• Tous les prix incluent la TVA.
Il ne reste plus que 3 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
+ EUR 2,99 (livraison en France métropolitaine)
D'occasion: Bon | Détails
État: D'occasion: Bon
Commentaire: Buy with confidence. Excellent Customer Service & Return policy.Ships from USA. Please give between 2-5 week for delivery. 24*7 Customer Service.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Beautiful Security (Anglais) Broché – 12 mai 2009

4,7 étoiles sur 5
5 étoiles
9
4 étoiles
3
3 étoiles
0
2 étoiles
0
1 étoile
0
4,7 étoiles sur 5 12 commentaires client

Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Broché
"Veuillez réessayer"
EUR 38,50
EUR 25,76 EUR 18,69
Note: Cet article est éligible à la livraison en points de collecte. Détails
Récupérer votre colis où vous voulez quand vous voulez.
  • Choisissez parmi 17 000 points de collecte en France
  • Les membres du programme Amazon Premium bénéficient de livraison gratuites illimitées
Comment commander vers un point de collecte ?
  1. Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
  2. Sélectionnez cette adresse lors de votre commande
Plus d’informations
click to open popover

Offres spéciales et liens associés


Descriptions du produit

Beautiful Security An anthology that describes methods used to secure computer systems in the face of threats. It covers topics that include: rewiring the expectations and assumptions of organizations regarding security; security as a design requirement; evolution and new projects in Web of Trust; and, legal sanctions to enforce security precautions. Full description

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.



Détails sur le produit

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 4.7 étoiles sur 5 12 commentaires
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Content is "Timeless" 20 février 2017
Par David W. Rooker - Publié sur Amazon.com
Format: Broché Achat vérifié
Excellent book, I have bought a couple dozen of these to hand out to my team and peers. Even though it is several years old ... its content is timeless!
2 internautes sur 2 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Great book to give someone interested in getting in the security field 9 avril 2010
Par Daniel D. Lohin - Publié sur Amazon.com
Format: Broché Achat vérifié
Recently I have been asked by a lot of people how do you get in the security field? I used to say a lot of hard work and a lot of luck. My new answer is going to be to read this book and see if you are interested in the field. The book covers a wide variety of subjects across all of information security that are really quite useful. Some of these areas you won't learn a lot if you are in that particular field, but even if you are in security I am sure you will learn a lot. I learned quite a bit on the sections on metrics and software security. This is a great book to have to be able to lend to people with an interest in entering the field.
1 internautes sur 1 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Great insight from security minds 4 décembre 2012
Par Ronda M - Publié sur Amazon.com
Format: Broché Achat vérifié
I am about half way through the book and I am impressed at the content. The experts all provide knowledge from their experience in infosec to make a great combination. I reccomend this book to those who are interested in a career in IT security as well as those who are already established in IT. Security is an unavoidable part of our lives and work.
23 internautes sur 24 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Security: Bureaucratic drudgery or exciting career? 29 juin 2009
Par Allen Stenger - Publié sur Amazon.com
Format: Broché
This collection of essays is a very clearly written introduction to a number of current topics and techniques in computer security. It is not a how-to book, but it includes several case studies and gives you a good idea of what is happening in the field. For the most part the book does not assume prior knowledge in the field, although occasionally a bit of hacker or security jargon is used without being defined.

For me the most interesting chapters were the one with case studies. In this book you will learn how to steal people's credit card numbers at airports (run a cut-rate WiFi access point), how to scan for malicious websites without getting infected (harder than it looks, and a constant battle of measures and countermeasures), and the true history of Pretty Good Privacy, as told by its inventor, Phil Zimmermann (not as lurid as the versions you have probably heard, but still full of twists and turns). You'll learn the going rates for stolen personal and financial information (not that much, so if you're going to steal it, you need to steal a lot) and how to run your own cyber money-laundering network (which seems to be where most of the money and the risk is). Microsoft plays a prominent role in the book, sometimes as hero, sometimes as chump.

The layout and production of the book are very good, and it has a good index (a glossary would have been nice, too). I have a couple of minor gripes: the book is set in itty-bitty type (I measured it at 8 points on 12 point line spacing); and although the book has two editors, the preface is written in the first person singular (apparently by Oram, but this is not stated).

The book's title, "Beautiful Security", was probably modeled on Oram's previous collection Beautiful Code: Leading Programmers Explain How They Think (Theory in Practice (O'Reilly)), but it doesn't really fit the content of this book. Some of the essays mention beauty in the body or the title, but this is usually a token appearance, or is explained as meaning that security should be built in rather than tacked on. The preface states that the purpose of the book is to convince the reader that security is not bureaucratic drudgery but is an exciting career, and I think the book is successful at this.
4.0 étoiles sur 5 This is what computer's security looks like 30 mai 2011
Par Bruno Vernay - Publié sur Amazon.com
Format: Broché
I like computer security: it is always entertaining and insightful. This book is no exception. It offers a large panorama on Security, as seen from many point of view since this is a collective work.

Advantages:
- You see the subject from different angles
- One or two author maybe boring, the overall content still has value
- It is more like reading many little books on security.
On the other hand:
- You get many introduction and conclusions, that doesn't add much.
- There is no real continuity nor overall aim or message. It is more a collection of essays arranged and formated to look like a "one story".

Some essays are really insightful:
- "Psychological security trap": Is certainly something that you want to be aware of! How developers may think that security isn't a real requirement. It is somehow also the point in "security by design" and "Forcing firms to focus", but with an emphasis on project management and process.
- Security Metrics is also interesting. It resurfaces in many others essays, mostly to warn about the wrong usage of metrics or the usage of wrong metrics.
- The evolution of PGP is nice. It shows how far they have gone with PKI. Now it really looks like a good solution. But as with the Semantic Web, I would say that it is still waiting wide adoption to be useful.
- "Oh no, here comes the Lawyer" should have been even more developed. This is where I feel I lack the most insight.
- Incident detection: This is well known today. But always good to repeat. This is concrete stuff and where we can expect improvement soon.
- "Doing real work without real data" exposes a nice idea. Worth to implement if it fits your use case. There are good references to balance pro and cons.
- Casting spells also exposes a vendor solution. It uses a combination of technics (virtualization, signature + AI) to secure the user's workstation. Again, it may fit some use case.
- Log handling is also certainly a crucial part of the puzzle.
- ... others essays exposes security breaches, Honeyclient, adventures in wireless land ...

The essays target an average reader. It doesn't require any knowledge in programming, cryptography or Network protocols. Still, it will certainly help to have some culture in software development. It raises awarness in many differents aspect related to security.

At first, I really liked the introduction in the book: The idea that too often security is seen from the point of view of the failures, like you look for a car race only waiting to see car crashes. The promise here was to focus on how a good design is as beautiful and enjoyable as a car crash. Well the content shows that it isn't that easy. I guess that it would have been a book on protocol design and application architecture. Subjects much harder to enjoy. Still the intent was good.
To conclude, I would say that this book is what computer's security looks like after all: there is no coherent story. But if you have to write your own security story, you will be better of knowing 16 different essays than a single one.
Ces commentaires ont-ils été utiles ? Dites-le-nous

Où en sont vos commandes ?

Livraison et retours

Besoin d'aide ?