T.J. O'Connor

T.J. O'Connor’s Followers (16)

member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo

T.J. O'Connor


Twitter

Genre


TJ O'Connor is a Department of Defense expert on information security and a US Army paratrooper. While assigned as an assistant professor at the US Military Academy, TJ taught undergraduate courses on forensics, exploitation and information assurance. He twice co-coached the winning team at the National Security Agency's annual Cyber Defense Exercise and won the National Defense University's first annual Cyber Challenge. He has served on multiple red teams, including twice on the Northeast Regional Team for the National Collegiate Cyber Defense Competition.

TJ holds a Master of Science degree in Computer Science from North Carolina State, a Master of Science degree in Information Security Engineering from the SANS Technical Institute, and a
...more

Average rating: 4.03 · 554 ratings · 32 reviews · 6 distinct worksSimilar authors
Violent Python: A Cookbook ...

4.03 avg rating — 551 ratings — published 2012 — 4 editions
Rate this book
Clear rating
Python Hacking: Lernen Sie ...

4.33 avg rating — 3 ratings2 editions
Rate this book
Clear rating
High Vision: A Dedication t...

0.00 avg rating — 0 ratings
Rate this book
Clear rating
Bordergate: The Migrant Wedge

0.00 avg rating — 0 ratings
Rate this book
Clear rating
Starting Your LLC Successfu...

0.00 avg rating — 0 ratings
Rate this book
Clear rating
Powerful AI Prompts: How to...

0.00 avg rating — 0 ratings2 editions
Rate this book
Clear rating
Starting Your LLC Successfu...

0.00 avg rating — 0 ratings
Rate this book
Clear rating
More books by T.J. O'Connor…
Quotes by T.J. O'Connor  (?)
Quotes are added by the Goodreads community and are not verified by Goodreads. (Learn more)

“With our program modularized into separate functions, we can now increase our performance. Instead of trying each word in the dictionary one at a time, we will utilize threads of execution”
T.J. O'Connor, Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

“In 1988, RSH provided an excellent (although not very secure) method for a system administrator to remotely connect to a machine and manage it by performing a series of terminal commands on the host. The Secure Shell (SSH) protocol has since replaced RSH by combining RSH with a public-key cryptographic scheme in order to secure the traffic.”
T.J. O'Connor, Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

“With the MAC address of a wireless access point, we can now also print out the physical location of the access point as well. Quite a few databases, both open-source and proprietary, contain enormous listings of wireless access points correlated to their physical locations.”
T.J. O'Connor, Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Topics Mentioning This Author

topics posts views last activity  
Cozy Mysteries : January 2015 12 106 Feb 04, 2015 08:13PM  
Cozy Mysteries : January 2016 15 114 Jan 15, 2016 10:00AM  
Goodreads Librari...: Merge Author Series / Create New 7 13 Sep 20, 2024 08:05AM  


Is this you? Let us know. If not, help out and invite T.J. to Goodreads.