Skip to main content
Herbert "Hugh" Thompson - CTO of Symantec; Program Committee Chairman of RSA Conference

Herbert "Hugh" Thompson

LocationTravels from San Francisco Bay Area, CA, USA
$
$10,000 - $20,000
Get Started

About Herbert "Hugh" Thompson

Zack Kass
Eric Boles
Daymond John
+17

Discover speakers similar to Herbert "Hugh" Thompson

Browse Similar Speakers

Speaking videos

1/5

Books by Herbert "Hugh" Thompson

Getting Unstuck: Break Free of the Plateau Effect - Book by Herbert "Hugh" Thompson

Getting Unstuck: Break Free of the Plateau Effect” (2014)

The Plateau Effect: Getting From Stuck To Success - Book by Herbert "Hugh" Thompson

The Plateau Effect: Getting From Stuck To Success” (2013)

The Plateau Effect is a powerful law of nature that affects everyone.  Learn to identify plateaus and break through any stagnancy in your life— from diet and exercise, to work, to relationships. The Plateau Effect shows how athletes, scientists, therapists, companies, and musicians around the world are learning to break through their plateaus—to turn off the forces that cause people to “get used to” things—and turn on human potential and happiness in ways that seemed impossible. The book identifies three key flattening forces that generate plateaus, two principles to guide readers in engineering a plateau’s destruction, and three actions to take to achieve peak behavior. It helps us to stop wasting time on things that are no longer of value and to focus on the things that leverage our time and energy in spectacular ways. Anything you want to do better—play guitar, make friends, communicate with your children, run a business—you can accomplish faster by understanding the plateau effect.

Software Vulnerability Guide (programming Series) - Book by Herbert "Hugh" Thompson

Software Vulnerability Guide (programming Series)” (2005)

Herbert H. Thompson, Scott G. Chase. Includes Bibliographical References And Index. System Requirements For Accompanying Cd-rom: Windows 2000 Or Xp, Or Linux For X86-family Machines, Kernel Version 2.2 Or Higher; Pentium Ii Or Greater; Cd-rom Drive; Hard Drive; 128 Mbs Of Ram (mimimum 256 Recommended For Windows); Microsoft Visual Studio 6.0 Or Higher For Windows; Gnu Gcc 2.8 Or Higher For Linux; 50 Mbs Of Hard Drive Space For Code Examples And Tools.

The Mezonic Agenda, Hacking the Presidency: Hack Along with the Heroes and Villains as the American Presidency Hangs in the Balance of Cyber-space... (Cyber-Fiction) - Book by Herbert "Hugh" Thompson

The Mezonic Agenda, Hacking the Presidency: Hack Along with the Heroes and Villains as the American Presidency Hangs in the Balance of Cyber-space... (Cyber-Fiction)” (2004)

The Mezonic Agenda deals with some of the most pressing topics in technology and computer security today including: reverse engineering, cryptography, buffer overflows, and steganography. The book tells the tale of criminal hackers attempting to compromise the results of a presidential election for their own gain. The accompanying CD contains real, working versions of all the applications described in the fictional narrative of the book. Computer users, programmers, IT professionals, and policy makers need to be made aware of the risks involved with deploying new technologies and see how attackers can leverage these technologies for their own purposes. While the story in The Mezonic Agenda is fictional, the technologies, exploits, and hacking techniques are all very real.* The first cyber-thriller that allows the reader to hack along using the accompanying CD which contains working versions of all the applications described in the book.* To be published in October 2004 when interest in the American Presidential election will be at its highest.* Provides IT professionals with the most advanced, timely, and accurate information available on security exploits in a fascinating, fictional narrative.

How To Break Software Security - Book by Herbert "Hugh" Thompson

How To Break Software Security” (2003)

How to Break Software Security describes the general problem of software security in a practical perspective from a software tester's point of view. It defines prescriptive techniques (attacks that testers can use on their own software) that are designed to ferret out security vulnerabilities in software applications. The book's style is easy to read and provides readers with the techniques and advice to hunt down security bugs and see that they're destroyed before the software is released. Accompanying the book is a CD-ROM containing Holodeck, which tests for security vulnerabilities. There are also a number of bug-finding tools, freeware, and an easy-to-use port scanner included on the CD-ROM.

Browse Similar Speakers

Page 1 of 3

Speaker Search is a marketplace of speakers designed for talent buyers. We do not represent or manage speakers; instead, we provide event planners with the most comprehensive resource to discover and book the right talent.