Book description
As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in information security. Providing a simple foundational remedy for our security ills, Security De-Engineering: Solving the Problems in Information Risk Management is a definitive guide to the current problems i
Table of contents
- Front Cover
- Contents
- Preface (1/2)
- Preface (2/2)
- Acknowledgments
- Introduction (1/4)
- Introduction (2/4)
- Introduction (3/4)
- Introduction (4/4)
- Author
-
SectIon 1: People and Blame
- Chapter 1: Whom Do You Blame? (1/3)
- Chapter 1: Whom Do You Blame? (2/3)
- Chapter 1: Whom Do You Blame? (3/3)
- Chapter 2: The Hackers (1/6)
- Chapter 2: The Hackers (2/6)
- Chapter 2: The Hackers (3/6)
- Chapter 2: The Hackers (4/6)
- Chapter 2: The Hackers (5/6)
- Chapter 2: The Hackers (6/6)
- Chapter 3: Checklists and Standards Evangelists (1/6)
- Chapter 3: Checklists and Standards Evangelists (2/6)
- Chapter 3: Checklists and Standards Evangelists (3/6)
- Chapter 3: Checklists and Standards Evangelists (4/6)
- Chapter 3: Checklists and Standards Evangelists (5/6)
- Chapter 3: Checklists and Standards Evangelists (6/6)
-
SectIon 2: The De-EngIneering of Security
- Chapter 4: How Security Changed Post 2000 (1/8)
- Chapter 4: How Security Changed Post 2000 (2/8)
- Chapter 4: How Security Changed Post 2000 (3/8)
- Chapter 4: How Security Changed Post 2000 (4/8)
- Chapter 4: How Security Changed Post 2000 (5/8)
- Chapter 4: How Security Changed Post 2000 (6/8)
- Chapter 4: How Security Changed Post 2000 (7/8)
- Chapter 4: How Security Changed Post 2000 (8/8)
- Chapter 5: Automated Vulnerability Scanners (1/7)
- Chapter 5: Automated Vulnerability Scanners (2/7)
- Chapter 5: Automated Vulnerability Scanners (3/7)
- Chapter 5: Automated Vulnerability Scanners (4/7)
- Chapter 5: Automated Vulnerability Scanners (5/7)
- Chapter 5: Automated Vulnerability Scanners (6/7)
- Chapter 5: Automated Vulnerability Scanners (7/7)
- Chapter 6: The Eternal Yawn: Careers in Information Security (1/6)
- Chapter 6: The Eternal Yawn: Careers in Information Security (2/6)
- Chapter 6: The Eternal Yawn: Careers in Information Security (3/6)
- Chapter 6: The Eternal Yawn: Careers in Information Security (4/6)
- Chapter 6: The Eternal Yawn: Careers in Information Security (5/6)
- Chapter 6: The Eternal Yawn: Careers in Information Security (6/6)
- Chapter 7: Penetration testingâOld and New (1/5)
- Chapter 7: Penetration testingâOld and New (2/5)
- Chapter 7: Penetration testingâOld and New (3/5)
- Chapter 7: Penetration testingâOld and New (4/5)
- Chapter 7: Penetration testingâOld and New (5/5)
- Chapter 8: The Love of Clouds and IncidentsâThe vain search for validation (1/4)
- Chapter 8: The Love of Clouds and IncidentsâThe vain search for validation (2/4)
- Chapter 8: The Love of Clouds and IncidentsâThe vain search for validation (3/4)
- Chapter 8: The Love of Clouds and IncidentsâThe vain search for validation (4/4)
- SectIon 3: Security Products
-
SectIon 4: The Re-Engineering of Security
- Chapter 11: One Professional accreditation Program to Bind Them All (1/7)
- Chapter 11: One Professional accreditation Program to Bind Them All (2/7)
- Chapter 11: One Professional accreditation Program to Bind Them All (3/7)
- Chapter 11: One Professional accreditation Program to Bind Them All (4/7)
- Chapter 11: One Professional accreditation Program to Bind Them All (5/7)
- Chapter 11: One Professional accreditation Program to Bind Them All (6/7)
- Chapter 11: One Professional accreditation Program to Bind Them All (7/7)
Product information
- Title: Security De-Engineering
- Author(s):
- Release date: December 2011
- Publisher(s): Auerbach Publications
- ISBN: 9781439868355
You might also like
book
Threat Modeling: Designing for Security
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of …
book
Information Risk Management: A practitioner’s guide
Increasingly, organisations rely on information for their day-to-day operations, and the loss or unavailability of information …
book
The GuruBook
The GuruBook is an inspiring collection of 45 articles and interviews with well-known thought leaders and …
book
IT Auditing Using Controls to Protect Information Assets, Third Edition, 3rd Edition
Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and …