Information Security
Introduction
There is a wise saying in Tibet: “As a thing is viewed, so it appears.”
This is true of anything and everything. And it is an exhortation to intellectual honesty. Unless you can look beyond your own biases, they warp your perceptions. Indeed, unless you can achieve some clarity beyond your personal biases, they will defeat themselves in the pursuit of their primary purposes—your own best interests.
As information security is viewed, so it appears.
To a policy wonk, it may look like a robust body of well-crafted, well-calibrated policies and standards. To a technologist, it may look like an intricate web of sophisticated programs, schemes, and devices—trip wires, honey pots, firewalls, intrusion detection, ...
Get Secrets Stolen, Fortunes Lost now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.