当前位置: 首页 > 资源下载 > 网络通信安全 > 查看资源

资源分类
Web开发
Java
.NET
编程语言
数据库
软件工程
图形动画
系统管理
网络通信安全
计算机理论
考试认证
人文百科
文档手册
硬件技术
办公软件

Beautiful Security: Leading Security Experts Explain How They Think

Beautiful Security: Leading Security Experts Explain How They Think

书名:Beautiful Security: Leading Security Experts Explain How They Think

上传:石头

时间:2009-12-18

文件大小:1.94 MB

资源出处:查看资源出处 >>

收藏到网摘: n/a



作者:Andy Oram, John Viega
出版日期:May 11, 2009
出版社:O'Reilly
页数:300
ISBN:ISBN-10: 0596527489 ISBN-13: 978-0596527488
文件格式:PDF

Product Description
In this thought-provoking anthology, today’s security experts describebold and extraordinary methods used to secure computer systems in theface of ever-increasing threats. Beautiful Securityfeatures a collection of essays and insightful analyses by leaders suchas Ben Edelman, Grant Geyer, John McManus, and a dozen others who havefound unusual solutions for writing secure code, designing secureapplications, addressing modern challenges such as wireless securityand Internet vulnerabilities, and much more. Among the book’swide-ranging topics, you’ll learn how new and more aggressive securitymeasures work–and where they will lead us. Topics include:
Rewiring the expectations and assumptions of organizations regarding securitySecurity as a design requirementEvolution and new projects in Web of TrustLegal sanctions to enforce security precautionsAn encryption/hash system for protecting user dataThe criminal economy for stolen informationDetecting attacks through contextGo beyond the headlines, hype, and hearsay. With Beautiful Security,you’ll delve into the techniques, technology, ethics, and laws at thecenter of the biggest revolution in the history of network security.It’s a useful and far-reaching discussion you can’t afford to miss.
About the Author
Andy Oram is an editor at O’Reilly Media, a highly respected bookpublisher and technology information provider. An employee of thecompany since 1992, Andy currently specializes in free software andopen source technologies. His work for O’Reilly includes the firstbooks ever published commercially in the United States on Linux, andthe 2001 title Peer-to-Peer. His modest programming and systemadministration skills are mostly self-taught.
John is CTO of the SaaS Business Unit at McAfee, his second stint atMcAfee. Previously, he was their Chief Security Architect, after whichhe founded and served as CEO of Stonewall Software, which focused onmaking anti-virus technology faster, better and cheaper. John was alsothe founder of Secure Software (now part of Fortify).
John is author of many security books, including Building Secure Software (Addison-Wesley), Network Security with OpenSSL (O’Reilly), and the forthcoming Myths of Security(O’Reilly). He is responsible for numerous software security tools andis the original author of Mailman, the GNU mailing list manager. He hasdone extensive standards work in the IEEE and IETF and co-invented GCM,a cryptographic algorithm that NIST has standardized. John is also anactive advisor to several security companies, including Fortify andBit9. He holds a MS and BA from the University of Virginia.
Tags:BeautifulExpertsExplainHowSecurity


相关书籍

  • Web Security Field Guide
  • Virtualization for Security: Including Sandboxing, Disaster Recovery, High Avail
  • CCNA Security Exam Cram (Exam IINS 640-553)
  • Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in t
  • Virtualization for Security: Including Sandboxing, Disaster Recovery, High Avail

评论 (0) All

登陆 | 还没注册?