Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
IntroductIon xxix
second wave was more “mature,” took the International Information
Systems Security Certication Consortium Certied Information
Systems Security Professional [(ISC)
2
CISSP] exam, “looked the
part” (they wore shirts and neckties), sounded the part (they used
buzzwords), and was more aesthetically pleasing to senior manage-
ment. But the second wave took on a pale complexion and started
sweating at the mention of terms such as TCP/IP or “false positive.”
One factor stayed common through these formative years in secu-
rity up until today: senior managers were never well advised in security.
e major theme of Security De-Engineering is how most of our
problems today are borne from a distancing of security professionals
from the ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355