000 | 03029cam a2200445 i 4500 | ||
---|---|---|---|
999 |
_c200436340 _d54552 |
||
001 | 200436340 | ||
003 | TR-AnTOB | ||
005 | 20200402153421.0 | ||
007 | ta | ||
008 | 080411t20092009enka b 001 0 eng | ||
010 | _a2010275793 | ||
020 | _a9780596527488 (pbk.) | ||
020 | _a0596527489 (pbk.) | ||
035 | _a(OCoLC)150370629 | ||
035 | _a(TR-AnTOB(200436340 | ||
040 |
_aUKM _beng _erda _cUKM _dBTCTA _dBAKER _dYDXCP _dBWX _dCDX _dTXA _dCOO _dVP@ _dYBM _dPGC _dSEO _dDLC _dCS1 _dTR-AnTOB |
||
041 | 0 | _aeng | |
042 | _apcc | ||
050 | 4 |
_aTK5105.59 _b.B423 2009 |
|
090 |
_aTK5105.59 _b.B423 2009 |
||
245 | 0 | 0 |
_aBeautiful security / _cedited by Andy Oram and John Viega |
246 | 1 |
_iCover subtitle : _aLeading security experts explain how they think |
|
250 | _aFirst edition. | ||
264 | 1 |
_aSebastopol, CA : _aFarnham : _bO'Reilly, _c2009. |
|
264 | 4 | _c©2009 | |
300 |
_axv, 281 pages : _billustrations ; _c23 cm |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_2rdacarrier _avolume _bnc |
||
490 | 0 | _aTheory in practice | |
504 | _aIncludes bibliographical references and index | ||
505 | 0 | 0 |
_tPsychological security traps / _rPeiter "Mudge" Zatko -- _tWireless networking : fertile ground for social engineering / _rJim Stickley -- _tBeautiful security metrics / _rElizabeth A. Nichols -- _tThe underground economy of security breaches / _rChenxi Wang -- _tBeautiful trade : rethinking E-commerce security / _rEd Bellis -- _tSecuring online advertising : rustlers and sheriffs in the new wild west / _rBenjamin Edelman -- _tThe evolution of PGP's Web of Trust / _rPhil Zimmermann and Jon Callas -- _tOpen source honeyclient : proactive detection of client-side exploits / _rKathy Wang -- _tTomorrow's security cogs and levers / _rMark Curphey -- _tSecurity by design / _rJohn McManus -- _tForcing firms to focus : is secure software in your future? / _rJim Routh -- _tOh no, here come the infosecurity lawyers! / _rRandy V. Sabett -- _tBeautiful log handling / _rAnton Chuvakin -- _tIncident detection : finding the other 68% / _rGrant Geyer and Brian Dunphy -- _tDoing real work without real data / _rPeter Wayner -- _tCasting spells : PC security theater / _rMichael Wood and Fernando Francisco |
520 | _aLeaders in the field of security describe bold and extraordinary projects in securing computer systems. This book is a diverse and though-provoking anthology, like Beautiful Code, that shows the state of a major field through stories and insightful analyses. The authors describe how they arrived at unusual solutions to problems such as writing secure code, designing applications securely, and dealing with modern challenges such as wireless security and Internet challenges. This book will make security a cool topic and get people talking | ||
590 | _aDonated by Kemal Bıçakcı | ||
650 | 0 |
_aComputer networks _xSecurity measures _947 |
|
700 | 1 |
_aOram, Andrew _eeditor _921447 |
|
700 | 1 |
_aViega, John _eeditor _921484 |
|
942 |
_2lcc _cBK |