top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Ten laws for security / Eric Diehl
Ten laws for security / Eric Diehl
Creatore [Diehl, Eric, author]
Estensione 1 online resource : illustrations
Genere/Forma Electronic books
ISBN 9783319426419
3319426419
3319426397
9783319426396
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword; Preface; Contents; Abbreviations and Acronyms; List of Figures; Introduction; 1 Law 1: Attackers Will Always Find Their Way; 1.1 Examples; 1.2 Analysis; 1.2.1 Should Vulnerabilities Be Published?; 1.2.2 Jailbreaking and Secure Bootloaders; 1.2.3 Flawed Designs; 1.2.4 Advanced Persistent Threats; 1.3 Takeaway; 1.3.1 Design Your System for Renewability; 1.3.2 Design for Secure Failure; 1.3.3 Defense in Depth; 1.3.4 Backup; 1.4 Summary; 2 Law 2: Know the Assets to Protect; 2.1 Examples; 2.2 Analysis; 2.2.1 Classification of Assets; 2.2.2 Classification of Attackers; 2.2.3 Threats.
2.3 Takeaway2.3.1 Overprotecting Can Be Bad; 2.3.2 Know Your Enemy; 2.4 Summary; 3 Law 3: No Security Through Obscurity; 3.1 Examples; 3.2 Analysis; 3.2.1 Designing a Secure Encryption Algorithm; 3.2.2 Kerckhoffs' Law Does Not Mean Publish Everything; 3.3 Takeaway; 3.4 Summary; 4 Law 4: Trust No One; 4.1 Examples; 4.2 Analysis; 4.2.1 Supply Chain Attack; 4.2.2 Who Can You Trust?; 4.2.3 Is This Certificate Yours?; 4.2.4 Is the Cloud Trustworthy?; 4.2.5 Hardware Root of Trust; 4.3 Takeaway; 4.3.1 Define Your Trust Model; 4.3.2 Minimize Attack Surface Area; 4.3.3 Principle of Least Privilege.
4.3.4 Simplicity4.3.5 Insiders; 4.3.6 Isolate Your Trust Space; 4.4 Summary; 5 Law 5: Si Vis Pacem, Para Bellum; 5.1 Example; 5.2 Analysis; 5.2.1 Security Is Aging; 5.3 Takeaway; 5.3.1 Active Defense; 5.3.2 Renewability; 5.3.3 Be Vigilant; 5.4 Summary; 6 Law 6: Security Is no Stronger Than Its Weakest Link; 6.1 Examples; 6.2 Analysis; 6.2.1 Design Issues; 6.2.2 Side-Channel Attacks; 6.2.3 Rollback and Backward Compatibility; 6.3 Takeaway; 6.3.1 Test; 6.3.2 Fix Security Issues Adequately; 6.3.3 Take Care of Your Keys; 6.3.4 Think Global; 6.4 Summary; 7 Law 7: You are the Weakest Link.
7.1 Examples7.2 Analysis; 7.2.1 Bring Your Own Cloud; 7.2.2 Authentication; 7.2.3 Social Engineering; 7.2.4 Biometrics; 7.2.5 Do Users Care About Security Warnings?; 7.3 Takeaway; 7.3.1 Understand Your Users; 7.3.2 Align the Interests of All Actors; 7.3.3 Awareness; 7.4 Summary; 8 Law 8: If You Watch the Internet, the Internet Is Watching You; 8.1 Examples; 8.2 Analysis; 8.2.1 Protect Your Corporate LAN; 8.3 Takeaway; 8.3.1 Assume External Systems Are Insecure; 8.3.2 Privacy; 8.3.3 Anonymity; 8.4 Summary; 9 Law 9: Quis Custodiet Ipsos Custodes?; 9.1 Examples; 9.2 Analysis; 9.2.1 CobiT.
9.3 Takeaway9.3.1 Separation of Duties; 9.3.2 Logfiles Are to Be Reviewed; 9.4 Summary; 10 Law 10: Security Is Not a Product, Security Is a Process; 10.1 Examples; 10.2 Analysis; 10.2.1 The McCumber Cube; 10.2.2 Security Mindset; 10.2.3 ISO 27005; 10.3 Takeaway; 10.3.1 What Makes a Great Hacker?; 10.3.2 Tools; 10.3.3 Written Policies; 10.3.4 Communicate Risks; 10.3.5 Think Out of the Box; 10.4 Summary; Conclusions; Conclusions; Appendix A: A Brief Introduction to Cryptography; A.1 Symmetric Cryptography; A.2 Asymmetric Cryptography; A.3 Hash Functions.
Record Nr. UCHICAGO-11269240
[Diehl, Eric, author]  
Materiale a stampa
Lo trovi qui: University of Chicago
Ten Laws for Security [electronic resource] / by Eric Diehl
Ten Laws for Security [electronic resource] / by Eric Diehl
Creatore [Diehl, Eric, author]
Estensione XIX, 281 p. 42 illus., 3 illus. in color : online resource.
Disciplina 005.82
Accesso ente SpringerLink (Online service)
ISBN 9783319426419
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Law 1, Attackers Will Always Find Their Way -- Law 2, Know the Assets to Protect -- Law 3, No Security Through Obscurity -- Law 4, Trust No One -- Law 5, Si Vis Pacem, Para Bellum -- Law 6, You Are the Weakest Link -- Law 7, Security Is No Stronger Than Its Weakest Link -- Law 8, If You Watch the Internet, the Internet Is Watching You -- Law 9, Quis Custodiet Ipsos Custodes? Law 10, Security Is Not a Product, Security Is a Process -- Conclusions -- Abbreviations -- Acronyms -- References -- App. A, A Short Introduction to Cryptography.
Record Nr. UMICH-014977445
[Diehl, Eric, author]  
Materiale a stampa
Lo trovi qui: University of Michigan Ann Arbor
Ten Laws for Security [electronic resource] / by Eric Diehl
Ten Laws for Security [electronic resource] / by Eric Diehl
Creatore [Diehl, Eric., author]
Estensione XIX, 281 p. 42 illus., 3 illus. in color. online resource.
Disciplina 005.82
Accesso ente SpringerLink (Online service)
ISBN 9783319426419
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Law 1, Attackers Will Always Find Their Way -- Law 2, Know the Assets to Protect -- Law 3, No Security Through Obscurity -- Law 4, Trust No One -- Law 5, Si Vis Pacem, Para Bellum -- Law 6, You Are the Weakest Link -- Law 7, Security Is No Stronger Than Its Weakest Link -- Law 8, If You Watch the Internet, the Internet Is Watching You -- Law 9, Quis Custodiet Ipsos Custodes? Law 10, Security Is Not a Product, Security Is a Process -- Conclusions -- Abbreviations -- Acronyms -- References -- App. A, A Short Introduction to Cryptography.
Record Nr. NYU-004849324
[Diehl, Eric., author]  
Risorse elettroniche
Lo trovi qui: New York University
Ten laws for security / Eric Diehl
Ten laws for security / Eric Diehl
Creatore [Diehl, Eric, author]
Estensione 1 online resource : illustrations
Disciplina 005.8
Genere/Forma Electronic books
ISBN 9783319426419
3319426419
3319426397
9783319426396
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword; Preface; Contents; Abbreviations and Acronyms; List of Figures; Introduction; 1 Law 1: Attackers Will Always Find Their Way; 1.1 Examples; 1.2 Analysis; 1.2.1 Should Vulnerabilities Be Published?; 1.2.2 Jailbreaking and Secure Bootloaders; 1.2.3 Flawed Designs; 1.2.4 Advanced Persistent Threats; 1.3 Takeaway; 1.3.1 Design Your System for Renewability; 1.3.2 Design for Secure Failure; 1.3.3 Defense in Depth; 1.3.4 Backup; 1.4 Summary; 2 Law 2: Know the Assets to Protect; 2.1 Examples; 2.2 Analysis; 2.2.1 Classification of Assets; 2.2.2 Classification of Attackers; 2.2.3 Threats.
2.3 Takeaway2.3.1 Overprotecting Can Be Bad; 2.3.2 Know Your Enemy; 2.4 Summary; 3 Law 3: No Security Through Obscurity; 3.1 Examples; 3.2 Analysis; 3.2.1 Designing a Secure Encryption Algorithm; 3.2.2 Kerckhoffs' Law Does Not Mean Publish Everything; 3.3 Takeaway; 3.4 Summary; 4 Law 4: Trust No One; 4.1 Examples; 4.2 Analysis; 4.2.1 Supply Chain Attack; 4.2.2 Who Can You Trust?; 4.2.3 Is This Certificate Yours?; 4.2.4 Is the Cloud Trustworthy?; 4.2.5 Hardware Root of Trust; 4.3 Takeaway; 4.3.1 Define Your Trust Model; 4.3.2 Minimize Attack Surface Area; 4.3.3 Principle of Least Privilege.
4.3.4 Simplicity4.3.5 Insiders; 4.3.6 Isolate Your Trust Space; 4.4 Summary; 5 Law 5: Si Vis Pacem, Para Bellum; 5.1 Example; 5.2 Analysis; 5.2.1 Security Is Aging; 5.3 Takeaway; 5.3.1 Active Defense; 5.3.2 Renewability; 5.3.3 Be Vigilant; 5.4 Summary; 6 Law 6: Security Is no Stronger Than Its Weakest Link; 6.1 Examples; 6.2 Analysis; 6.2.1 Design Issues; 6.2.2 Side-Channel Attacks; 6.2.3 Rollback and Backward Compatibility; 6.3 Takeaway; 6.3.1 Test; 6.3.2 Fix Security Issues Adequately; 6.3.3 Take Care of Your Keys; 6.3.4 Think Global; 6.4 Summary; 7 Law 7: You are the Weakest Link.
7.1 Examples7.2 Analysis; 7.2.1 Bring Your Own Cloud; 7.2.2 Authentication; 7.2.3 Social Engineering; 7.2.4 Biometrics; 7.2.5 Do Users Care About Security Warnings?; 7.3 Takeaway; 7.3.1 Understand Your Users; 7.3.2 Align the Interests of All Actors; 7.3.3 Awareness; 7.4 Summary; 8 Law 8: If You Watch the Internet, the Internet Is Watching You; 8.1 Examples; 8.2 Analysis; 8.2.1 Protect Your Corporate LAN; 8.3 Takeaway; 8.3.1 Assume External Systems Are Insecure; 8.3.2 Privacy; 8.3.3 Anonymity; 8.4 Summary; 9 Law 9: Quis Custodiet Ipsos Custodes?; 9.1 Examples; 9.2 Analysis; 9.2.1 CobiT.
9.3 Takeaway9.3.1 Separation of Duties; 9.3.2 Logfiles Are to Be Reviewed; 9.4 Summary; 10 Law 10: Security Is Not a Product, Security Is a Process; 10.1 Examples; 10.2 Analysis; 10.2.1 The McCumber Cube; 10.2.2 Security Mindset; 10.2.3 ISO 27005; 10.3 Takeaway; 10.3.1 What Makes a Great Hacker?; 10.3.2 Tools; 10.3.3 Written Policies; 10.3.4 Communicate Risks; 10.3.5 Think Out of the Box; 10.4 Summary; Conclusions; Conclusions; Appendix A: A Brief Introduction to Cryptography; A.1 Symmetric Cryptography; A.2 Asymmetric Cryptography; A.3 Hash Functions.
Record Nr. NYU-006187123
[Diehl, Eric, author]  
Materiale a stampa
Lo trovi qui: New York University
Ten laws for security / Eric Diehl
Ten laws for security / Eric Diehl
Creatore [Diehl, Eric, author]
Estensione 1 online resource (290 pages) : illustrations
Disciplina 004
ISBN 9783319426396
9783319426419
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UALBERTA-7664330
[Diehl, Eric, author]  
Materiale a stampa
Lo trovi qui: University of Alberta / NEOS Library Consortium
Securing digital video : techniques for DRM and content protection / Eric Diehl
Securing digital video : techniques for DRM and content protection / Eric Diehl
Creatore [Diehl, Eric]
Estensione 1 online resource
Disciplina 006.6/96
Genere/Forma Electronic books
Soggetto non controllato Computer science
Data structures (Computer science)
Multimedia systems
Information Systems
Systems engineering
Circuits and Systems
Multimedia Information Systems
Management of Computing and Information Systems
ISBN 9783642173455
3642173454
3642173446
9783642173448
3642434886
9783642434884
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Why Protect Video? -- A Tool Box -- Modeling Content Protection -- The Current Video Ecosystem -- Protection in Broadcast -- Protection in Unicast/Multicast -- Protection of Pre-recorded/Recordable Medium -- Protection Within the Home -- Digital Cinema -- The Next Frontier: Interoperability -- Some Challenges/Goodies -- Conclusions.
Record Nr. NYU-004623446
[Diehl, Eric]  
Materiale a stampa
Lo trovi qui: New York University
Securing Digital Video [electronic resource] : Techniques for DRM and Content Protection / by Eric Diehl
Securing Digital Video [electronic resource] : Techniques for DRM and Content Protection / by Eric Diehl
Creatore [Diehl, Eric]
Estensione 1 online resource.
Disciplina 005.74
Accesso ente SpringerLink (Online service)
ISBN 9783642173455
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. YALE-10578251
[Diehl, Eric]  
Risorse elettroniche
Lo trovi qui: Yale University
Securing digital video [electronic resource] : techniques for DRM and content protection / Eric Diehl
Securing digital video [electronic resource] : techniques for DRM and content protection / Eric Diehl
Creatore [Diehl, Eric]
Disciplina 005.8
Accesso ente Books24x7, Inc.
Genere/Forma Electronic books
ISBN 9783642173455
9783642173448
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UMICH-012703653
[Diehl, Eric]  
Materiale a stampa
Lo trovi qui: University of Michigan Ann Arbor
Ten laws for security / Eric Diehl
Ten laws for security / Eric Diehl
Creatore [Diehl, Eric, author]
Estensione 1 online resource : illustrations
Disciplina 005.8
ISBN 9783319426419
3319426419
3319426397
9783319426396
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword; Preface; Contents; Abbreviations and Acronyms; List of Figures; Introduction; 1 Law 1: Attackers Will Always Find Their Way; 1.1 Examples; 1.2 Analysis; 1.2.1 Should Vulnerabilities Be Published?; 1.2.2 Jailbreaking and Secure Bootloaders; 1.2.3 Flawed Designs; 1.2.4 Advanced Persistent Threats; 1.3 Takeaway; 1.3.1 Design Your System for Renewability; 1.3.2 Design for Secure Failure; 1.3.3 Defense in Depth; 1.3.4 Backup; 1.4 Summary; 2 Law 2: Know the Assets to Protect; 2.1 Examples; 2.2 Analysis; 2.2.1 Classification of Assets; 2.2.2 Classification of Attackers; 2.2.3 Threats.
2.3 Takeaway2.3.1 Overprotecting Can Be Bad; 2.3.2 Know Your Enemy; 2.4 Summary; 3 Law 3: No Security Through Obscurity; 3.1 Examples; 3.2 Analysis; 3.2.1 Designing a Secure Encryption Algorithm; 3.2.2 Kerckhoffs' Law Does Not Mean Publish Everything; 3.3 Takeaway; 3.4 Summary; 4 Law 4: Trust No One; 4.1 Examples; 4.2 Analysis; 4.2.1 Supply Chain Attack; 4.2.2 Who Can You Trust?; 4.2.3 Is This Certificate Yours?; 4.2.4 Is the Cloud Trustworthy?; 4.2.5 Hardware Root of Trust; 4.3 Takeaway; 4.3.1 Define Your Trust Model; 4.3.2 Minimize Attack Surface Area; 4.3.3 Principle of Least Privilege.
4.3.4 Simplicity4.3.5 Insiders; 4.3.6 Isolate Your Trust Space; 4.4 Summary; 5 Law 5: Si Vis Pacem, Para Bellum; 5.1 Example; 5.2 Analysis; 5.2.1 Security Is Aging; 5.3 Takeaway; 5.3.1 Active Defense; 5.3.2 Renewability; 5.3.3 Be Vigilant; 5.4 Summary; 6 Law 6: Security Is no Stronger Than Its Weakest Link; 6.1 Examples; 6.2 Analysis; 6.2.1 Design Issues; 6.2.2 Side-Channel Attacks; 6.2.3 Rollback and Backward Compatibility; 6.3 Takeaway; 6.3.1 Test; 6.3.2 Fix Security Issues Adequately; 6.3.3 Take Care of Your Keys; 6.3.4 Think Global; 6.4 Summary; 7 Law 7: You are the Weakest Link.
7.1 Examples7.2 Analysis; 7.2.1 Bring Your Own Cloud; 7.2.2 Authentication; 7.2.3 Social Engineering; 7.2.4 Biometrics; 7.2.5 Do Users Care About Security Warnings?; 7.3 Takeaway; 7.3.1 Understand Your Users; 7.3.2 Align the Interests of All Actors; 7.3.3 Awareness; 7.4 Summary; 8 Law 8: If You Watch the Internet, the Internet Is Watching You; 8.1 Examples; 8.2 Analysis; 8.2.1 Protect Your Corporate LAN; 8.3 Takeaway; 8.3.1 Assume External Systems Are Insecure; 8.3.2 Privacy; 8.3.3 Anonymity; 8.4 Summary; 9 Law 9: Quis Custodiet Ipsos Custodes?; 9.1 Examples; 9.2 Analysis; 9.2.1 CobiT.
9.3 Takeaway9.3.1 Separation of Duties; 9.3.2 Logfiles Are to Be Reviewed; 9.4 Summary; 10 Law 10: Security Is Not a Product, Security Is a Process; 10.1 Examples; 10.2 Analysis; 10.2.1 The McCumber Cube; 10.2.2 Security Mindset; 10.2.3 ISO 27005; 10.3 Takeaway; 10.3.1 What Makes a Great Hacker?; 10.3.2 Tools; 10.3.3 Written Policies; 10.3.4 Communicate Risks; 10.3.5 Think Out of the Box; 10.4 Summary; Conclusions; Conclusions; Appendix A: A Brief Introduction to Cryptography; A.1 Symmetric Cryptography; A.2 Asymmetric Cryptography; A.3 Hash Functions.
Record Nr. STANFORD-a11908309
[Diehl, Eric, author]  
Materiale a stampa
Lo trovi qui: Stanford University
Ten Laws for Security [electronic resource] / by Eric Diehl
Ten Laws for Security [electronic resource] / by Eric Diehl
Creatore [Diehl, Eric author]
Edizione [1st ed. 2016.]
Estensione 1 online resource (XIX, 281 pages) : 42 illustrations, 3 illustrations in color.
Disciplina 005.82
Accesso ente SpringerLink (Online service)
ISBN 978-3-319-42641-9
9783319426419
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Law 1, Attackers Will Always Find Their Way -- Law 2, Know the Assets to Protect -- Law 3, No Security Through Obscurity -- Law 4, Trust No One -- Law 5, Si Vis Pacem, Para Bellum -- Law 6, You Are the Weakest Link -- Law 7, Security Is No Stronger Than Its Weakest Link -- Law 8, If You Watch the Internet, the Internet Is Watching You -- Law 9, Quis Custodiet Ipsos Custodes? Law 10, Security Is Not a Product, Security Is a Process -- Conclusions -- Abbreviations -- Acronyms -- References -- App. A, A Short Introduction to Cryptography.
Record Nr. UPENN-9977620110303681
[Diehl, Eric author]  
Materiale a stampa
Lo trovi qui: University of Pennsylvania