語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Ten laws for security[electronic res...
~
Diehl, Eric.
Ten laws for security[electronic resource] /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
杜威分類號:
005.8
書名/作者:
Ten laws for security/ by Eric Diehl.
作者:
Diehl, Eric.
出版者:
Cham : : Springer International Publishing :, 2016.
面頁冊數:
xix, 281 p. : : ill., digital ;; 24 cm.
Contained By:
Springer eBooks
標題:
Systems and Data Security.
標題:
Security Science and Technology.
標題:
Computer security.
標題:
Computer networks - Security measures.
標題:
Computer Science.
標題:
Data Encryption.
ISBN:
9783319426419
ISBN:
9783319426396
內容註:
Introduction -- Law 1, Attackers Will Always Find Their Way -- Law 2, Know the Assets to Protect -- Law 3, No Security Through Obscurity -- Law 4, Trust No One -- Law 5, Si Vis Pacem, Para Bellum -- Law 6, You Are the Weakest Link -- Law 7, Security Is No Stronger Than Its Weakest Link -- Law 8, If You Watch the Internet, the Internet Is Watching You -- Law 9, Quis Custodiet Ipsos Custodes? Law 10, Security Is Not a Product, Security Is a Process -- Conclusions -- Abbreviations -- Acronyms -- References -- App. A, A Short Introduction to Cryptography.
摘要、提要註:
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.
電子資源:
http://dx.doi.org/10.1007/978-3-319-42641-9
Ten laws for security[electronic resource] /
Diehl, Eric.
Ten laws for security
[electronic resource] /by Eric Diehl. - Cham :Springer International Publishing :2016. - xix, 281 p. :ill., digital ;24 cm.
Introduction -- Law 1, Attackers Will Always Find Their Way -- Law 2, Know the Assets to Protect -- Law 3, No Security Through Obscurity -- Law 4, Trust No One -- Law 5, Si Vis Pacem, Para Bellum -- Law 6, You Are the Weakest Link -- Law 7, Security Is No Stronger Than Its Weakest Link -- Law 8, If You Watch the Internet, the Internet Is Watching You -- Law 9, Quis Custodiet Ipsos Custodes? Law 10, Security Is Not a Product, Security Is a Process -- Conclusions -- Abbreviations -- Acronyms -- References -- App. A, A Short Introduction to Cryptography.
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.
ISBN: 9783319426419
Standard No.: 10.1007/978-3-319-42641-9doiSubjects--Topical Terms:
466229
Systems and Data Security.
LC Class. No.: QA76.9.A25 / D54 2016
Dewey Class. No.: 005.8
Ten laws for security[electronic resource] /
LDR
:01947nam a2200313 a 4500
001
476426
003
DE-He213
005
20161116083358.0
006
m d
007
cr nn 008maaau
008
181208s2016 gw s 0 eng d
020
$a
9783319426419
$q
(electronic bk.)
020
$a
9783319426396
$q
(paper)
024
7
$a
10.1007/978-3-319-42641-9
$2
doi
035
$a
978-3-319-42641-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
D54 2016
072
7
$a
URY
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
D559 2016
100
1
$a
Diehl, Eric.
$3
687176
245
1 0
$a
Ten laws for security
$h
[electronic resource] /
$c
by Eric Diehl.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2016.
300
$a
xix, 281 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Introduction -- Law 1, Attackers Will Always Find Their Way -- Law 2, Know the Assets to Protect -- Law 3, No Security Through Obscurity -- Law 4, Trust No One -- Law 5, Si Vis Pacem, Para Bellum -- Law 6, You Are the Weakest Link -- Law 7, Security Is No Stronger Than Its Weakest Link -- Law 8, If You Watch the Internet, the Internet Is Watching You -- Law 9, Quis Custodiet Ipsos Custodes? Law 10, Security Is Not a Product, Security Is a Process -- Conclusions -- Abbreviations -- Acronyms -- References -- App. A, A Short Introduction to Cryptography.
520
$a
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.
650
2 4
$a
Systems and Data Security.
$3
466229
650
2 4
$a
Security Science and Technology.
$3
467803
650
0
$a
Computer security.
$3
338952
650
0
$a
Computer networks
$x
Security measures.
$3
341462
650
1 4
$a
Computer Science.
$3
423143
650
2 4
$a
Data Encryption.
$3
465773
710
2
$a
SpringerLink (Online service)
$3
463450
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-42641-9
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
多媒體
多媒體檔案
http://dx.doi.org/10.1007/978-3-319-42641-9
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入