O'Reilly:安安全之美(影印版) 一流的安全专家解释他们是如何思考
举报
-
作者:
[美]
奥莱姆
、[美]卫加 著
-
出版社:
东南大学出版社
-
ISBN:
9787564122713
-
出版时间:
2010-06
-
版次:
1
-
印刷时间:
2010-06
-
印次:
1
-
装帧:
平装
-
开本:
16开
-
纸张:
胶版纸
-
页数:
281页
-
字数:
464千字
-
作者:
[美]
奥莱姆
、[美]卫加 著
-
出版社:
东南大学出版社
-
ISBN:
9787564122713
-
出版时间:
2010-06
-
版次:
1
-
印刷时间:
2010-06
-
印次:
1
-
装帧:
平装
-
开本:
16开
-
纸张:
胶版纸
-
页数:
281页
-
字数:
464千字
售价
¥
19.80
3.8折
定价
¥52.00
品相
九五品品相描述
上书时间2018-06-18
卖家超过10天未登录
手机购买
微信扫码访问
-
- 品相描述:九五品
-
封面至目录页有划痕,已修复,不影响阅读,其它全新,整书无笔记和划线。
-
商品描述:
-
内容简介:
尽管大多数人在他们个人或者公司的系统没有遭到攻击之前不会给予安全高度的重视,这本充满激辩的书籍依然表明了数字安全不仅仅是值得思考而已,它还是一个可以令人陶醉的话题。罪犯通过大量富有创造力的行为得以成功,防御方也需要付出同等的代价。
本书通过一些有着深刻见解的文章和分析探索了这样一个具有挑战性的主题,其内容包括:
个人信息的秘密机制:它如何工作,罪犯之间的关系,以及一些他们针对被掠食对象发起突袭时所使用的新方法
社交网络、云计算和其他流行趋势如何帮助和伤害我们的在线安全
衡量标准、需求收集、设计和法律如何能够把安全提升到一个更高的高度
PGP真实又少为人知的历史
目录:
PREFACE
1PSYCHOLOGICALSECURITYTRAPS
byPelter"Mudge"Zatko
LearnedHelplessnessandNaTvete
ConfirmationTraps
FunctionalFixation
Summary
2WIRELESSNETWORKING:FERTILEGROUNDFORSOCIALENGINEERING
byJimStikley
EasyMoney
WirelessGoneWild
Still,WirelessIstheFuture
3BEAUTIFULSECURITYMETRICS
byElizabethA.Nichols
SecurityMetricsbyAnalogy:Health
SecurityMetricsbyExample
Summary
4THEUNDERGROUNDECONOMYOFSECURITYBREACHES
byChenxiWang
TheMakeupandInfrastructureoftheCyberUnderground
ThePayoff
HowCanWeCombatThisGrowingUndergroundEconomy?
Summary
5BEAUTIFULTRADE:RETHINKINGE-COMMERCESECURITY
byEdBellis
DeconstructingCommerce
WeakAmeliorationAttempts
E-CommerceRedone:ANewSecurityModel
TheNewModel
6SECURINGONLINEADVERTISING:RUSTLERSANDSHERIFFSINTHENEWWILDWEST
byBenjaminEdelman
AttacksonUsers
AdvertisersAsVictims
CreatingAccountabilityinOnlineAdvertising
7THEEVOLUTIONOFPGPSWEBOFTRUST
byPhilZimmermannandJonCallas
PGPandOpenPGP
Trust,Validity,andAuthority
PGPandCryptoHistory
EnhancementstotheOriginalWebofTrustModel
InterestingAreasforFurtherResearch
References
8OPENSOURCEHONEYCLIENT:PROACTIVEDETECTIONOFCLIENT-SIDEEXPLOITS
byKathyWang
EnterHoneyclients
IntroducingtheWorldsFirstOpenSourceHoneyclient
Second-GenerationHoneyclients
HoneyclientOperationalResults
AnalysisofExploits
LimitationsoftheCurrentHoneyclientImplementation
RelatedWork
TheFutureofHoneyclients
9TOMORROWSSECURITYCOGSANDLEVERS
byMarkCurphey
CloudComputingandWebServices:TheSingleMachineIsHere
ConnectingPeople,Process,andTechnology:ThePotentialforBusinessProcessManagement
SocialNetworking:WhenPeopleStartCommunicating,BigThingsChange
InformationSecurityEconomics:SupercrunchingandtheNewRulesoftheGrid
PlatformsoftheLong-TailVariety:WhytheFutureWillBeDifferentforUsAll
Conclusion
Acknowledgments
10SECURITYBYDESIGN
byJohnMcManus
MetricswithNoMeaning
TimetoMarketorTimetoQuality?
HowaDisciplinedSystemDevelopmentLifecycleCanHelp
Conclusion:BeautifulSecurityIsanAttributeofBeautifulSystems
11FORCINGFIRMSTOFOCUS:ISSECURESOFTWAREINYOURFUTURE?
by,liraRouth
ImplicitRequirementsCanStillBePowerful
HowOneFirmCametoDemandSecureSoftware
EnforcingSecurityinOff-the-ShelfSoftware
Analysis:HowtoMaketheWorldsSoftwareMoreSecure
12OHNO,HERECOMETHEINFOSECURITYLAWYERS!
byRandyV.Sabett
Culture
Balance
Communication
DoingtheRightThing
13BEAUTIFULLOGHANDLING
byAntonChuuakin
LogsinSecurityLawsandStandards
FocusonLogs
WhenLogsAreInvaluable
ChallengeswithLogs
CaseStudy:BehindaTrashedServer
FutureLogging
Conclusions
14INCIDENTDETECTION:FINDINGTHEOTHER68%
byGrantGeyerandBrianDunphy
ACommonStartingPoint
ImprovingDetectionwithContext
ImprovingPerspectivewithHostLogging
Summary
15DOINGREALWORKWITHOUTREALDATA
byPeterWayner
HowDataTranslucencyWorks
AReal-LifeExample
PersonalDataStoredAsaConvenience
Trade-offs
GoingDeeper
References
16CASTINGSPELLS:PCSECURITYTHEATER
byMichaelWoodandFernandoFrancisco
GrowingAttacks,DefensesinRetreat
TheIllusionRevealed
BetterPracticesforDesktopSecurity
Conclusion
CONTRIBUTORS
INDEX
孔网啦啦啦啦啦纺织女工火锅店第三课
开播时间:09月02日 10:30
即将开播,去预约
直播中,去观看