000 02544cam a2200241 a 4500
008 100301s2009 cc a b 001 0 eng
020 _a9780596527488 (pbk.)
020 _a0596527489
035 _a(Sirsi) u4111
040 _aEG-CaNU
_c EG-CaNU
_d EG-CaNU
042 _ancode
082 0 4 _a005.8
_2 22
245 0 0 _aBeautiful security /
_c edited by Andy Oram and John Viega.
260 _aBeijing ;
_a Farnham :
_b O'Reilly,
_c c2009.
300 _axv, 281 p. :
_b ill. ;
_c 24 cm.
504 _aIncludes bibliographical references and index.
505 _aChapter 1 Psychological Security -- Fertile Ground for Social Engi... -- Chapter 3 Beautiful Security Met... -- Chapter 4 The Underground Econom... -- Rethinking ECommerce Security -- Rustlers and Sheriffs in the New... -- Chapter 7 The Evolution of PGPs ... -- Proactive Detection of ClientSid... -- Chapter 9 Tomorrows Security Cog... -- Chapter 10 Security by Design -- Is Secure Software in Your Future? -- Chapter 12 Oh No Here Come the I... -- Chapter 13 Beautiful Log Handling -- Finding the Other 68 -- Chapter 15 Doing Real Work Witho... -- PC Security Theater -- Contributors.
520 _aWith the ever-increasing risks and rewards in today's networked world, new and more aggressive forms of defending networks have evolved. No longer content to take and assess damage after an attack, companies are looking at measured responses to protect their networks while under attack. Regardless of what you call it, whether it's aggressive self-defense or vigilantism, these techniques and technology are at the center of the biggest revolution in the history of network security. This book shows you why they are not only feasible but inevitable.InSelf-Defending Networks, the luminaries and pioneers of network security take you beyond the headlines, hype, and hearsay to provide insight into why new measures are being undertaken and how they work. Some of them discuss how these new techniques have evolved and where they will lead us; others explore how the techniques bring into question the very beliefs, ethics, laws, and morals that have guided information security so far. This topic is generating intense interest in the security community, and the contributors to "Self-Defending Networks" offer a balanced assessment that covers both sides of the issue. It's a far-reaching discussion you can't afford to miss.
650 0 _aComputer networks
_x Security measures.
_98134
700 1 _aOram, Andrew.
_98135
700 1 _aViega, John.
_98136
596 _a1
999 _c3107
_d3107