Dallas Public Library

Beautiful security, edited by Andy Oram and John Viega

Label
Beautiful security, edited by Andy Oram and John Viega
Language
eng
Bibliography note
Includes bibliographical references and index
Illustrations
illustrations
Index
index present
Literary Form
non fiction
Main title
Beautiful security
Nature of contents
bibliography
Oclc number
150370629
Responsibility statement
edited by Andy Oram and John Viega
Series statement
Theory in practice
Summary
Leaders in the field of security describe bold and extraordinary projects in securing computer systems. This book is a diverse and thought-provoking anthology, like Beautiful Code, that shows the state of a major field through stories and insightful analyses. The authors describe how they arrived at unusual solutions to problems such as writing secure code, designing applications securely, and dealing with modern challenges such as wireless security and Internet challenges. This book will make security a cool topic and get people talking
Table Of Contents
Psychological security traps / Peiter "Mudge" Zatko -- Wireless networking : fertile ground for social engineering / Jim Stickley -- Beautiful security metrics / Elizabeth A. Nichols -- The underground economy of security breaches / Chenxi Wang -- Beautiful trade : rethinking E-commerce security / Ed Bellis -- Securing online advertising : rustlers and sheriffs in the new wild west / Benjamin Edelman -- The evolution of PGP's Web of Trust / Phil Zimmermann and Jon Callas -- Open source honeyclient : proactive detection of client-side exploits / Kathy Wang -- Tomorrow's security cogs and levers / Mark Curphey -- Security by design / John McManus -- Forcing firms to focus : is secure software in your future? / Jim Routh -- Oh no, here come the infosecurity lawyers! / Randy V. Sabett -- Beautiful log handling / Anton Chuvakin -- Incident detection : finding the other 68% / Grant Geyer and Brian Dunphy -- Doing real work without real data / Peter Wayner -- Casting spells : PC security theater / Michael Wood and Fernando Francisco
resource.variantTitle
Leading security experts explain how they think
Classification
Mapped to

Incoming Resources