Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
75
4
Ho w Se c u r i t y cH a n g e d
Po S t 2000
In the introduction and also the previous two chapters I have written
briey regarding changes in security over the past decade and more,
I have introduced the security professionals involved: the Hacker and
the Hacker’s successor—the CASE.
To better understand the problems in modern information security
risk management, we need to understand how and why the problems
were introduced. Back in the pre-2000s Hacker era, security was
very far from perfect, but the changes that took place roughly from
2002 onward certainly did not lead to improvements; instead, things
seemed to get worse, with organizations spending increasingly more
on security products and personnel, with little or no return. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355