CARVIEW |


Beautiful Security
By: Andy Oram; John Viega
Publisher: O'Reilly Media, Inc.
Pub. Date: April 28, 2009
Print ISBN-13: 978-0-596-52748-8
Pages in Print Edition: 304
Subscriber Rating:
[2 Ratings]
Overview
Top Sellers in this Category

Hacking: The Art of Exploitation, 2nd Edition
by Jon Erickson

Social Engineering: The Art of Human Hacking
by Christopher Hadnagy

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
by Michael Hale Ligh; Steven Adair; Blake Hartstein; Matthew Richard

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
by Dafydd Stuttard; Marcus Pinto

Hacking For Dummies® 3rd Edition
by Kevin Beaver
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same. Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include:
The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their prey
How social networking, cloud computing, and other popular trends help or hurt our online security
How metrics, requirements gathering, design, and law can take security to a higher level
The real, little-publicized history of PGP
This book includes contributions from:
Peiter "Mudge" Zatko
Jim Stickley
Elizabeth Nichols
Chenxi Wang
Ed Bellis
Ben Edelman
Phil Zimmermann and Jon Callas
Kathy Wang
Mark Curphey
John McManus
James Routh
Randy V. Sabett
Anton Chuvakin
Grant Geyer and Brian Dunphy
Peter Wayner
Michael Wood and Fernando Francisco
All royalties will be donated to the Internet Engineering Task Force (IETF).
Subscriber Reviews
Average Rating: Based on 2 Ratings
No Subscribers have provided a review for this book.
Browse Similar Topics
Top Level Categories:
Information Technology & Software Development
Sub-Categories:
Information Technology & Software Development > Networking
Networking > Security
Some information on this page was provided using data from Amazon.com®. View at Amazon >
Extras
The publisher has provided additional content related to this title.
Description | Content |
---|---|
Visit the catalog page for Beautiful Security | |
Visit the errata page for Beautiful Security |
About Safari Books Online •
Terms of Service •
Gift Subscriptions •
Privacy Policy •
Contact Us •
Corporate Licenses •
Help •
Accessibility |
Copyright 2011Safari Books Online. All rights reserved.