Commencez à lire Beautiful Security sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil

 
 
 

Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.
Beautiful Security: Leading Security Experts Explain How They Think
 
Agrandissez cette image
 

Beautiful Security: Leading Security Experts Explain How They Think [Format Kindle]

John Viega , Andy Oram

Prix conseillé : EUR 24,71 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 41,20
Prix Kindle : EUR 17,30 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 23,90 (58%)

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 17,30  
Broché EUR 40,91  
Chaque jour, un ebook avec au moins 60% de réduction
Découvrez l'Offre Éclair Kindle et inscrivez-vous à la Newsletter Offre Éclair Kindle pour ne rater aucun ebook à prix exceptionnel. Abonnez-vous dès maintenant




Descriptions du produit

Présentation de l'éditeur

Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same.

Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include:

  • The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their prey
  • How social networking, cloud computing, and other popular trends help or hurt our online security
  • How metrics, requirements gathering, design, and law can take security to a higher level
  • The real, little-publicized history of PGP

This book includes contributions from:

  • Peiter "Mudge" Zatko
  • Jim Stickley
  • Elizabeth Nichols
  • Chenxi Wang
  • Ed Bellis
  • Ben Edelman
  • Phil Zimmermann and Jon Callas
  • Kathy Wang
  • Mark Curphey
  • John McManus
  • James Routh
  • Randy V. Sabett
  • Anton Chuvakin
  • Grant Geyer and Brian Dunphy
  • Peter Wayner
  • Michael Wood and Fernando Francisco

All royalties will be donated to the Internet Engineering Task Force (IETF).


Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 1676 KB
  • Nombre de pages de l'édition imprimée : 302 pages
  • Utilisation simultanée de l'appareil : Illimité
  • Editeur : O'Reilly Media; Édition : 1 (17 avril 2009)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B002NOGG54
  • Synthèse vocale : Activée
  • X-Ray :
  • Classement des meilleures ventes d'Amazon: n°481.689 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Souhaitez-vous faire modifier les images ?


En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne 

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.7 étoiles sur 5  11 commentaires
22 internautes sur 23 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Security: Bureaucratic drudgery or exciting career? 29 juin 2009
Par Allen Stenger - Publié sur Amazon.com
Format:Broché
This collection of essays is a very clearly written introduction to a number of current topics and techniques in computer security. It is not a how-to book, but it includes several case studies and gives you a good idea of what is happening in the field. For the most part the book does not assume prior knowledge in the field, although occasionally a bit of hacker or security jargon is used without being defined.

For me the most interesting chapters were the one with case studies. In this book you will learn how to steal people's credit card numbers at airports (run a cut-rate WiFi access point), how to scan for malicious websites without getting infected (harder than it looks, and a constant battle of measures and countermeasures), and the true history of Pretty Good Privacy, as told by its inventor, Phil Zimmermann (not as lurid as the versions you have probably heard, but still full of twists and turns). You'll learn the going rates for stolen personal and financial information (not that much, so if you're going to steal it, you need to steal a lot) and how to run your own cyber money-laundering network (which seems to be where most of the money and the risk is). Microsoft plays a prominent role in the book, sometimes as hero, sometimes as chump.

The layout and production of the book are very good, and it has a good index (a glossary would have been nice, too). I have a couple of minor gripes: the book is set in itty-bitty type (I measured it at 8 points on 12 point line spacing); and although the book has two editors, the preface is written in the first person singular (apparently by Oram, but this is not stated).

The book's title, "Beautiful Security", was probably modeled on Oram's previous collection Beautiful Code: Leading Programmers Explain How They Think (Theory in Practice (O'Reilly)), but it doesn't really fit the content of this book. Some of the essays mention beauty in the body or the title, but this is usually a token appearance, or is explained as meaning that security should be built in rather than tacked on. The preface states that the purpose of the book is to convince the reader that security is not bureaucratic drudgery but is an exciting career, and I think the book is successful at this.
4 internautes sur 5 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Beautiful Security is Timely, Important and Readable 6 juillet 2009
Par Jalna Oyman - Publié sur Amazon.com
Format:Broché
Beautiful Security is full of pertinent information for all of us. The book is well written, covers topics we need to know about, is very readable. Start with the first entry by Mudge: his perspective is accurate and revealing and of course he writes well so enjoy the new insights you gain by reading this book. Highly recommended.
1 internautes sur 1 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Great book to give someone interested in getting in the security field 9 avril 2010
Par Daniel D. Lohin - Publié sur Amazon.com
Format:Broché|Achat vérifié
Recently I have been asked by a lot of people how do you get in the security field? I used to say a lot of hard work and a lot of luck. My new answer is going to be to read this book and see if you are interested in the field. The book covers a wide variety of subjects across all of information security that are really quite useful. Some of these areas you won't learn a lot if you are in that particular field, but even if you are in security I am sure you will learn a lot. I learned quite a bit on the sections on metrics and software security. This is a great book to have to be able to lend to people with an interest in entering the field.
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 A solid set of case histories and examples of how to build better security measures 19 août 2009
Par Midwest Book Review - Publié sur Amazon.com
Format:Broché
BEAUTIFUL SECURITY: LEADING SECURITY EXPERTS EXPLAIN HOW THEY THINK provides a collection of essays on digital security and comes from experts who explain how social networking and other popular trends hurt online security efforts - and how to design new networks around these trends. Analysis of criminal attempts and logic patterns offer network security libraries a solid set of case histories and examples of how to build better security measures. Highly recommended.
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Well-written with broad coverage of a critical topic 17 juillet 2009
Par James Holmes - Publié sur Amazon.com
Format:Broché
Like O'Reilly's Beautiful Teams, this book's a series of essays by industry experts, this time focused on security. The various authors do a great job of covering topics from social engineering to forcing firms to focus on security. The chapters are all well-written, although a few do better jobs of keeping the material interesting and flowing.

You'll find plenty of security-related history in the book. Phil Zimmerman's chapter on PGP's Web Of Trust is one example. Pieter Zatko's discussion of his work on the LH0phtCrack is another. Both stories help expose mindsets which, sadly, haven't changed a whole lot.

Security, as with testing or overall quality, is at its most fundamental roots a culture issue. Not every story focuses on this aspect, but pointing out bad culture is a common theme through many of the chapters. Zatko's discussion of "Learned Helplessness," John McManus's Security by Design, and Jim Routh's Forcing Firms to Focus are all great reads on this line. Many of the stories correctly emphasize that security isn't just about someone hacking code - it's a much broader issue.

As with any good security book, there's plenty of well-done content which will likely scare you in to re-thinking how you and your company approach security. Beautiful Security can help you identify practices, problems, and mindsets which leave you, your company, or your clients at risk.

Overall it's a very useful, highly readable book on a critical subject.
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique