Fr. 96.00

Ten Laws for Security

Englisch · Fester Einband

Versand in der Regel in 2 bis 3 Wochen (Titel wird auf Bestellung gedruckt)

Beschreibung

Mehr lesen

In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.

Inhaltsverzeichnis

Introduction.- Law 1, Attackers Will Always Find Their Way.- Law 2, Know the Assets to Protect.- Law 3, No Security Through Obscurity.- Law 4, Trust No One.- Law 5, Si Vis Pacem, Para Bellum.- Law 6, You Are the Weakest Link.- Law 7, Security Is No Stronger Than Its Weakest Link.- Law 8, If You Watch the Internet, the Internet Is Watching You.- Law 9, Quis Custodiet Ipsos Custodes? Law 10, Security Is Not a Product, Security Is a Process.- Conclusions.- Abbreviations.- Acronyms.- References.- App. A, A Short Introduction to Cryptography.

Zusatztext

“Ten laws for security approaches security standards using a framework of ten fundamental principles. … an information security team could use these laws to establish a common vision for the goals of an information security program within an organization. Finally, through its use of cases, practical analysis, takeaways, and a detailed bibliography, this book could easily be adopted as a textbook for an upper-division or graduate class in information security management and policy.” (Computing Reviews, June, 2017)

Bericht

"Ten laws for security approaches security standards using a framework of ten fundamental principles. ... an information security team could use these laws to establish a common vision for the goals of an information security program within an organization. Finally, through its use of cases, practical analysis, takeaways, and a detailed bibliography, this book could easily be adopted as a textbook for an upper-division or graduate class in information security management and policy." (Computing Reviews, June, 2017)

Kundenrezensionen

Zu diesem Artikel wurden noch keine Rezensionen verfasst. Schreibe die erste Bewertung und sei anderen Benutzern bei der Kaufentscheidung behilflich.

Schreibe eine Rezension

Top oder Flop? Schreibe deine eigene Rezension.

Für Mitteilungen an CeDe.ch kannst du das Kontaktformular benutzen.

Die mit * markierten Eingabefelder müssen zwingend ausgefüllt werden.

Mit dem Absenden dieses Formulars erklärst du dich mit unseren Datenschutzbestimmungen einverstanden.