Wir verwenden Cookies und Analyse-Tools, um die Nutzerfreundlichkeit der Internet-Seite zu verbessern und für Marketingzwecke. Wenn Sie fortfahren, diese Seite zu verwenden, nehmen wir an, dass Sie damit einverstanden sind. Zur Datenschutzerklärung.
Ten Laws for Security
Details
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.
Presents key laws governing information security Valuable insights for professionals and researchers engaged with information security Draws on author's considerable practical business experience in content security at Sony Pictures Entertainment and at Technicolor (Thomson) Includes supplementary material: sn.pub/extras
Autorentext
The author is the Vice President of Media and Security Technologies at Sony Pictures Entertainment. He was formerly the Vice President of the Security and Content Protection Labs at Technicolor. His main research topics are DRM for professional applications, audio and video watermarking, video fingerprinting, secure distribution of multimedia content, and copy protection. He has more than 25 years of research experience, he has filed more than 95 patents in the field, and he is involved with the main related academic conferences as an organizer and contributor.
Inhalt
Introduction.- Law 1, Attackers Will Always Find Their Way.- Law 2, Know the Assets to Protect.- Law 3, No Security Through Obscurity.- Law 4, Trust No One.- Law 5, Si Vis Pacem, Para Bellum.- Law 6, You Are the Weakest Link.- Law 7, Security Is No Stronger Than Its Weakest Link.- Law 8, If You Watch the Internet, the Internet Is Watching You.- Law 9, Quis Custodiet Ipsos Custodes? Law 10, Security Is Not a Product, Security Is a Process.- Conclusions.- Abbreviations.- Acronyms.- References.- App. A, A Short Introduction to Cryptography.
Weitere Informationen
- Allgemeine Informationen
- GTIN 09783319426396
- Genre Information Technology
- Auflage 1st ed. 2016
- Lesemotiv Verstehen
- Anzahl Seiten 281
- Größe H23mm x B162mm x T239mm
- Jahr 2016
- EAN 9783319426396
- Format Fester Einband
- ISBN 978-3-319-42639-6
- Titel Ten Laws for Security
- Autor Eric Diehl
- Gewicht 567g
- Herausgeber Springer International Publishing
- Sprache Englisch