图书介绍

安全之美 英文版 影印本PDF|Epub|txt|kindle电子书版本网盘下载

安全之美 英文版 影印本
  • AndyOram,JohnViega编 著
  • 出版社: 南京:东南大学出版社
  • ISBN:9787564122713
  • 出版时间:2010
  • 标注页数:281页
  • 文件大小:59MB
  • 文件页数:293页
  • 主题词:电子计算机-安全技术-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

安全之美 英文版 影印本PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

1 PSYCHOLOGICAL SECURITY TRAPS&by Peiter"Mudge"Zatko1

Learned Helplessness and Na?veté2

Confirmation Traps10

Functional Fixation14

Summary20

2 WIRELESS NETWORKING:FERTILE GROUND FOR SOCIAL ENGINEERING&by Jim Stickley21

Easy Money22

Wireless Gone Wild28

Still,Wireless Is the Future31

3 BEAUTIFUL SECURITY METRICS&by Elizabeth A.Nichols33

Security Metrics by Analogy:Health34

Security Metrics by Example38

Summary60

4 THE UNDERGROUND ECONOMY OF SECURITY BREACHES&by Chenxi Wang63

The Makeup and Infrastructure of the Cyber Underground64

The Payoff66

How Can We Combat This Growing Underground Economy?71

Summary72

5 BEAUTIFUL TRADE:RETHINKING E-COMMERCE SECURITY&by Ed Bellis73

Deconstructing Commerce74

Weak Amelioration Attempts76

E-Commerce Redone:A New Security Model83

The New Model86

6 SECURING ONLINE ADVERTISING:RUSTLERS AND SHERIFFS IN THE NEW WILD WEST&by Benjamin Edelman89

Attacks on Users89

Advertisers As Victims98

Creating Accountability in Online Advertising105

7 THE EVOLUTION OF PGP'S WEB OF TRUST&by Phil Zimmermann and Jon Callas107

PGP and OpenPGP108

Trust,Validity,and Authority108

PGP and Crypto History116

Enhancements to the Original Web of Trust Model120

Interesting Areas for Further Research128

References129

8 OPEN SOURCE HONEYCLIENT:PROACTIVE DETECTION OF CLIENT-SIDE EXPLOITS&by Kathy Wang131

Enter Honeyclients133

Introducing the World's First Open Source Honeyclient133

Second-Generation Honeyclients135

Honeyclient Operational Results139

Analysis of Exploits141

Limitations of the Current Honeyclient Implementation143

Related Work144

The Future of Honeyclients146

9 TOMORROW'S SECURITY COGS AND LEVERS&by Mark Curphey147

Cloud Computing and Web Services:The Single Machine Is Here150

Connecting People,Process,and Technology:The Potential for Business Process Management154

Social Networking:When People Start Communicating,Big Things Change158

Information Security Economics:Supercrunching and the New Rules of the Grid162

Platforms of the Long-Tail Variety:Why the Future Will Be Different for Us All165

Conclusion168

Acknowledgments169

10 SECURITY BY DESIGN&by John McManus171

Metrics with No Meaning172

Time to Market or Time to Quality?174

How a Disciplined System Development Lifecycle Can Help178

Conclusion:Beautiful Security Is an Attribute of Beautiful Systems181

11 FORCING FIRMS TO FOCUS:IS SECURE SOFTWARE IN YOUR FUTURE?&by Jim Routh183

Implicit Requirements Can Still Be Powerful184

How One Firm Came to Demand Secure Software185

Enforcing Security in Off-the-Shelf Software190

Analysis:How to Make the World's Software More Secure193

12 OH NO,HERE COME THE INFOSECURITY LAWYERS!&by Randy V.Sabett199

Culture200

Balance202

Communication207

Doing the Right Thing211

13 BEAUTIFUL LOG HANDLING&by Anton Chuvakin213

Logs in Security Laws and Standards213

Focus on Logs214

When Logs Are Invaluable215

Challenges with Logs216

Case Study:Behind a Trashed Server218

Future Logging221

Conclusions223

14 INCIDENT DETECTION:FINDING THE OTHER 68%&by Grant Geyer and Brian Dunphy225

A Common Starting Point226

Improving Detection with Context228

Improving Perspective with Host Logging232

Summary237

15 DOING REAL WORK WITHOUT REAL DATA&by Peter Wayner239

How Data Translucency Works240

A Real-Life Example243

Personal Data Stored As a Convenience244

Trade-offs244

Going Deeper245

References246

16 CASTING SPELLS:PC SECURITY THEATER&by Michael Wood and Fernando Francisco247

Growing Attacks,Defenses in Retreat248

The Illusion Revealed252

Better Practices for Desktop Security257

Conclusion258

CONTRIBUTORS259

INDEX269

热门推荐