注冊(cè) | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當(dāng)前位置: 首頁(yè)出版圖書科學(xué)技術(shù)計(jì)算機(jī)/網(wǎng)絡(luò)信息安全安全之美(影印版)

安全之美(影印版)

安全之美(影印版)

定 價(jià):¥52.00

作 者: (美)奧萊姆,(美)衛(wèi)加 著
出版社: 東南大學(xué)出版社
叢編項(xiàng):
標(biāo) 簽: 信息安全

ISBN: 9787564122713 出版時(shí)間: 2010-06-01 包裝: 平裝
開本: 16開 頁(yè)數(shù): 281 字?jǐn)?shù):  

內(nèi)容簡(jiǎn)介

  盡管大多數(shù)人在他們個(gè)人或者公司的系統(tǒng)沒(méi)有遭到攻擊之前不會(huì)給予安全高度的重視,這本充滿激辯的書籍依然表明了數(shù)字安全不僅僅是值得思考而已,它還是一個(gè)可以令人陶醉的話題。罪犯通過(guò)大量富有創(chuàng)造力的行為得以成功,防御方也需要付出同等的代價(jià)。本書通過(guò)一些有著深刻見解的文章和分析探索了這樣一個(gè)具有挑戰(zhàn)性的主題,其內(nèi)容包括:個(gè)人信息的秘密機(jī)制:它如何工作,罪犯之間的關(guān)系,以及一些他們針對(duì)被掠食對(duì)象發(fā)起突襲時(shí)所使用的新方法社交網(wǎng)絡(luò)、云計(jì)算和其他流行趨勢(shì)如何幫助和傷害我們的在線安全衡量標(biāo)準(zhǔn)、需求收集、設(shè)計(jì)和法律如何能夠把安全提升到一個(gè)更高的高度PGP真實(shí)又少為人知的歷史

作者簡(jiǎn)介

暫缺《安全之美(影印版)》作者簡(jiǎn)介

圖書目錄

PREFACE
1 PSYCHOLOGICAL SECURITY TRAPS
 by Peiter“Mudge”Zatko
Learned Helplessness and NaTvet6
Confirmation Traps
FunctionaI Fixation
Summary
2 WIRELESS NETWORKING:FERTILE GROUND FOR SOCIAL ENGINEERING
 byJim Stickle),
Easy Money
Wi reless Gone Wild
Still.Wireless Is the Future
3 BEAUTIFUL SECURITY METRICS
 byElizabeth A.Nichols
Security Metrics by Analogy:Health
Security Metrics by Example
Summary
4 THE UNDERGROUND ECONOMY OF SECURITY BREACHES
by Chenxi Wang
The Makeup and Infrastructure ofthe Cyber Underground
The Payoff
How Can We Combat This Growing Underg'round Economy?
Summary
5 BEAUTlFUL TRADE:RETHINKlNG E.COMMERCE SECURITY
byEdBellis
DeconslructIng Commerce
Weak Amelioration Attempts
E-Commerce Redone:A New Security Model
The New ModeI
6 SECURING ONLINE ADVERTISlNG:RUSTLERS AND SHERIFFS IN THE NEW WILD WEST
by Benjamin Edelman
Attacks on Users
Advertisers As Vi Clims
Creating Accountability in Online Advertising
7 THE EVOLUTl0N OF PGP’S WEB OF TRUST
byPhil Zimmermann andJon Callas
PGP and OpenPGP
Trust,Validity,and Authority
PGP and C rypto History
Enhancements to the Original Web of Trust Model
Interesting A reas for Further Research
References
8 OPEN SOURCE HONEYCLIENT:PROACTIVE DETECTION OF CLIENT.SIDE EXPLOITS
 byKathywang
Enter Honeyclients
Introducing the World’S Fi rst Open Source Honeyclient
Second-Generation Honeyclients
Honeyclient OperationaI Results
Analysis of Exploits
Limitations ofthe Current Honeyclient Implementation
Related Work
The Future of Honeyclients
9 TOMORROW’S SECURITY COGS AND LEVERS
 byMark Curphey
Cloud Computing and Web Services:The Single Machine Is Here
ConnectimJ People,Process,and Technology:The Potential for Business Process Management
Social Networkin9:When People Start Communicatin9,Big Things Change
Information Security Economics:Supercrunching andthe New Rules oftheGrid
Platforms ofthe Lon9·Tail Variety:Why the Future Will Be Different for Us All
Conclusion
Acknowledgmenls
10 SECURITY BY DESIGN
 byJohn McManus
Metrics with No Meaning
Time to Market or Time to Quality?
How a Di sciplined System Development Lifecycle Can Help
Conclusion:Beautiful Security Is an Attribute of Beautiful Systems
11 FORClNG FIRMS TO FOCUS:IS SECURE SOFTWARE IN YOUR FUTURE?
byJim Routh
Implicit Requi remenls Can StilI Be Powerful
How One Firm Came to Demand Secure Software
Enforcing Security in Off—the—ShelfSoftware
Analysis:How to Make the World’S Software More Secure
12 0H N0,HERE COME THE INFOSECURITY LAWYERS!
 byRandyv.Sabett
Culture
Balance
Communication
Doing the Right Thing
13 BEAUTIFUL LOG HANDLING
byAnton Chuuakin
Logs in Security Laws and Standards
Focus on Logs
When Logs Are Invaluable
Challenges with Logs
Case Study:Behind a Trashed Server
Future Logging
Conclusions
14 INCIDENT DETECTION:FINDING THE OTHER 68%
 by Grant Geyer and Brian Dunphy
A Common Starting Point
Improving Detection with Context
Improving Perspective with Host Logging
Summary
15 DOING REAL WORK WITHOUT REAL DATA
by Peter Wayner
How Data Translucency Works
A Real.Life Example
PersonaI Data Stored As a Convenience
Trade—offs
Going Deeper
References
16 CASTING SPELLS:PC SECURITY THEATER
by Michael Wood and Fernando Francisco
Growing Attacks.Defenses in Retreat
The lIlusion Revealed
Better Practices for Desktop Security
Conclusion
CONTRIBUTORS
INDEX

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) m.ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號(hào) 鄂公網(wǎng)安備 42010302001612號(hào)