Beautiful Security

Author:   Andy Oram ,  John Viega
Publisher:   O'Reilly Media
ISBN:  

9780596527488


Pages:   300
Publication Date:   02 June 2009
Format:   Paperback
Availability:   Awaiting stock   Availability explained
The supplier is currently out of stock of this item. It will be ordered for you and placed on backorder. Once it does come back in stock, we will ship it out for you.

Our Price $105.57 Quantity:  
Add to Cart

Share |

Beautiful Security


Add your own review!

Overview

Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same. Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include: * The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their prey * How social networking, cloud computing, and other popular trends help or hurt our online security * How metrics, requirements gathering, design, and law can take security to a higher level * The real, little-publicized history of PGP This book includes contributions from: * Peiter ""Mudge"" Zatko * Jim Stickley * Elizabeth Nichols * Chenxi Wang * Ed Bellis * Ben Edelman * Phil Zimmermann and Jon Callas * Kathy Wang * Mark Curphey * John McManus * James Routh * Randy V. Sabett * Anton Chuvakin * Grant Geyer and Brian Dunphy * Peter Wayner * Michael Wood and Fernando Francisco All royalties will be donated to the Internet Engineering Task Force (IETF). ""

Full Product Details

Author:   Andy Oram ,  John Viega
Publisher:   O'Reilly Media
Imprint:   O'Reilly Media
Dimensions:   Width: 18.00cm , Height: 1.50cm , Length: 23.20cm
Weight:   0.566kg
ISBN:  

9780596527488


ISBN 10:   0596527489
Pages:   300
Publication Date:   02 June 2009
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Awaiting stock   Availability explained
The supplier is currently out of stock of this item. It will be ordered for you and placed on backorder. Once it does come back in stock, we will ship it out for you.

Table of Contents

Reviews

Author Information

Andy Oram is an editor at O'Reilly Media, which is a highly respected book publisher and technology information provider. An employee of the company since 1992, Andy currently specializes in free software and open source technologies. His work for O'Reilly includes the first books ever published commercially in the United States on Linux, and the 2001 title Peer-to-Peer. His modest programming and system administration skills are mostly self-taught. Andy is also a member of Computer Professionals for Social Responsibility and writes often for the O'Reilly Network and other publications. Topics include policy issues related to the Internet and trends affecting technical innovation and its effects on society. His web site is www.praxagora.com/andyo. Andy works at the O'Reilly office in Cambridge, Massachusetts and lives nearby with his wife, two children, and a six-foot grand piano that can often be heard late at night. John is CTO of the SaaS Business Unit at McAfee, his second stint at McAfee. Previously, he was their Chief Security Architect, after which he founded and served as CEO of Stonewall Software, which focused on making anti-virus technology faster, better and cheaper. John was also the founder of Secure Software (now part of Fortify). John is author of many security books, including Building Secure Software (Addison-Wesley), Network Security with OpenSSL (O'Reilly), and the forthcoming Myths of Security (O'Reilly). He is responsible for numerous software security tools and is the original author of Mailman, the GNU mailing list manager. He has done extensive standards work in the IEEE and IETF and co-invented GCM, a cryptographic algorithm that NIST has standardized. John is also an active advisor to several security companies, including Fortify and Bit9. He holds a MS and BA from the University of Virginia.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List