Używamy cookies, aby ułatwić korzystanie z Portalu. Możesz określić warunki przechowywania, dostępu do plików cookies w Twojej przeglądarce. Dowiedz się więcej.
strona główna Strona główna | Nowości | Promocje | Zapowiedzi Twoje konto | Zarejestruj | Schowek | Kontakt | Pomoc
mapa działów
Szukaj: szukanie zaawansowane
Książki \ Bezpieczeństwo

Beautiful Security Język: 2


Cena Brutto: 159.71

Cena netto: 152.10

Wersja: Drukowana
Autor John Viega
Liczba_stron 304
Wydawnictwo OReilly Media
Data_Wydania 2009-04-17
Poziom All Levels

Informacje podstawowe:

  • Wydawnictwo: O'Reilly Media
  • Data wydania: 17 kwietnia 2009
  • Liczba stron: 304
  • Autor/autorzy:
    • Andy Oram
    • John Viega


With the ever-increasing risks and rewards in today's networked world, new and more aggressive forms of defending networks have evolved. No longer content to take and assess damage after an attack, companies are looking at measured responses to protect their networks while under attack. Regardless of what you call it, whether it's aggressive self-defense or vigilantism, these techniques and technology are at the center of the biggest revolution in the history of network security. This book shows you why they are not only feasible but inevitable.

In Self-Defending Networks, the luminaries and pioneers of network security take you beyond the headlines, hype, and hearsay to provide insight into why new measures are being undertaken and how they work. Some of them discuss how these new techniques have evolved and where they will lead us; others explore how the techniques bring into question the very beliefs, ethics, laws, and morals that have guided information security so far. This topic is generating intense interest in the security community, and the contributors to "Self-Defending Networks" offer a balanced assessment that covers both sides of the issue. It's a far-reaching discussion you can't afford to miss.

O autorze/autorach:

Andy Oram

Andy Oram is an editor at O'Reilly Media, a highly respected book publisher and technology information provider. An employee of the company since 1992, Andy currently specializes in free software and open source technologies. His work for O'Reilly includes the first books ever published commercially in the United States on Linux, and the 2001 title Peer-to-Peer. His modest programming and system administration skills are mostly self-taught.

View Andy Oram's full profile page.

John Viega

John is CTO of the SaaS Business Unit at McAfee, his second stint at McAfee. Previously, he was their Chief Security Architect, after which he founded and served as CEO of Stonewall Software, which focused on making anti-virus technology faster, better and cheaper. John was also the founder of Secure Software (now part of Fortify).

John is author of many security books, including Building Secure Software (Addison-Wesley), Network Security with OpenSSL (O'Reilly), and the forthcoming Myths of Security (O'Reilly). He is responsible for numerous software security tools and is the original author of Mailman, the GNU mailing list manager. He has done extensive standards work in the IEEE and IETF and co-invented GCM, a cryptographic algorithm that NIST has standardized. John is also an active advisor to several security companies, including Fortify and Bit9. He holds a MS and BA from the University of Virginia.

View John Viega's full profile page.

Zawartość (spis treści):

  1. Chapter 1 Psychological Security Traps

    1. Learned Helplessness and Naïveté
    2. Confirmation Traps
    3. Functional Fixation
    4. Summary
  2. Chapter 2 Wireless Networking: Fertile Ground forSocial Engineering

    1. Easy Money
    2. Wireless Gone Wild
    3. Still, Wireless Is the Future
  3. Chapter 3 Beautiful Security Metrics

    1. Security Metrics by Analogy: Health
    2. Security Metrics by Example
    3. Summary
  4. Chapter 4 The Underground Economy of SecurityBreaches

    1. The Makeup and Infrastructure of the Cyber Underground
    2. The Payoff
    3. How Can We Combat This Growing Underground Economy?
    4. Summary
  5. Chapter 5 Beautiful Trade: Rethinking E-CommerceSecurity

    1. Deconstructing Commerce
    2. Weak Amelioration Attempts
    3. E-Commerce Redone: A New Security Model
    4. The New Model
  6. Chapter 6 Securing Online Advertising: Rustlers and Sheriffs in the New WildWest

    1. Attacks on Users
    2. Advertisers As Victims
    3. Creating Accountability in Online Advertising
  7. Chapter 7 The Evolution of PGP’s Web of Trust

    1. PGP and OpenPGP
    2. Trust, Validity, and Authority
    3. PGP and Crypto History
    4. Enhancements to the Original Web of Trust Model
    5. Interesting Areas for Further Research
    6. References
  8. Chapter 8 Open Source Honeyclient: Proactive Detection of Client-SideExploits

    1. Enter Honeyclients
    2. Introducing the World’s First Open Source Honeyclient
    3. Second-Generation Honeyclients
    4. Honeyclient Operational Results
    5. Analysis of Exploits
    6. Limitations of the Current Honeyclient Implementation
    7. Related Work
    8. The Future of Honeyclients
  9. Chapter 9 Tomorrow’s Security Cogs and Levers

    1. Cloud Computing and Web Services: The Single Machine IsHere
    2. Connecting People, Process, and Technology: The Potential forBusiness Process Management
    3. Social Networking: When People Start Communicating, Big ThingsChange
    4. Information Security Economics: Supercrunching and the New Rules ofthe Grid
    5. Platforms of the Long-Tail Variety: Why the Future Will BeDifferent for Us All
    6. Conclusion
    7. Acknowledgments
  10. Chapter 10 Security by Design

    1. Metrics with No Meaning
    2. Time to Market or Time to Quality?
    3. How a Disciplined System Development Lifecycle Can Help
    4. Conclusion: Beautiful Security Is an Attribute of BeautifulSystems
  11. Chapter 11 Forcing Firms to Focus: Is Secure Software in Your Future?

    1. Implicit Requirements Can Still Be Powerful
    2. How One Firm Came to Demand Secure Software
    3. Enforcing Security in Off-the-Shelf Software
    4. Analysis: How to Make the World’s Software More Secure
  12. Chapter 12 Oh No, Here Come the InfosecurityLawyers!

    1. Culture
    2. Balance
    3. Communication
    4. Doing the Right Thing
  13. Chapter 13 Beautiful Log Handling

    1. Logs in Security Laws and Standards
    2. Focus on Logs
    3. When Logs Are Invaluable
    4. Challenges with Logs
    5. Case Study: Behind a Trashed Server
    6. Future Logging
    7. Conclusions
  14. Chapter 14 Incident Detection: Finding the Other 68%

    1. A Common Starting Point
    2. Improving Detection with Context
    3. Improving Perspective with Host Logging
    4. Summary
  15. Chapter 15 Doing Real Work Without Real Data

    1. How Data Translucency Works
    2. A Real-Life Example
    3. Personal Data Stored As a Convenience
    4. Trade-offs
    5. Going Deeper
    6. References
  16. Chapter 16 Casting Spells: PC Security Theater

    1. Growing Attacks, Defenses in Retreat
    2. The Illusion Revealed
    3. Better Practices for Desktop Security
    4. Conclusion
  1. AppendixContributors

  2. Colophon

Produkty Podobne
Certified Ethical Hacker (CEH) Version 10 Cert Guide, 3rd Edition
Firewall nie powstrzyma prawdziwego smoka, czyli jak zadbać o cyberbezpieczeństwo. Przewodnik dla niefachowców. Wydanie III
Kliknij tutaj, aby zabić wszystkich. Bezpieczeństwo i przetrwanie w hiperpołączonym świecie
Bezpieczeństwo systemu Linux w praktyce. Receptury. Wydanie II
Atak na sieć okiem hakera. Wykrywanie i eksploatacja luk w zabezpieczeniach sieci
Anonimizacja i maskowanie danych wrażliwych w przedsiębiorstwach
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 2
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 1
Bądź bezpieczny w cyfrowym świecie. Poradnik bezpieczeństwa IT dla każdego
Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki
Więcej produktów