Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Thor's Microsoft Security Bible: A Collection of Practical Security Techniques

Buy

What is security? Is it a mindset? Is it a measurable and actionable posture or position? Or is it a bit of both? People, as a race, learn from doing; they learn by example. Ingrained into our psyche is a process that builds new information upon previous knowledge as we learn. As Isaac Newton said, “If I have seen further than others, it is by standing on the shoulders of giants.” Basically, we bring in a foundation of old information as we process new information.

But this does not always work in our favor, particularly in the area of technology. Technology has a way of exposing the flaws in past ways of thinking by filling in the gaps between human assumptions. Technology answers many of the questions that, frankly, were previously answered by ad-libs. I think the relationship between science and religion also exemplifies this quite well. As more technological advances are made, more things about the world that were previously explained by divine intervention, or magic if you will, are demystified. The people who came up with these answers were revered as some manner of guru and were held in a position of regard. Some were indeed gifted and contributed to the well-being of others with their insight and wisdom. And some were a bunch of jackleg gurus making up stories in the absence of wisdom, insight, and altruism—or they were simply snake oil salesmen. My intent is not to be prophetic, but rather to make the suggestion that we need to focus on making clear distinctions between the lessons that history holds that provide true value to information security (infosec) and the ones that are simply a bunch of crap.

A security strategy needs to plan for and respond to incidents as moving targets on a sliding scale. Vectors and targets will change as technology changes, and as revenue sources for criminals dry up, new ones will be scouted out. Attacks against users and modes of behavior in a home-usage environment will migrate to mobile scenarios as both individuals and businesses conduct more and more business via cell phone. But while the attacks change with the targets, what remains constant are the fundamental building blocks of security, which I believe are security in depth and least privilege. The reason for this is because I have been writing about this subject for decades now and these two security concepts have remained as reliable and dependable as they were years ago.

(HTML tags aren't allowed.)

Macromedia Flash MX 2004 ActionScript Bible
Macromedia Flash MX 2004 ActionScript Bible
If Flash MX 2004 ActionScript can do it, you can do it too...

ActionScript gives you exacting control in Flash applications. This comprehensive volume gives you a complete education in ActionScript 2.0, a new feature of Flash MX 2004. You’ll explore ActionScript syntax, best practices, and beginning, intermediate, and advanced topics. And...

Information theory and statistics
Information theory and statistics
Highly useful text studies logarithmic measures of information and their application to testing statistical hypotheses. Includes numerous worked examples and problems. References. Glossary. Appendix....
Cosmetic Dermatology: Principles and Practice, Second Edition
Cosmetic Dermatology: Principles and Practice, Second Edition

THE ULTIMATE SOURCEBOOK FOR UNDERSTANDING THE SKIN AND ITS APPEARANCE

“A concise, well-written, and well-illustrated overview of the topic of cosmetic dermatology that will prove useful to all physicians who care for cosmetic patients.”—Archives of Facial Plastic Surgery, reviewing the first...


SQL Clearly Explained, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
SQL Clearly Explained, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
It covers proper structure of SQL queries, how to produce a desired result and minimize a burden on SQL command processors, and how to modify data and database structure for ease of use and increased efficiency. Paper. DLC: SQL (Computer program language). --This text refers to an out of print or unavailable edition of this title....
Dreamweaver in a Nutshell
Dreamweaver in a Nutshell
Dreamweaver in a Nutshell is a quick desktop reference for both new and experienced Dreamweaver developers. It covers everything from the basics to advanced topics, including navigation bars, image maps, modifications with XML, style sheets, positioning elements, HTML cleanup tools, and ways to extend Dreamweaver...
A Business Guide to Information Security
A Business Guide to Information Security
This book was designed, and is intended to be used, as both a digital and an analogue (that is, dual online and hardcopy) resource. The speed of evolution in computing and of the internet means that any book on information security starts going out of date fairly quickly. On top of that, there is a six- to eight-month gap between completing the...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy