Slava Gomzin

Biography

Slava Gomzin is an information security enthusiast and full-stack technologist. He is the author of multiple publications on information security and technology including books "Hacking Point of Sale" (Wiley, 2014) and the just-published "Bitcoin for Nonmathematicians" (Universal Publishers, 2016).
Slava is VP of Information Security and Technology at Pieces Technologies, an innovative start-up that deploys cutting edge technology to improve clinical and community health outcomes. Before Pieces Tech, he was Director of Information Security at Parkland Center for Clinical Innovation (PCCI), a noted scientific research and development nonprofit corporation. Prior to joining PCCI, Slava was a Security and Payments Technologist at Hewlett-Packard, where he helped create products that are integrated into modern payment processing ecosystems using the latest security technologies. Before HP, he worked in various information security and software development positions at Retalix, a Division of NCR Retail. Slava currently holds CISSP and other security certifications. He blogs about information security and technology at www.gomzin.com.

Where to find Slava Gomzin online

Books

Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
Price: $4.99 USD. Words: 2,420. Language: English. Published: July 17, 2012. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Computers & Internet » Internet / security
Booklet for IT professionals, developers and security specialists on how to utilize IPSec protocol in order to protect data transmission between legacy applications which were created before secure communication became common practice. In many cases it is difficult or even impossible to make necessary changes in old software in order to implement commonly accepted secure protocols such as SSL/TLS.
Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
Price: $3.99 USD. Words: 3,300. Language: English. Published: June 7, 2012. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Computers & Internet » Internet / security
Booklet for anyone who wants to keep their email correspondence private and protect it from unauthorized access. Step-by-step guide explains how to ensure security of email communication by utilizing existing technology.
Protecting Confidential Information: How to Securely Store Sensitive Data
Price: $3.99 USD. Words: 3,120. Language: English. Published: April 25, 2012. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Computers & Internet » Data storage
Booklet for anyone who wants to know how to keep secrets on home computer, or prevent sensitive data from disclosure on office workstation. Topics include: how to break Windows and steal data from computer, pros and cons of using standard Windows data protection mechanisms, several steps to follow in order to keep information secured, using cryptographic solutions for secure storage, and more
Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless
Price: $3.99 USD. Words: 2,950. Language: English. Published: April 24, 2012. Categories: Nonfiction » Computers & Internet » Internet / security, Nonfiction » Computers & Internet » Security / cryptography
Booklet for anyone who wants to keep private and free of censorship Internet access. Step-by-step guide explains how to ensure security on public wireless network, escape the corporate firewall loggers, and avoid Internet proxy filters.
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
Price: $4.99 USD. Words: 4,840. Language: English. Published: April 22, 2012. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Computers & Internet » Software development & engineering / general
Booklet for developers and security professionals on how to implement code obfuscation, .NET strong name signing, and Authenticode code signing in order to protect applications deployment. The guide contains detailed description of different code signing implementation options from basic software to sophisticated hardware solution.
Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server
Price: $4.99 USD. Words: 3,720. Language: English. Published: April 18, 2012. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Computers & Internet » Client-server computing
Booklet for developers and security professionals on how to implement SSL in order to protect data transmission between .NET client and server. The guide contains examples of the client application code and certificate validations in C#. Topics include: what is SSL certificate and how to use it to secure .NET Web Services, how to create server and client test certificates, and more...