Get Free Shipping on orders over $79
Beautiful Security : Leading Security Experts Explain How They Think - Andy Oram

Beautiful Security

Leading Security Experts Explain How They Think

By: Andy Oram, John Viega

eText | 17 April 2009 | Edition Number 1

At a Glance

eText


$40.69

or 4 interest-free payments of $10.17 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same.

Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include:

  • The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their prey
  • How social networking, cloud computing, and other popular trends help or hurt our online security
  • How metrics, requirements gathering, design, and law can take security to a higher level
  • The real, little-publicized history of PGP

This book includes contributions from:

  • Peiter "Mudge" Zatko
  • Jim Stickley
  • Elizabeth Nichols
  • Chenxi Wang
  • Ed Bellis
  • Ben Edelman
  • Phil Zimmermann and Jon Callas
  • Kathy Wang
  • Mark Curphey
  • John McManus
  • James Routh
  • Randy V. Sabett
  • Anton Chuvakin
  • Grant Geyer and Brian Dunphy
  • Peter Wayner
  • Michael Wood and Fernando Francisco

All royalties will be donated to the Internet Engineering Task Force (IETF).

on
Desktop
Tablet
Mobile

More in Data Encryption