Cargando…

Zen and the art of information security /

While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, read...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Winkler, Ira
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, MA : Syngress, ©2007.
©2007
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn182560831
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 071128s2007 maua o 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d OCLCQ  |d OSU  |d IDEBK  |d ZCU  |d E7B  |d OCLCQ  |d EBLCP  |d OCLCO  |d OCLCQ  |d OCLCF  |d OCLCQ  |d OPELS  |d NLGGC  |d OCLCO  |d DEBSZ  |d OCLCO  |d OCLCQ  |d OCLCO  |d UMI  |d OCLCQ  |d LOA  |d JBG  |d DEBBG  |d AGLDB  |d STF  |d MOR  |d PIFAG  |d MERUC  |d OCLCQ  |d OCLCA  |d U3W  |d OCLCA  |d WRM  |d D6H  |d OCLCQ  |d VTS  |d CEF  |d NRAMU  |d ICG  |d OCLCQ  |d INT  |d VT2  |d OCLCQ  |d WYU  |d OCLCQ  |d LEAUB  |d DKC  |d OCLCQ  |d M8D  |d HS0  |d OCLCQ  |d AJS  |d OCLCQ  |d OCLCO  |d ORMDA  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 162131586  |a 226057215  |a 507796680  |a 647671171  |a 856952351  |a 931874013  |a 961626369  |a 962628145  |a 966265259  |a 984806093  |a 988445743  |a 992027739  |a 1037795572  |a 1038662246  |a 1045577622  |a 1055339382  |a 1065085487  |a 1081259508 
020 |a 9780080554747  |q (electronic bk.) 
020 |a 0080554741  |q (electronic bk.) 
020 |a 1597491683 
020 |a 9781597491686 
029 1 |a AU@  |b 000044592320 
029 1 |a AU@  |b 000051560387 
029 1 |a AU@  |b 000051860813 
029 1 |a CHNEW  |b 001007348 
029 1 |a DEBBG  |b BV042314242 
029 1 |a DEBBG  |b BV043044817 
029 1 |a DEBBG  |b BV043968312 
029 1 |a DEBBG  |b BV044128407 
029 1 |a DEBSZ  |b 405305982 
029 1 |a DEBSZ  |b 422161403 
029 1 |a DEBSZ  |b 43046472X 
029 1 |a DEBSZ  |b 485788047 
029 1 |a GBVCP  |b 882748742 
029 1 |a NZ1  |b 11778381 
029 1 |a NZ1  |b 14540453 
029 1 |a NZ1  |b 15177157 
029 1 |a DKDLA  |b 820120-katalog:999911056205765 
035 |a (OCoLC)182560831  |z (OCoLC)162131586  |z (OCoLC)226057215  |z (OCoLC)507796680  |z (OCoLC)647671171  |z (OCoLC)856952351  |z (OCoLC)931874013  |z (OCoLC)961626369  |z (OCoLC)962628145  |z (OCoLC)966265259  |z (OCoLC)984806093  |z (OCoLC)988445743  |z (OCoLC)992027739  |z (OCoLC)1037795572  |z (OCoLC)1038662246  |z (OCoLC)1045577622  |z (OCoLC)1055339382  |z (OCoLC)1065085487  |z (OCoLC)1081259508 
037 |a 140931:141073  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
037 |a 9780080554747  |b O'Reilly Media 
050 4 |a QA76.9.A25  |b W574 2007eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Winkler, Ira. 
245 1 0 |a Zen and the art of information security /  |c Ira Winkler. 
246 1 4 |a Ira Winkler's zen of security 
260 |a Rockland, MA :  |b Syngress,  |c ©2007. 
264 4 |c ©2007 
300 |a 1 online resource (xvii, 158 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
588 0 |a Print version record. 
520 |a While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winklers experiences making security understandable to the business world. Mr. Winkler is one of the most popular and highly rated speakers in the field of security, and lectures to tens of thousands of people a year. Zen and the Art of Information Security is based on one of his most well received international presentations. *Written by an internationally renowned author of "Spies Among Us" who travels the world making security presentations to tens of thousands of people a year * This short and concise book is specifically for the business, consumer, and technical user short on time but looking for the latest information along with reader friendly analogies * Describes the REAL security threats that you have to worry about, and more importantly, what to do about them 
505 0 |a Front Cover; Zen and the Art of Information Security; Copyright Page; Contents; Introduction; Why You Shouldn't Buy This Book; Chapter 1. Zen and the Art of Cybersecurity; Philosophy of Security; Chapter 2. Why l Don't Like the Title of This Book; What Makes a Scientist; Why Some People are Better Scientists; Putting it All Together; Applying Science; Chapter 3. What is Security?; Risk; What is a Security Program?; Optimizing Risk; Consciously Accept Risk; Chapter 4. A Bad Question; Value has Nothing to do With Computers; A Typical Security Budget; Determining A Security Budget 
505 8 |a Multiyear BudgetsRemind the CIO the I means Information; Making Risk a Conscious Decision; Chapter 5. What Makes a Master; Mastering Computer Security; Chapter 6. Knights and Dragons; The FUD Factor; Dragons Forgive Incompetency; Terrorists Really Aren't That Good; The People You Really Have to Worry About; Look for Snakes, Not Dragons; Don't Suffer Death By 1,000 Cuts; Chapter 7. Cyberterrorism is Not Effective; Anthrax vs. Nimda; It is Easier to Blow Things Up; What is a Terrorist?; Chapter 8. Common Sense and Common Knowledge; Wanting Benefit Without the Associated Costs 
505 8 |a Some People Are Just StupidThe Wizard of Oz; Chapter 9. Never Underestimate the Stupidity of a Criminal; There is a Difference Between Being Good and Being Effective; Understanding your Adversary; The Criminal Mindset; Your Kids are Notas Smart as You Think; Chapter 10. Information Security Is INFORMATION Security; Chapter 11. Is Security a Should or a Must?; Management Must Believe Security is a Must; So is Security a Should or a Must For You?; Chapter 12. If You Don't Remember History, You Will Repeat It; Chapter 13. Ira's Golden Rules; Take Responsibility; Decide Security is a Must 
505 8 |a Educate YourselfRemember, You are Protecting Information; Protecting Your Computer; Note on Security Software; The 95/5 Rule; Chapter 14. Chance Favors the Prepared; Ubiquitous Security; The Purpose of This Book; Technology is Still Important; Security is Really Risk Management; Be Responsible; Appendix A: Critical Moments in Computer Security History; Index; Syngress: The Definition of a Serious Security Library 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer crimes  |x Prevention. 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Computer security  |2 fast 
776 0 8 |i Print version:  |a Winkler, Ira.  |t Zen and the art of information security.  |d Rockland, MA : Syngress, ©2007  |z 1597491683  |z 9781597491686  |w (DLC) 2007279019  |w (OCoLC)124040958 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780080554747/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a EBL - Ebook Library  |b EBLB  |n EBL330200 
938 |a ebrary  |b EBRY  |n ebr10196336 
938 |a EBSCOhost  |b EBSC  |n 212324 
938 |a YBP Library Services  |b YANK  |n 2739766 
994 |a 92  |b IZTAP