Book description
With organizations facing growing security challenges from both automated and manual attacks, these incidents now represent more of a threat to the bottom line than ever before. This book explains the problems in corporate information security and how to solve them. Based on more than a decade of global experience, the author explains how the industry has faltered and how a gradual decline in analytical skills has led the corporate world on a disastrous collision course with automated malware attacks and manual intrusions.
Table of contents
- Front Cover
- Contents
- Preface (1/2)
- Preface (2/2)
- Acknowledgments
- Introduction (1/4)
- Introduction (2/4)
- Introduction (3/4)
- Introduction (4/4)
- Author
-
SectIon 1: People and Blame
- Chapter 1: Whom Do You Blame? (1/3)
- Chapter 1: Whom Do You Blame? (2/3)
- Chapter 1: Whom Do You Blame? (3/3)
- Chapter 2: The Hackers (1/6)
- Chapter 2: The Hackers (2/6)
- Chapter 2: The Hackers (3/6)
- Chapter 2: The Hackers (4/6)
- Chapter 2: The Hackers (5/6)
- Chapter 2: The Hackers (6/6)
- Chapter 3: Checklists and Standards Evangelists (1/6)
- Chapter 3: Checklists and Standards Evangelists (2/6)
- Chapter 3: Checklists and Standards Evangelists (3/6)
- Chapter 3: Checklists and Standards Evangelists (4/6)
- Chapter 3: Checklists and Standards Evangelists (5/6)
- Chapter 3: Checklists and Standards Evangelists (6/6)
-
SectIon 2: The De-EngIneering of Security
- Chapter 4: How Security Changed Post 2000 (1/8)
- Chapter 4: How Security Changed Post 2000 (2/8)
- Chapter 4: How Security Changed Post 2000 (3/8)
- Chapter 4: How Security Changed Post 2000 (4/8)
- Chapter 4: How Security Changed Post 2000 (5/8)
- Chapter 4: How Security Changed Post 2000 (6/8)
- Chapter 4: How Security Changed Post 2000 (7/8)
- Chapter 4: How Security Changed Post 2000 (8/8)
- Chapter 5: Automated Vulnerability Scanners (1/7)
- Chapter 5: Automated Vulnerability Scanners (2/7)
- Chapter 5: Automated Vulnerability Scanners (3/7)
- Chapter 5: Automated Vulnerability Scanners (4/7)
- Chapter 5: Automated Vulnerability Scanners (5/7)
- Chapter 5: Automated Vulnerability Scanners (6/7)
- Chapter 5: Automated Vulnerability Scanners (7/7)
- Chapter 6: The Eternal Yawn: Careers in Information Security (1/6)
- Chapter 6: The Eternal Yawn: Careers in Information Security (2/6)
- Chapter 6: The Eternal Yawn: Careers in Information Security (3/6)
- Chapter 6: The Eternal Yawn: Careers in Information Security (4/6)
- Chapter 6: The Eternal Yawn: Careers in Information Security (5/6)
- Chapter 6: The Eternal Yawn: Careers in Information Security (6/6)
- Chapter 7: Penetration testing—Old and New (1/5)
- Chapter 7: Penetration testing—Old and New (2/5)
- Chapter 7: Penetration testing—Old and New (3/5)
- Chapter 7: Penetration testing—Old and New (4/5)
- Chapter 7: Penetration testing—Old and New (5/5)
- Chapter 8: The Love of Clouds and Incidents—The vain search for validation (1/4)
- Chapter 8: The Love of Clouds and Incidents—The vain search for validation (2/4)
- Chapter 8: The Love of Clouds and Incidents—The vain search for validation (3/4)
- Chapter 8: The Love of Clouds and Incidents—The vain search for validation (4/4)
- SectIon 3: Security Products
-
SectIon 4: The Re-Engineering of Security
- Chapter 11: One Professional accreditation Program to Bind Them All (1/7)
- Chapter 11: One Professional accreditation Program to Bind Them All (2/7)
- Chapter 11: One Professional accreditation Program to Bind Them All (3/7)
- Chapter 11: One Professional accreditation Program to Bind Them All (4/7)
- Chapter 11: One Professional accreditation Program to Bind Them All (5/7)
- Chapter 11: One Professional accreditation Program to Bind Them All (6/7)
- Chapter 11: One Professional accreditation Program to Bind Them All (7/7)
Product information
- Title: Security De-Engineering
- Author(s):
- Release date: December 2011
- Publisher(s): Auerbach Publications
- ISBN: 9781439868355
You might also like
book
Shields Up
The demand for cybersecurity expertise is growing phenomenally; enhancing cybersecurity project skills will boost technology professionals’ …
book
Inside Photoshop® CS
Gary Bouton has made Inside Photoshop CS a perennial best-seller due to the loyalty of his …
book
Lotus LearningSpace R5.01 Deployment Guide
This IBM Redbooks publication describes Lotus LearningSpace R5 in detail. LearningSpace is a framework for managing …
book
SECUR Exam Cram™ 2 (Exam 642-501)
Your resource to passing the Cisco CCSP SECUR Certification Exam! Join the ranks of readers who …