E-Book, Englisch, 192 Seiten, Web PDF
Winkler Zen and the Art of Information Security
1. Auflage 2011
ISBN: 978-0-08-055474-7
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, 192 Seiten, Web PDF
ISBN: 978-0-08-055474-7
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler's experiences making security understandable to the business world. Mr. Winkler is one of the most popular and highly rated speakers in the field of security, and lectures to tens of thousands of people a year. Zen and the Art of Information Security is based on one of his most well received international presentations.
*Written by an internationally renowned author of Spies Among Us who travels the world making security presentations to tens of thousands of people a year
* This short and concise book is specifically for the business, consumer, and technical user short on time but looking for the latest information along with reader friendly analogies
* Describes the REAL security threats that you have to worry about, and more importantly, what to do about them
Autoren/Hrsg.
Weitere Infos & Material
1;Front Cover;1
2;Zen and the Art of Information Security;6
3;Copyright Page;7
4;Contents;14
5;Introduction;20
6;Why You Shouldn't Buy This Book;20
7;Chapter 1. Zen and the Art of Cybersecurity;26
7.1;Philosophy of Security;32
8;Chapter 2. Why l Don't Like the Title of This Book;34
8.1;What Makes a Scientist;35
8.2;Why Some People are Better Scientists;37
8.3;Putting it All Together;41
8.4;Applying Science;42
9;Chapter 3. What is Security?;44
9.1;Risk;45
9.2;What is a Security Program?;55
9.3;Optimizing Risk;56
9.4;Consciously Accept Risk;60
10;Chapter 4. A Bad Question;62
10.1;Value has Nothing to do With Computers;64
10.2;A Typical Security Budget;65
10.3;Determining A Security Budget;66
10.4;Multiyear Budgets;67
10.5;Remind the CIO the I means Information;67
10.6;Making Risk a Conscious Decision;68
11;Chapter 5. What Makes a Master;70
11.1;Mastering Computer Security;73
12;Chapter 6. Knights and Dragons;82
12.1;The FUD Factor;84
12.2;Dragons Forgive Incompetency;85
12.3;Terrorists Really Aren't That Good;86
12.4;The People You Really Have to Worry About;88
12.5;Look for Snakes, Not Dragons;91
12.6;Don't Suffer Death By 1,000 Cuts;91
13;Chapter 7. Cyberterrorism is Not Effective;94
13.1;Anthrax vs. Nimda;96
13.2;It is Easier to Blow Things Up;97
13.3;What is a Terrorist?;98
14;Chapter 8. Common Sense and Common Knowledge;100
14.1;Wanting Benefit Without the Associated Costs;102
14.2;Some People Are Just Stupid;105
14.3;The Wizard of Oz;106
15;Chapter 9. Never Underestimate the Stupidity of a Criminal;110
15.1;There is a Difference Between Being Good and Being Effective;117
15.2;Understanding your Adversary;118
15.3;The Criminal Mindset;125
15.4;Your Kids are Notas Smart as You Think;128
16;Chapter 10. Information Security Is INFORMATION Security;130
17;Chapter 11. Is Security a Should or a Must?;134
17.1;Management Must Believe Security is a Must;138
17.2;So is Security a Should or a Must For You?;139
18;Chapter 12. If You Don't Remember History, You Will Repeat It;142
19;Chapter 13. Ira's Golden Rules;148
19.1;Take Responsibility;149
19.2;Decide Security is a Must;150
19.3;Educate Yourself;151
19.4;Remember, You are Protecting Information;151
19.5;Protecting Your Computer;152
19.6;Note on Security Software;156
19.7;The 95/5 Rule;157
20;Chapter 14. Chance Favors the Prepared;158
20.1;Ubiquitous Security;159
20.2;The Purpose of This Book;160
20.3;Technology is Still Important;161
20.4;Security is Really Risk Management;161
20.5;Be Responsible;162
21;Appendix A: Critical Moments in Computer Security History;164
22;Index;170
23;Syngress: The Definition of a Serious Security Library;179