Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
v
Contents
Pr e f a c e ix
a
c k n o w l e d g m e n t s xvii
I
n t r o d u c t I o n xix
a
u t h o r xxxvii
1se c t I o n Pe o P l e a n d Bl a m e
1ch a P t e r wh o m do Yo u Bl a m e ? 3
e Buck Stops at the Top? 3
Managers and eir Loyal Secretaries 5
Information Security Spending—Driving Factors in the Wild 7
Do Top-Level Managers Care about Information Security? 10
Ignoring the Signs 12
Summary 14
2c
h a P t e r th e ha c k e r s 17
Hat Colors and Ethics 17
“Hacker” Dened 20
Zen and the Art of Remote Assessment 25
e Hacker through the Looking Glass 29
Communication, Hyper-Casual Fridays, and “Maturity” 35
Hacker Cries Wolf 38
Unmuzzled Hackers and Facebook 40
Summary 42
3c
h a P t e r ch e c k l I s t s a n d st a n d a
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355