Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
193
8
Th e Lo v e o f CL o u d s
a n d In C I d e n T s —Th e va I n
se a r C h f o r va L I d a T I o n
So far in this book, I have lamented on the state of information secu-
rity oerings in the commercial world. I have commented heavily on
the deployment of inappropriate skills in the industry, and from this,
one can derive a host of problems that lead to other problems, which
leads us to a conclusion: the majority of corporate networks are wide-
open to attack, and chief executive ocers (CEOs) have never been
well-advised in security.
I commented in Chapter 3 about how the skill sets of security ana-
lysts have been reduced down to the level of parrot-fashion recital
of checklists of security standards and so-called best practices— ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355