Beautiful security / (Record no. 3107)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100301s2009 cc a b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780596527488 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0596527489
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u4111
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
245 00 - TITLE STATEMENT
Title Beautiful security /
Statement of responsibility, etc. edited by Andy Oram and John Viega.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Beijing ;
-- Farnham :
Name of publisher, distributor, etc. O'Reilly,
Date of publication, distribution, etc. c2009.
300 ## - PHYSICAL DESCRIPTION
Extent xv, 281 p. :
Other physical details ill. ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1 Psychological Security -- Fertile Ground for Social Engi... -- Chapter 3 Beautiful Security Met... -- Chapter 4 The Underground Econom... -- Rethinking ECommerce Security -- Rustlers and Sheriffs in the New... -- Chapter 7 The Evolution of PGPs ... -- Proactive Detection of ClientSid... -- Chapter 9 Tomorrows Security Cog... -- Chapter 10 Security by Design -- Is Secure Software in Your Future? -- Chapter 12 Oh No Here Come the I... -- Chapter 13 Beautiful Log Handling -- Finding the Other 68 -- Chapter 15 Doing Real Work Witho... -- PC Security Theater -- Contributors.
520 ## - SUMMARY, ETC.
Summary, etc. With the ever-increasing risks and rewards in today's networked world, new and more aggressive forms of defending networks have evolved. No longer content to take and assess damage after an attack, companies are looking at measured responses to protect their networks while under attack. Regardless of what you call it, whether it's aggressive self-defense or vigilantism, these techniques and technology are at the center of the biggest revolution in the history of network security. This book shows you why they are not only feasible but inevitable.InSelf-Defending Networks, the luminaries and pioneers of network security take you beyond the headlines, hype, and hearsay to provide insight into why new measures are being undertaken and how they work. Some of them discuss how these new techniques have evolved and where they will lead us; others explore how the techniques bring into question the very beliefs, ethics, laws, and morals that have guided information security so far. This topic is generating intense interest in the security community, and the contributors to "Self-Defending Networks" offer a balanced assessment that covers both sides of the issue. It's a far-reaching discussion you can't afford to miss.
596 ## -
-- 1
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 8134
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Oram, Andrew.
9 (RLIN) 8135
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Viega, John.
9 (RLIN) 8136
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 ACA-P   005.8 / OR.B 2009 006289 11/24/2019 1 11/24/2019 Books