Cargando…

The new school of information security /

Why is information security so dysfunctional? Are you wasting the money you spend on security? This book shows how to spend it more effectively. How can you make more effective security decisions? This book explains why professionals have taken to studying economics, not cryptography--and why you sh...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Shostack, Adam
Otros Autores: Stewart, Andrew, 1975-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Upper Saddle River [N.J.] : Addison-Wesley, ©2008.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn261337366
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 081009s2008 nju ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d OCLCQ  |d MKN  |d CEF  |d OCLCQ  |d OCLCE  |d DEBSZ  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d YDX  |d OCLCA  |d AU@  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 245533557  |a 763020690  |a 894570931  |a 1044236966  |a 1056345031  |a 1058049841  |a 1060863668  |a 1074342701  |a 1083236942  |a 1100826806 
020 |a 9780321562753 
020 |a 0321562755 
020 |a 0321502787  |q (print) 
020 |a 9780321502780  |q (print) 
020 |z 9780321814906  |q (pbk.) 
020 |z 0321814908  |q (pbk.) 
024 8 |a 9780321562753 
029 1 |a AU@  |b 000044301379 
029 1 |a AU@  |b 000067112289 
029 1 |a CHBIS  |b 006148548 
029 1 |a CHVBK  |b 171297660 
029 1 |a DEBSZ  |b 35540592X 
029 1 |a HEBIS  |b 291478654 
035 |a (OCoLC)261337366  |z (OCoLC)245533557  |z (OCoLC)763020690  |z (OCoLC)894570931  |z (OCoLC)1044236966  |z (OCoLC)1056345031  |z (OCoLC)1058049841  |z (OCoLC)1060863668  |z (OCoLC)1074342701  |z (OCoLC)1083236942  |z (OCoLC)1100826806 
037 |a CL0500000027  |b Safari Books Online 
042 |a dlr 
050 4 |a HD30.2  |b .S563 2008 
082 0 4 |a 658.4/78  |2 22 
049 |a UAMI 
100 1 |a Shostack, Adam. 
245 1 4 |a The new school of information security /  |c Adam Shostack and Andrew Stewart. 
260 |a Upper Saddle River [N.J.] :  |b Addison-Wesley,  |c ©2008. 
300 |a 1 online resource (xiv, 238 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
504 |a Includes bibliographical references (pages 213-228) and index. 
588 0 |a Print version record. 
505 0 |a I. OBSERVING THE WORLD AND ASKING WHY. Spam, and Other Problems with Email --- Hostile Code --- Security Breaches --- Identity and the Theft of Identity --- Should We Just Start Over? --- The Need for a New School ---- II. THE SECURITY INDUSTRY. Where the Security Industry Comes From --- Orientations and Framing --- What Does the Security Industry Sell? --- How Security Is Sold ---- III. ON EVIDENCE. The Trouble with Surveys --- The Trade Press --- Vulnerabilities --- Instrumentation on the Internet --- Organizations and Companies with Data ---- IV. THE RISE OF THE SECURITY BREACH. How Do Companies Lose Data? --- Disclose Breaches --- Possible Criticisms of Breach Data --- Moving from Art to Science --- Get Involved ---- V. AMATEURS STUDY CRYPTOGRAPHY; PROFESSIONALS STUDY ECONOMICS. The Economics of Information Security --- Psychology --- Sociology ---- VI. SPENDING. Reasons to Spend on Security Today --- Non-Reasons to Spend on Security --- Emerging Reasons to Spend --- How Much Should a Business Spend on Security? --- The Psychology of Spending --- On What to Spend ---- VII. LIFE IN THE NEW SCHOOL. People Are People --- Breach Data Is Not Actuarial Data ---Powerful Externalities --- The Human Computer Interface and Risk Compensation --- The Use and Abuse of Language --- Skills Shortages, Organizational Structure, and Collaboration ---- VIII. A CALL TO ACTION. Join the New School --- Embrace the New School --- Make Money from the New School --- Final Words. 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
520 |a Why is information security so dysfunctional? Are you wasting the money you spend on security? This book shows how to spend it more effectively. How can you make more effective security decisions? This book explains why professionals have taken to studying economics, not cryptography--and why you should, too. And why security breach notices are the best thing to ever happen to information security. It's about time someone asked the biggest, toughest questions about information security. Security experts Adam Shostack and Andrew Stewart don't just answer those questions--they offer honest, deeply troubling answers. They explain why these critical problems exist and how to solve them. Drawing on powerful lessons from economics and other disciplines, Shostack and Stewart offer a new way forward. In clear and engaging prose, they shed new light on the critical challenges that are faced by the security field. Whether you're a CIO, IT manager, or security specialist, this book will open your eyes to new ways of thinking about--and overcoming--your most pressing security challenges. The New School enables you to take control, while others struggle with non-stop crises. 
533 |a Electronic reproduction.  |b [Place of publication not identified] :  |c HathiTrust Digital Library,  |d 2011.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2011  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
542 |f Copyright © 2008 Pearson Education, Incorporated  |g 2008 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Computer security equipment industry. 
650 0 |a Business  |x Data processing  |x Security measures. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Sécurité informatique  |x Appareils et matériel  |x Industrie. 
650 6 |a Gestion  |x Informatique  |x Sécurité  |x Mesures. 
650 7 |a Information technology  |x Security measures.  |2 blmlsh 
650 7 |a Computer security.  |2 blmlsh 
650 7 |a Computer security equipment industry.  |2 blmlsh 
650 7 |a Business  |x Data processing  |x Security measures.  |2 blmlsh 
650 7 |a Business  |x Data processing  |x Security measures.  |2 fast  |0 (OCoLC)fst00842307 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Computer security equipment industry.  |2 fast  |0 (OCoLC)fst00872497 
650 7 |a Information technology  |x Security measures.  |2 fast  |0 (OCoLC)fst00973129 
650 7 |a Systèmes informatiques  |x Mesures de sûreté.  |2 ram 
650 7 |a Protection de l'information (informatique)  |2 ram 
650 7 |a Entreprises  |x Systèmes d'information.  |2 ram 
650 7 |a Réseaux locaux (informatique)  |x Mesures de sûreté.  |2 ram 
700 1 |a Stewart, Andrew,  |d 1975- 
776 0 8 |i Print version:  |a Shostack, Adam.  |t New school of information security.  |d Upper Saddle River [N.J.] : Addison-Wesley, ©2008  |z 0321502787 
776 0 8 |i Print version:  |a Shostack, Adam.  |t New school of information security.  |d Upper Saddle River [N.J.] : Addison-Wesley, ©2008  |z 9780321502780 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780321562753/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 14858122 
994 |a 92  |b IZTAP