|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn261337366 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
081009s2008 nju ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCQ
|d MKN
|d CEF
|d OCLCQ
|d OCLCE
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d YDX
|d OCLCA
|d AU@
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 245533557
|a 763020690
|a 894570931
|a 1044236966
|a 1056345031
|a 1058049841
|a 1060863668
|a 1074342701
|a 1083236942
|a 1100826806
|
020 |
|
|
|a 9780321562753
|
020 |
|
|
|a 0321562755
|
020 |
|
|
|a 0321502787
|q (print)
|
020 |
|
|
|a 9780321502780
|q (print)
|
020 |
|
|
|z 9780321814906
|q (pbk.)
|
020 |
|
|
|z 0321814908
|q (pbk.)
|
024 |
8 |
|
|a 9780321562753
|
029 |
1 |
|
|a AU@
|b 000044301379
|
029 |
1 |
|
|a AU@
|b 000067112289
|
029 |
1 |
|
|a CHBIS
|b 006148548
|
029 |
1 |
|
|a CHVBK
|b 171297660
|
029 |
1 |
|
|a DEBSZ
|b 35540592X
|
029 |
1 |
|
|a HEBIS
|b 291478654
|
035 |
|
|
|a (OCoLC)261337366
|z (OCoLC)245533557
|z (OCoLC)763020690
|z (OCoLC)894570931
|z (OCoLC)1044236966
|z (OCoLC)1056345031
|z (OCoLC)1058049841
|z (OCoLC)1060863668
|z (OCoLC)1074342701
|z (OCoLC)1083236942
|z (OCoLC)1100826806
|
037 |
|
|
|a CL0500000027
|b Safari Books Online
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a HD30.2
|b .S563 2008
|
082 |
0 |
4 |
|a 658.4/78
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Shostack, Adam.
|
245 |
1 |
4 |
|a The new school of information security /
|c Adam Shostack and Andrew Stewart.
|
260 |
|
|
|a Upper Saddle River [N.J.] :
|b Addison-Wesley,
|c ©2008.
|
300 |
|
|
|a 1 online resource (xiv, 238 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
504 |
|
|
|a Includes bibliographical references (pages 213-228) and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a I. OBSERVING THE WORLD AND ASKING WHY. Spam, and Other Problems with Email --- Hostile Code --- Security Breaches --- Identity and the Theft of Identity --- Should We Just Start Over? --- The Need for a New School ---- II. THE SECURITY INDUSTRY. Where the Security Industry Comes From --- Orientations and Framing --- What Does the Security Industry Sell? --- How Security Is Sold ---- III. ON EVIDENCE. The Trouble with Surveys --- The Trade Press --- Vulnerabilities --- Instrumentation on the Internet --- Organizations and Companies with Data ---- IV. THE RISE OF THE SECURITY BREACH. How Do Companies Lose Data? --- Disclose Breaches --- Possible Criticisms of Breach Data --- Moving from Art to Science --- Get Involved ---- V. AMATEURS STUDY CRYPTOGRAPHY; PROFESSIONALS STUDY ECONOMICS. The Economics of Information Security --- Psychology --- Sociology ---- VI. SPENDING. Reasons to Spend on Security Today --- Non-Reasons to Spend on Security --- Emerging Reasons to Spend --- How Much Should a Business Spend on Security? --- The Psychology of Spending --- On What to Spend ---- VII. LIFE IN THE NEW SCHOOL. People Are People --- Breach Data Is Not Actuarial Data ---Powerful Externalities --- The Human Computer Interface and Risk Compensation --- The Use and Abuse of Language --- Skills Shortages, Organizational Structure, and Collaboration ---- VIII. A CALL TO ACTION. Join the New School --- Embrace the New School --- Make Money from the New School --- Final Words.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
520 |
|
|
|a Why is information security so dysfunctional? Are you wasting the money you spend on security? This book shows how to spend it more effectively. How can you make more effective security decisions? This book explains why professionals have taken to studying economics, not cryptography--and why you should, too. And why security breach notices are the best thing to ever happen to information security. It's about time someone asked the biggest, toughest questions about information security. Security experts Adam Shostack and Andrew Stewart don't just answer those questions--they offer honest, deeply troubling answers. They explain why these critical problems exist and how to solve them. Drawing on powerful lessons from economics and other disciplines, Shostack and Stewart offer a new way forward. In clear and engaging prose, they shed new light on the critical challenges that are faced by the security field. Whether you're a CIO, IT manager, or security specialist, this book will open your eyes to new ways of thinking about--and overcoming--your most pressing security challenges. The New School enables you to take control, while others struggle with non-stop crises.
|
533 |
|
|
|a Electronic reproduction.
|b [Place of publication not identified] :
|c HathiTrust Digital Library,
|d 2011.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2011
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
542 |
|
|
|f Copyright © 2008 Pearson Education, Incorporated
|g 2008
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer security equipment industry.
|
650 |
|
0 |
|a Business
|x Data processing
|x Security measures.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Sécurité informatique
|x Appareils et matériel
|x Industrie.
|
650 |
|
6 |
|a Gestion
|x Informatique
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Information technology
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Computer security equipment industry.
|2 blmlsh
|
650 |
|
7 |
|a Business
|x Data processing
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Business
|x Data processing
|x Security measures.
|2 fast
|0 (OCoLC)fst00842307
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Computer security equipment industry.
|2 fast
|0 (OCoLC)fst00872497
|
650 |
|
7 |
|a Information technology
|x Security measures.
|2 fast
|0 (OCoLC)fst00973129
|
650 |
|
7 |
|a Systèmes informatiques
|x Mesures de sûreté.
|2 ram
|
650 |
|
7 |
|a Protection de l'information (informatique)
|2 ram
|
650 |
|
7 |
|a Entreprises
|x Systèmes d'information.
|2 ram
|
650 |
|
7 |
|a Réseaux locaux (informatique)
|x Mesures de sûreté.
|2 ram
|
700 |
1 |
|
|a Stewart, Andrew,
|d 1975-
|
776 |
0 |
8 |
|i Print version:
|a Shostack, Adam.
|t New school of information security.
|d Upper Saddle River [N.J.] : Addison-Wesley, ©2008
|z 0321502787
|
776 |
0 |
8 |
|i Print version:
|a Shostack, Adam.
|t New school of information security.
|d Upper Saddle River [N.J.] : Addison-Wesley, ©2008
|z 9780321502780
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780321562753/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14858122
|
994 |
|
|
|a 92
|b IZTAP
|