Ten Laws for Security
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protecti...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Diehl, Eric (Autor) |
Autor Corporativo: | SpringerLink (Online service) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Cham :
Springer International Publishing : Imprint: Springer,
2016.
|
Edición: | 1st ed. 2016. |
Temas: | |
Acceso en línea: | Texto Completo |
Ejemplares similares
-
The Hash Function BLAKE
por: Aumasson, Jean-Philippe, et al.
Publicado: (2014) -
Cryptography and Information Security in the Balkans Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers /
Publicado: (2016) -
Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers /
Publicado: (2015) -
New Approaches for Security, Privacy and Trust in Complex Environments Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa /
Publicado: (2007) -
Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013, Proceedings /
Publicado: (2013)