Sun Certified System Administrator for Solaris 8 Study Guide, Prentice-Hall, 2001. ISBN 0-130-40933-2
- Gregory, Peter. Enterprise Information Security, Financial Times Management, 2003. ISBN 0-273-66157-4
- Gregory, Peter. Enterprise Information Security (Romanian Language Edition), Financial Times Management, 2003. ISBN 973-722-043-9
- Gregory, Peter; Miller, Lawrence. CISSP for Dummies, John Wiley & Sons, 2003. ISBN 0-764-51670-1
- Gregory, Peter; Miller, Lawrence. Security+ Certification for Dummies, John Wiley & Sons, 2003. ISBN 0-764-52576-X
- Gregory, Peter. Computer Viruses for Dummies, John Wiley & Sons, 2004. ISBN 0-764-57418-3
- Gregory, Peter; Simon, Mike. Blocking Spam and Spyware for Dummies, John Wiley & Sons, 2005. ISBN 0-764-57591-0
- Gregory, Peter. VoIP Security for Dummies, Avaya Limited Edition, John Wiley & Sons, 2006. ISBN 0-764-03744-X
- Gregory, Peter. SIP Communications for Dummies, Avaya Limited Edition, John Wiley & Sons, 2006. ISBN 0-470-04149-8
- Gregory, Peter. Converged Network Security for Dummies, Avaya Limited Edition, John Wiley & Sons, 2007. ISBN 0-470-12098-9
- Gregory, Peter. IP Multimedia Subsystems for Dummies, Radisys Limited Edition, John Wiley & Sons, 2007. ISBN 0-470-13587-7
- Gregory, Peter. Midsized Communications Solutions for Dummies, Avaya Limited Edition, John Wiley & Sons, 2007. ISBN 0-470-16552-2
- Gregory, Peter. Comunicaciones para Medianas Empresas para Dummies, Edicion Limitada de Avaya, John Wiley & Sons, 2007. ISBN 978-0-470-27666-2
- Gregory, Peter. Unified Communications for Dummies, Avaya Limited Edition, John Wiley & Sons, 2007. ISBN 0-470-17495-1
- Gregory, Peter. Comunicações Unificadas, Edicao Espeçial da Avaya, John Wiley & Sons, 2007. ISBN 978-0-470-27690-7
- Gregory, Peter. Securing the Vista Environment, O'Reilly Media, 2007. ISBN 0-596-51430-1
- Gregory, Peter; Miller, Lawrence. CISSP for Dummies, Second Edition, John Wiley & Sons, 2007. ISBN 0-470-12426-1
- Gregory, Peter. IT Disaster Recovery Planning for Dummies, John Wiley & Sons, 2007. ISBN 0-470-03973-6
- Gregory, Peter; Simon, Mike. Biometrics for Dummies, John Wiley & Sons, 2008. ISBN 0-470-29288-1
- Gregory, Peter. Data Backup for Dummies, EVault Special Edition, John Wiley & Sons, 2008. ISBN 0-470-40662-5
- Gregory, Peter; Miller, Lawrence. SIP Communications For Dummies, Avaya 2nd Custom Edition, John Wiley & Sons, 2009. ISBN 978-0-470-38114-4
- Gregory, Peter. CISSP Guide to Security Essentials, Thomson Course Technology, 2009. ISBN 1-435-42819-6
- Gregory, Peter. CISA Certified Information Systems Auditor All-in-One Exam Guide, McGraw-Hill Osborne Media, 2009. ISBN 0-071-48755-7
- Gregory, Peter; Miller, Lawrence. CISSP for Dummies, Third Edition, John Wiley & Sons, 2009. ISBN 0-470-53791-4
- Gregory, Peter. CISA Certified Information Systems Auditor All-in-One Exam Guide, Second Edition, McGraw-Hill Osborne Media, 2011. ISBN 0-071-76910-2
Gregory has written several articles for Computerworld and Software Magazine including:
- Protect Apps and Data with a Disaster Recovery Plan[4]
- Identify Vulnerabilities with Application Scanning Tools[5]
- Integrity begins within: Security pros lead by example[6]
- Vulnerability Management Ushers an Era of Technical Risk Management[7]
- Security in the software development life cycle[8]
- Tipping sacred cows: Make bold decisions to protect your information[9]
- Lessons learned from the blaster worm[10]
- For an infosecurity career, get the technical basics first[11]
Gregory has been interviewed by trade publications including Information Security Magazine,[3][12][13][14] CIO Magazine,[15] and Computerworld.[16]
See also
References
- ^ "Certificate in Information Security and Risk Management". University of Washington. September 2010. http://www.pce.uw.edu/prog.aspx?id=4065. Retrieved 2010-09-17.
- ^ "Certificate in Information Systems Security". University of Washington. September 2010. http://www.pce.uw.edu/prog.aspx?id=4067. Retrieved 2010-09-17.
- ^ a b Sherman, Erik. "Peer to Peer". Information Security Magazine. http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1256996,00.html. Retrieved 2008-04-20.
- ^ Gregory, Peter. "Protect Apps and Data with a Disaster Recovery Plan". Software Magazine. http://www.softwaremag.com/L.cfm?Doc=1157-8/2008. Retrieved 2008-08-24.
- ^ Gregory, Peter. "Identify Vulnerabilities with Application Scanning Tools". Software Magazine. http://softwaremag.com/L.cfm?Doc=1058-5/2007. Retrieved 2008-04-20.
- ^ Gregory, Peter. "Integrity begins within: Security pros lead by example". Computerworld. http://www.computerworld.com/securitytopics/security/story/0,,91832,00.html?SKC=security-91832. Retrieved 2008-04-20.
- ^ Gregory, Peter. "Vulnerability Management Ushers an Era of Technical Risk Management". Software Magazine. http://www.softwaremag.com/L.cfm?Doc=2003-11/2003-11security. Retrieved 2008-04-20.
- ^ Gregory, Peter. "Security in the software development life cycle". SearchSecurity. http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci915821,00.html. Retrieved 2008-04-20.
- ^ Gregory, Peter. "Tipping sacred cows: Make bold decisions to protect your information". Computerworld. http://www.computerworld.com/securitytopics/security/story/0,10801,81788,00.html. Retrieved 2008-04-20.
- ^ Gregory, Peter. "Lessons learned from the blaster worm". Computerworld. http://www.computerworld.com/securitytopics/security/story/0,10801,85247,00.html. Retrieved 2008-04-20.
- ^ Gregory, Peter. "For an infosecurity career, get the technical basics first". Computerworld. http://www.computerworld.com/newsletter/0,4902,96090,00.html?nlid=SEC2. Retrieved 2008-04-20.
- ^ Damore, Kelley. "Moving On Up". Information Security Magazine. http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1257071_idx1,00.html. Retrieved 2008-04-20.
- ^ Damore, Kelley. "Token Support Isn’t Enough". Information Security Magazine. http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1257115_idx2,00.html. Retrieved 2008-04-20.
- ^ Mimoso, Michael. "Best Advice". Information Security Magazine. http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1257032,00.html. Retrieved 2008-04-20.
- ^ Brandel, Mary. "Data Breach History Includes Plenty of Big Names". CIO Magazine. http://www.cio.com/article/12541. Retrieved 2008-04-20.
- ^ Brandel, Mary. "Legal Niceties". Computerworld Magazine. http://www.computerworld.com/securitytopics/security/story/0,10801,105064,00.html. Retrieved 2008-04-20.
External links
Persondata |
Name |
Gregory, Peter |
Alternative names |
|
Short description |
American computer scientist |
Date of birth |
|
Place of birth |
|
Date of death |
|
Place of death |
|