Beautiful Security: Leading Security Experts Explain How They Think / Edition 1

Beautiful Security: Leading Security Experts Explain How They Think / Edition 1

ISBN-10:
0596527489
ISBN-13:
9780596527488
Pub. Date:
05/05/2009
Publisher:
O'Reilly Media, Incorporated
ISBN-10:
0596527489
ISBN-13:
9780596527488
Pub. Date:
05/05/2009
Publisher:
O'Reilly Media, Incorporated
Beautiful Security: Leading Security Experts Explain How They Think / Edition 1

Beautiful Security: Leading Security Experts Explain How They Think / Edition 1

$39.99 Current price is , Original price is $39.99. You
$39.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.


Overview

Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same.

Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include:

  • The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their prey
  • How social networking, cloud computing, and other popular trends help or hurt our online security
  • How metrics, requirements gathering, design, and law can take security to a higher level
  • The real, little-publicized history of PGP

This book includes contributions from:

  • Peiter "Mudge" Zatko
  • Jim Stickley
  • Elizabeth Nichols
  • Chenxi Wang
  • Ed Bellis
  • Ben Edelman
  • Phil Zimmermann and Jon Callas
  • Kathy Wang
  • Mark Curphey
  • John McManus
  • James Routh
  • Randy V. Sabett
  • Anton Chuvakin
  • Grant Geyer and Brian Dunphy
  • Peter Wayner
  • Michael Wood and Fernando Francisco

All royalties will be donated to the Internet Engineering Task Force (IETF).


Product Details

ISBN-13: 9780596527488
Publisher: O'Reilly Media, Incorporated
Publication date: 05/05/2009
Pages: 300
Product dimensions: 7.00(w) x 9.10(h) x 0.90(d)

About the Author

Andy Oram is an editor at O'Reilly Media, a highly respected book publisher and technology information provider. An employee of the company since 1992, Andy currently specializes in free software and open source technologies. His work for O'Reilly includes the first books ever published commercially in the United States on Linux, and the 2001 title Peer-to-Peer. His modest programming and system administration skills are mostly self-taught.

John is CTO of the SaaS Business Unit at McAfee, his second stint at McAfee. Previously, he was their Chief Security Architect, after which he founded and served as CEO of Stonewall Software, which focused on making anti-virus technology faster, better and cheaper. John was also the founder of Secure Software (now part of Fortify).



John is author of many security books, including Building Secure Software (Addison-Wesley), Network Security with OpenSSL (O'Reilly), and the forthcoming Myths of Security (O'Reilly). He is responsible for numerous software security tools and is the original author of Mailman, the GNU mailing list manager. He has done extensive standards work in the IEEE and IETF and co-invented GCM, a cryptographic algorithm that NIST has standardized. John is also an active advisor to several security companies, including Fortify and Bit9. He holds a MS and BA from the Universityof Virginia.

Table of Contents

  • Preface
  • Chapter 1: Psychological Security Traps
  • Chapter 2: Wireless Networking: Fertile Ground for Social Engineering
  • Chapter 3: Beautiful Security Metrics
  • Chapter 4: The Underground Economy of Security Breaches
  • Chapter 5: Beautiful Trade: Rethinking E-Commerce Security
  • Chapter 6: Securing Online Advertising: Rustlers and Sheriffs in the New Wild West
  • Chapter 7: The Evolution of PGP’s Web of Trust
  • Chapter 8: Open Source Honeyclient: Proactive Detection of Client-Side Exploits
  • Chapter 9: Tomorrow’s Security Cogs and Levers
  • Chapter 10: Security by Design
  • Chapter 11: Forcing Firms to Focus: Is Secure Software in Your Future?
  • Chapter 12: Oh No, Here Come the Infosecurity Lawyers!
  • Chapter 13: Beautiful Log Handling
  • Chapter 14: Incident Detection: Finding the Other 68%
  • Chapter 15: Doing Real Work Without Real Data
  • Chapter 16: Casting Spells: PC Security Theater
  • Contributors
  • Colophon
From the B&N Reads Blog

Customer Reviews