Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Ten Laws for Security
~
SpringerLink (Online service)
Ten Laws for Security
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Ten Laws for Security/ by Eric Diehl.
Author:
Diehl, Eric.
Description:
XIX, 281 p. 42 illus., 3 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Data encryption (Computer science). -
Online resource:
https://doi.org/10.1007/978-3-319-42641-9
ISBN:
9783319426419
Ten Laws for Security
Diehl, Eric.
Ten Laws for Security
[electronic resource] /by Eric Diehl. - 1st ed. 2016. - XIX, 281 p. 42 illus., 3 illus. in color.online resource.
Introduction -- Law 1, Attackers Will Always Find Their Way -- Law 2, Know the Assets to Protect -- Law 3, No Security Through Obscurity -- Law 4, Trust No One -- Law 5, Si Vis Pacem, Para Bellum -- Law 6, You Are the Weakest Link -- Law 7, Security Is No Stronger Than Its Weakest Link -- Law 8, If You Watch the Internet, the Internet Is Watching You -- Law 9, Quis Custodiet Ipsos Custodes? Law 10, Security Is Not a Product, Security Is a Process -- Conclusions -- Abbreviations -- Acronyms -- References -- App. A, A Short Introduction to Cryptography.
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.
ISBN: 9783319426419
Standard No.: 10.1007/978-3-319-42641-9doiSubjects--Topical Terms:
1051084
Data encryption (Computer science).
LC Class. No.: QA76.9.D335
Dewey Class. No.: 005.82
Ten Laws for Security
LDR
:02379nam a22004095i 4500
001
980699
003
DE-He213
005
20200705145644.0
007
cr nn 008mamaa
008
201211s2016 gw | s |||| 0|eng d
020
$a
9783319426419
$9
978-3-319-42641-9
024
7
$a
10.1007/978-3-319-42641-9
$2
doi
035
$a
978-3-319-42641-9
050
4
$a
QA76.9.D335
072
7
$a
GPJ
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.82
$2
23
100
1
$a
Diehl, Eric.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
884653
245
1 0
$a
Ten Laws for Security
$h
[electronic resource] /
$c
by Eric Diehl.
250
$a
1st ed. 2016.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2016.
300
$a
XIX, 281 p. 42 illus., 3 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Introduction -- Law 1, Attackers Will Always Find Their Way -- Law 2, Know the Assets to Protect -- Law 3, No Security Through Obscurity -- Law 4, Trust No One -- Law 5, Si Vis Pacem, Para Bellum -- Law 6, You Are the Weakest Link -- Law 7, Security Is No Stronger Than Its Weakest Link -- Law 8, If You Watch the Internet, the Internet Is Watching You -- Law 9, Quis Custodiet Ipsos Custodes? Law 10, Security Is Not a Product, Security Is a Process -- Conclusions -- Abbreviations -- Acronyms -- References -- App. A, A Short Introduction to Cryptography.
520
$a
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Computer security.
$3
557122
650
0
$a
System safety.
$3
639363
650
1 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Security Science and Technology.
$3
783419
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319426396
776
0 8
$i
Printed edition:
$z
9783319426402
776
0 8
$i
Printed edition:
$z
9783319826257
856
4 0
$u
https://doi.org/10.1007/978-3-319-42641-9
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login