Security De-Engineering

Book description


As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in information security. Providing a simple foundational remedy for our security ills, Security De-Engineering: Solving the Problems in Information Risk Management is a definitive guide to the current problems i

Table of contents

  1. Front Cover
  2. Contents
  3. Preface (1/2)
  4. Preface (2/2)
  5. Acknowledgments
  6. Introduction (1/4)
  7. Introduction (2/4)
  8. Introduction (3/4)
  9. Introduction (4/4)
  10. Author
  11. SectIon 1: People and Blame
    1. Chapter 1: Whom Do You Blame? (1/3)
    2. Chapter 1: Whom Do You Blame? (2/3)
    3. Chapter 1: Whom Do You Blame? (3/3)
    4. Chapter 2: The Hackers (1/6)
    5. Chapter 2: The Hackers (2/6)
    6. Chapter 2: The Hackers (3/6)
    7. Chapter 2: The Hackers (4/6)
    8. Chapter 2: The Hackers (5/6)
    9. Chapter 2: The Hackers (6/6)
    10. Chapter 3: Checklists and Standards Evangelists (1/6)
    11. Chapter 3: Checklists and Standards Evangelists (2/6)
    12. Chapter 3: Checklists and Standards Evangelists (3/6)
    13. Chapter 3: Checklists and Standards Evangelists (4/6)
    14. Chapter 3: Checklists and Standards Evangelists (5/6)
    15. Chapter 3: Checklists and Standards Evangelists (6/6)
  12. SectIon 2: The De-EngIneering of Security
    1. Chapter 4: How Security Changed Post 2000 (1/8)
    2. Chapter 4: How Security Changed Post 2000 (2/8)
    3. Chapter 4: How Security Changed Post 2000 (3/8)
    4. Chapter 4: How Security Changed Post 2000 (4/8)
    5. Chapter 4: How Security Changed Post 2000 (5/8)
    6. Chapter 4: How Security Changed Post 2000 (6/8)
    7. Chapter 4: How Security Changed Post 2000 (7/8)
    8. Chapter 4: How Security Changed Post 2000 (8/8)
    9. Chapter 5: Automated Vulnerability Scanners (1/7)
    10. Chapter 5: Automated Vulnerability Scanners (2/7)
    11. Chapter 5: Automated Vulnerability Scanners (3/7)
    12. Chapter 5: Automated Vulnerability Scanners (4/7)
    13. Chapter 5: Automated Vulnerability Scanners (5/7)
    14. Chapter 5: Automated Vulnerability Scanners (6/7)
    15. Chapter 5: Automated Vulnerability Scanners (7/7)
    16. Chapter 6: The Eternal Yawn: Careers in Information Security (1/6)
    17. Chapter 6: The Eternal Yawn: Careers in Information Security (2/6)
    18. Chapter 6: The Eternal Yawn: Careers in Information Security (3/6)
    19. Chapter 6: The Eternal Yawn: Careers in Information Security (4/6)
    20. Chapter 6: The Eternal Yawn: Careers in Information Security (5/6)
    21. Chapter 6: The Eternal Yawn: Careers in Information Security (6/6)
    22. Chapter 7: Penetration testing—Old and New (1/5)
    23. Chapter 7: Penetration testing—Old and New (2/5)
    24. Chapter 7: Penetration testing—Old and New (3/5)
    25. Chapter 7: Penetration testing—Old and New (4/5)
    26. Chapter 7: Penetration testing—Old and New (5/5)
    27. Chapter 8: The Love of Clouds and Incidents—The vain search for validation (1/4)
    28. Chapter 8: The Love of Clouds and Incidents—The vain search for validation (2/4)
    29. Chapter 8: The Love of Clouds and Incidents—The vain search for validation (3/4)
    30. Chapter 8: The Love of Clouds and Incidents—The vain search for validation (4/4)
  13. SectIon 3: Security Products
    1. Chapter 9: Intrusion Detection (1/3)
    2. Chapter 9: Intrusion Detection (2/3)
    3. Chapter 9: Intrusion Detection (3/3)
    4. Chapter 10: Other Products (1/5)
    5. Chapter 10: Other Products (2/5)
    6. Chapter 10: Other Products (3/5)
    7. Chapter 10: Other Products (4/5)
    8. Chapter 10: Other Products (5/5)
  14. SectIon 4: The Re-Engineering of Security
    1. Chapter 11: One Professional accreditation Program to Bind Them All (1/7)
    2. Chapter 11: One Professional accreditation Program to Bind Them All (2/7)
    3. Chapter 11: One Professional accreditation Program to Bind Them All (3/7)
    4. Chapter 11: One Professional accreditation Program to Bind Them All (4/7)
    5. Chapter 11: One Professional accreditation Program to Bind Them All (5/7)
    6. Chapter 11: One Professional accreditation Program to Bind Them All (6/7)
    7. Chapter 11: One Professional accreditation Program to Bind Them All (7/7)

Product information

  • Title: Security De-Engineering
  • Author(s): Ian Tibble
  • Release date: December 2011
  • Publisher(s): Auerbach Publications
  • ISBN: 9781439868355