000 03029cam a2200445 i 4500
999 _c200436340
_d54552
001 200436340
003 TR-AnTOB
005 20200402153421.0
007 ta
008 080411t20092009enka b 001 0 eng
010 _a2010275793
020 _a9780596527488 (pbk.)
020 _a0596527489 (pbk.)
035 _a(OCoLC)150370629
035 _a(TR-AnTOB(200436340
040 _aUKM
_beng
_erda
_cUKM
_dBTCTA
_dBAKER
_dYDXCP
_dBWX
_dCDX
_dTXA
_dCOO
_dVP@
_dYBM
_dPGC
_dSEO
_dDLC
_dCS1
_dTR-AnTOB
041 0 _aeng
042 _apcc
050 4 _aTK5105.59
_b.B423 2009
090 _aTK5105.59
_b.B423 2009
245 0 0 _aBeautiful security /
_cedited by Andy Oram and John Viega
246 1 _iCover subtitle :
_aLeading security experts explain how they think
250 _aFirst edition.
264 1 _aSebastopol, CA :
_aFarnham :
_bO'Reilly,
_c2009.
264 4 _c©2009
300 _axv, 281 pages :
_billustrations ;
_c23 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _2rdacarrier
_avolume
_bnc
490 0 _aTheory in practice
504 _aIncludes bibliographical references and index
505 0 0 _tPsychological security traps /
_rPeiter "Mudge" Zatko --
_tWireless networking : fertile ground for social engineering /
_rJim Stickley --
_tBeautiful security metrics /
_rElizabeth A. Nichols --
_tThe underground economy of security breaches /
_rChenxi Wang --
_tBeautiful trade : rethinking E-commerce security /
_rEd Bellis --
_tSecuring online advertising : rustlers and sheriffs in the new wild west /
_rBenjamin Edelman --
_tThe evolution of PGP's Web of Trust /
_rPhil Zimmermann and Jon Callas --
_tOpen source honeyclient : proactive detection of client-side exploits /
_rKathy Wang --
_tTomorrow's security cogs and levers /
_rMark Curphey --
_tSecurity by design /
_rJohn McManus --
_tForcing firms to focus : is secure software in your future? /
_rJim Routh --
_tOh no, here come the infosecurity lawyers! /
_rRandy V. Sabett --
_tBeautiful log handling /
_rAnton Chuvakin --
_tIncident detection : finding the other 68% /
_rGrant Geyer and Brian Dunphy --
_tDoing real work without real data /
_rPeter Wayner --
_tCasting spells : PC security theater /
_rMichael Wood and Fernando Francisco
520 _aLeaders in the field of security describe bold and extraordinary projects in securing computer systems. This book is a diverse and though-provoking anthology, like Beautiful Code, that shows the state of a major field through stories and insightful analyses. The authors describe how they arrived at unusual solutions to problems such as writing secure code, designing applications securely, and dealing with modern challenges such as wireless security and Internet challenges. This book will make security a cool topic and get people talking
590 _aDonated by Kemal Bıçakcı
650 0 _aComputer networks
_xSecurity measures
_947
700 1 _aOram, Andrew
_eeditor
_921447
700 1 _aViega, John
_eeditor
_921484
942 _2lcc
_cBK