Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beautiful Security: Leading Security Experts Explain How They Think

Buy
In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found unusual solutions for writing secure code, designing secure applications, addressing modern challenges such as wireless security and Internet vulnerabilities, and much more. Among the book's wide-ranging topics, you'll learn how new and more aggressive security measures work--and where they will lead us. Topics include:
  • Rewiring the expectations and assumptions of organizations regarding security
  • Security as a design requirement
  • Evolution and new projects in Web of Trust
  • Legal sanctions to enforce security precautions
  • An encryption/hash system for protecting user data
  • The criminal economy for stolen information
  • Detecting attacks through context

Go beyond the headlines, hype, and hearsay. With Beautiful Security, you'll delve into the techniques, technology, ethics, and laws at the center of the biggest revolution in the history of network security. It's a useful and far-reaching discussion you can't afford to miss.

About the Author

Andy Oram is an editor at O'Reilly Media, a highly respected book publisher and technology information provider. An employee of the company since 1992, Andy currently specializes in free software and open source technologies. His work for O'Reilly includes the first books ever published commercially in the United States on Linux, and the 2001 title Peer-to-Peer. His modest programming and system administration skills are mostly self-taught.

John is CTO of the SaaS Business Unit at McAfee, his second stint at McAfee. Previously, he was their Chief Security Architect, after which he founded and served as CEO of Stonewall Software, which focused on making anti-virus technology faster, better and cheaper. John was also the founder of Secure Software (now part of Fortify).

John is author of many security books, including Building Secure Software (Addison-Wesley), Network Security with OpenSSL (O'Reilly), and the forthcoming Myths of Security (O'Reilly). He is responsible for numerous software security tools and is the original author of Mailman, the GNU mailing list manager. He has done extensive standards work in the IEEE and IETF and co-invented GCM, a cryptographic algorithm that NIST has standardized. John is also an active advisor to several security companies, including Fortify and Bit9. He holds a MS and BA from the University of Virginia.
(HTML tags aren't allowed.)

The gmax Handbook (Game Development Series)
The gmax Handbook (Game Development Series)
After playing the same levels or flying the same airplane over and over, many avid gamers quickly tire of their games. Now, with gmax supported games, they have a 3D modeling tool that is easy to use, comes with documentation, and includes a common framework that can be used to modify many popular games. The gmax™ Handbook shows you how...
Cryptographic Hardware and Embedded Systems - CHES 2009: 11th International Workshop Lausanne
Cryptographic Hardware and Embedded Systems - CHES 2009: 11th International Workshop Lausanne

CHES 2009, the 11th workshop on Cryptographic Hardware and Embedded Systems, was held in Lausanne, Switzerland, September 6–9, 2009. The workshop was sponsored by the International Association for Cryptologic Research (IACR).

The workshop attracted a record number of 148 submissions from 29 countries, of which the...

Uterine Cervical Cancer: Clinical and Therapeutic Perspectives
Uterine Cervical Cancer: Clinical and Therapeutic Perspectives

This volume provides a broad background of the basic sciences, clinical and therapeutic aspects, and management of uterine cervical cancer. It offers state-of-the-art information on the molecular genetics, biology, and clinical aspects of premalignant lesions of the uterine cervix, and provides a better understanding of the molecular...


Programming Web Services with SOAP
Programming Web Services with SOAP
Programming Web Services with SOAP introduces you to building distributed Wb-based
applications using the SOAP, WSDL, and UDI protocols. You'll learn the XML underlying
these standards, as well as how to use the popular toolkits for Java and Perl. The book also
addresses security and other enterprise issues.

You'd be
...
iPod + iTunes for Windows and Mac in a Snap (2nd Edition) (Sams Teach Yourself)
iPod + iTunes for Windows and Mac in a Snap (2nd Edition) (Sams Teach Yourself)
iPod enthusiasts, this book is for you. iPod + iTunes for Windows and Mac in a Snap, Second Edition has been updated to cover the latest version of iTunes and the entire family of iPods, including the new Nano, and podcast and video download features. Organized into a series of well-organized,...
Advertising and the Mind of the Consumer: What Works, What Doesn't, and Why
Advertising and the Mind of the Consumer: What Works, What Doesn't, and Why

Advertising is an established and ever-present force and yet just how it works continues to be something of a mystery. From an industry insider, this fully-updated guide unveils the secrets of leading a successful campaign over a wide range of media, including the web. Drawing on many well-known international ads as...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy