top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalit√† di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Ten laws for security / Eric Diehl
Ten laws for security / Eric Diehl
Creatore [Diehl, Eric, author]
Estensione 1 online resource : illustrations
Disciplina 005.8
ISBN 9783319426419
3319426419
3319426397
9783319426396
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword; Preface; Contents; Abbreviations and Acronyms; List of Figures; Introduction; 1 Law 1: Attackers Will Always Find Their Way; 1.1 Examples; 1.2 Analysis; 1.2.1 Should Vulnerabilities Be Published?; 1.2.2 Jailbreaking and Secure Bootloaders; 1.2.3 Flawed Designs; 1.2.4 Advanced Persistent Threats; 1.3 Takeaway; 1.3.1 Design Your System for Renewability; 1.3.2 Design for Secure Failure; 1.3.3 Defense in Depth; 1.3.4 Backup; 1.4 Summary; 2 Law 2: Know the Assets to Protect; 2.1 Examples; 2.2 Analysis; 2.2.1 Classification of Assets; 2.2.2 Classification of Attackers; 2.2.3 Threats.
2.3 Takeaway2.3.1 Overprotecting Can Be Bad; 2.3.2 Know Your Enemy; 2.4 Summary; 3 Law 3: No Security Through Obscurity; 3.1 Examples; 3.2 Analysis; 3.2.1 Designing a Secure Encryption Algorithm; 3.2.2 Kerckhoffs' Law Does Not Mean Publish Everything; 3.3 Takeaway; 3.4 Summary; 4 Law 4: Trust No One; 4.1 Examples; 4.2 Analysis; 4.2.1 Supply Chain Attack; 4.2.2 Who Can You Trust?; 4.2.3 Is This Certificate Yours?; 4.2.4 Is the Cloud Trustworthy?; 4.2.5 Hardware Root of Trust; 4.3 Takeaway; 4.3.1 Define Your Trust Model; 4.3.2 Minimize Attack Surface Area; 4.3.3 Principle of Least Privilege.
4.3.4 Simplicity4.3.5 Insiders; 4.3.6 Isolate Your Trust Space; 4.4 Summary; 5 Law 5: Si Vis Pacem, Para Bellum; 5.1 Example; 5.2 Analysis; 5.2.1 Security Is Aging; 5.3 Takeaway; 5.3.1 Active Defense; 5.3.2 Renewability; 5.3.3 Be Vigilant; 5.4 Summary; 6 Law 6: Security Is no Stronger Than Its Weakest Link; 6.1 Examples; 6.2 Analysis; 6.2.1 Design Issues; 6.2.2 Side-Channel Attacks; 6.2.3 Rollback and Backward Compatibility; 6.3 Takeaway; 6.3.1 Test; 6.3.2 Fix Security Issues Adequately; 6.3.3 Take Care of Your Keys; 6.3.4 Think Global; 6.4 Summary; 7 Law 7: You are the Weakest Link.
7.1 Examples7.2 Analysis; 7.2.1 Bring Your Own Cloud; 7.2.2 Authentication; 7.2.3 Social Engineering; 7.2.4 Biometrics; 7.2.5 Do Users Care About Security Warnings?; 7.3 Takeaway; 7.3.1 Understand Your Users; 7.3.2 Align the Interests of All Actors; 7.3.3 Awareness; 7.4 Summary; 8 Law 8: If You Watch the Internet, the Internet Is Watching You; 8.1 Examples; 8.2 Analysis; 8.2.1 Protect Your Corporate LAN; 8.3 Takeaway; 8.3.1 Assume External Systems Are Insecure; 8.3.2 Privacy; 8.3.3 Anonymity; 8.4 Summary; 9 Law 9: Quis Custodiet Ipsos Custodes?; 9.1 Examples; 9.2 Analysis; 9.2.1 CobiT.
9.3 Takeaway9.3.1 Separation of Duties; 9.3.2 Logfiles Are to Be Reviewed; 9.4 Summary; 10 Law 10: Security Is Not a Product, Security Is a Process; 10.1 Examples; 10.2 Analysis; 10.2.1 The McCumber Cube; 10.2.2 Security Mindset; 10.2.3 ISO 27005; 10.3 Takeaway; 10.3.1 What Makes a Great Hacker?; 10.3.2 Tools; 10.3.3 Written Policies; 10.3.4 Communicate Risks; 10.3.5 Think Out of the Box; 10.4 Summary; Conclusions; Conclusions; Appendix A: A Brief Introduction to Cryptography; A.1 Symmetric Cryptography; A.2 Asymmetric Cryptography; A.3 Hash Functions.
Record Nr. STANFORD-a11908309
[Diehl, Eric, author]  
Materiale a stampa
Lo trovi qui: Stanford University
Ten Laws for Security [electronic resource] / by Eric Diehl
Ten Laws for Security [electronic resource] / by Eric Diehl
Creatore [Diehl, Eric author]
Edizione [1st ed. 2016.]
Estensione 1 online resource (XIX, 281 pages) : 42 illustrations, 3 illustrations in color.
Disciplina 005.82
Accesso ente SpringerLink (Online service)
ISBN 978-3-319-42641-9
9783319426419
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Law 1, Attackers Will Always Find Their Way -- Law 2, Know the Assets to Protect -- Law 3, No Security Through Obscurity -- Law 4, Trust No One -- Law 5, Si Vis Pacem, Para Bellum -- Law 6, You Are the Weakest Link -- Law 7, Security Is No Stronger Than Its Weakest Link -- Law 8, If You Watch the Internet, the Internet Is Watching You -- Law 9, Quis Custodiet Ipsos Custodes? Law 10, Security Is Not a Product, Security Is a Process -- Conclusions -- Abbreviations -- Acronyms -- References -- App. A, A Short Introduction to Cryptography.
Record Nr. UPENN-9977620110303681
[Diehl, Eric author]  
Materiale a stampa
Lo trovi qui: University of Pennsylvania
Ten laws for security / Eric Diehl
Ten laws for security / Eric Diehl
Creatore [Diehl, Eric, author]
Estensione 1 online resource : illustrations
Disciplina 005.8
Genere/Forma Electronic books
ISBN 9783319426419
3319426419
3319426397
9783319426396
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword; Preface; Contents; Abbreviations and Acronyms; List of Figures; Introduction; 1 Law 1: Attackers Will Always Find Their Way; 1.1 Examples; 1.2 Analysis; 1.2.1 Should Vulnerabilities Be Published?; 1.2.2 Jailbreaking and Secure Bootloaders; 1.2.3 Flawed Designs; 1.2.4 Advanced Persistent Threats; 1.3 Takeaway; 1.3.1 Design Your System for Renewability; 1.3.2 Design for Secure Failure; 1.3.3 Defense in Depth; 1.3.4 Backup; 1.4 Summary; 2 Law 2: Know the Assets to Protect; 2.1 Examples; 2.2 Analysis; 2.2.1 Classification of Assets; 2.2.2 Classification of Attackers; 2.2.3 Threats.
2.3 Takeaway2.3.1 Overprotecting Can Be Bad; 2.3.2 Know Your Enemy; 2.4 Summary; 3 Law 3: No Security Through Obscurity; 3.1 Examples; 3.2 Analysis; 3.2.1 Designing a Secure Encryption Algorithm; 3.2.2 Kerckhoffs' Law Does Not Mean Publish Everything; 3.3 Takeaway; 3.4 Summary; 4 Law 4: Trust No One; 4.1 Examples; 4.2 Analysis; 4.2.1 Supply Chain Attack; 4.2.2 Who Can You Trust?; 4.2.3 Is This Certificate Yours?; 4.2.4 Is the Cloud Trustworthy?; 4.2.5 Hardware Root of Trust; 4.3 Takeaway; 4.3.1 Define Your Trust Model; 4.3.2 Minimize Attack Surface Area; 4.3.3 Principle of Least Privilege.
4.3.4 Simplicity4.3.5 Insiders; 4.3.6 Isolate Your Trust Space; 4.4 Summary; 5 Law 5: Si Vis Pacem, Para Bellum; 5.1 Example; 5.2 Analysis; 5.2.1 Security Is Aging; 5.3 Takeaway; 5.3.1 Active Defense; 5.3.2 Renewability; 5.3.3 Be Vigilant; 5.4 Summary; 6 Law 6: Security Is no Stronger Than Its Weakest Link; 6.1 Examples; 6.2 Analysis; 6.2.1 Design Issues; 6.2.2 Side-Channel Attacks; 6.2.3 Rollback and Backward Compatibility; 6.3 Takeaway; 6.3.1 Test; 6.3.2 Fix Security Issues Adequately; 6.3.3 Take Care of Your Keys; 6.3.4 Think Global; 6.4 Summary; 7 Law 7: You are the Weakest Link.
7.1 Examples7.2 Analysis; 7.2.1 Bring Your Own Cloud; 7.2.2 Authentication; 7.2.3 Social Engineering; 7.2.4 Biometrics; 7.2.5 Do Users Care About Security Warnings?; 7.3 Takeaway; 7.3.1 Understand Your Users; 7.3.2 Align the Interests of All Actors; 7.3.3 Awareness; 7.4 Summary; 8 Law 8: If You Watch the Internet, the Internet Is Watching You; 8.1 Examples; 8.2 Analysis; 8.2.1 Protect Your Corporate LAN; 8.3 Takeaway; 8.3.1 Assume External Systems Are Insecure; 8.3.2 Privacy; 8.3.3 Anonymity; 8.4 Summary; 9 Law 9: Quis Custodiet Ipsos Custodes?; 9.1 Examples; 9.2 Analysis; 9.2.1 CobiT.
9.3 Takeaway9.3.1 Separation of Duties; 9.3.2 Logfiles Are to Be Reviewed; 9.4 Summary; 10 Law 10: Security Is Not a Product, Security Is a Process; 10.1 Examples; 10.2 Analysis; 10.2.1 The McCumber Cube; 10.2.2 Security Mindset; 10.2.3 ISO 27005; 10.3 Takeaway; 10.3.1 What Makes a Great Hacker?; 10.3.2 Tools; 10.3.3 Written Policies; 10.3.4 Communicate Risks; 10.3.5 Think Out of the Box; 10.4 Summary; Conclusions; Conclusions; Appendix A: A Brief Introduction to Cryptography; A.1 Symmetric Cryptography; A.2 Asymmetric Cryptography; A.3 Hash Functions.
Record Nr. NYU-006187123
[Diehl, Eric, author]  
Materiale a stampa
Lo trovi qui: New York University
Ten laws for security / Eric Diehl
Ten laws for security / Eric Diehl
Creatore [Diehl, Eric, author]
Estensione 1 online resource (290 pages) : illustrations
Disciplina 004
ISBN 9783319426396
9783319426419
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UALBERTA-7664330
[Diehl, Eric, author]  
Materiale a stampa
Lo trovi qui: University of Alberta / NEOS Library Consortium
Ten laws for security / Eric Diehl
Ten laws for security / Eric Diehl
Creatore [Diehl, Eric, author]
Estensione 1 online resource : illustrations
Genere/Forma Electronic books
ISBN 9783319426419
3319426419
3319426397
9783319426396
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword; Preface; Contents; Abbreviations and Acronyms; List of Figures; Introduction; 1 Law 1: Attackers Will Always Find Their Way; 1.1 Examples; 1.2 Analysis; 1.2.1 Should Vulnerabilities Be Published?; 1.2.2 Jailbreaking and Secure Bootloaders; 1.2.3 Flawed Designs; 1.2.4 Advanced Persistent Threats; 1.3 Takeaway; 1.3.1 Design Your System for Renewability; 1.3.2 Design for Secure Failure; 1.3.3 Defense in Depth; 1.3.4 Backup; 1.4 Summary; 2 Law 2: Know the Assets to Protect; 2.1 Examples; 2.2 Analysis; 2.2.1 Classification of Assets; 2.2.2 Classification of Attackers; 2.2.3 Threats.
2.3 Takeaway2.3.1 Overprotecting Can Be Bad; 2.3.2 Know Your Enemy; 2.4 Summary; 3 Law 3: No Security Through Obscurity; 3.1 Examples; 3.2 Analysis; 3.2.1 Designing a Secure Encryption Algorithm; 3.2.2 Kerckhoffs' Law Does Not Mean Publish Everything; 3.3 Takeaway; 3.4 Summary; 4 Law 4: Trust No One; 4.1 Examples; 4.2 Analysis; 4.2.1 Supply Chain Attack; 4.2.2 Who Can You Trust?; 4.2.3 Is This Certificate Yours?; 4.2.4 Is the Cloud Trustworthy?; 4.2.5 Hardware Root of Trust; 4.3 Takeaway; 4.3.1 Define Your Trust Model; 4.3.2 Minimize Attack Surface Area; 4.3.3 Principle of Least Privilege.
4.3.4 Simplicity4.3.5 Insiders; 4.3.6 Isolate Your Trust Space; 4.4 Summary; 5 Law 5: Si Vis Pacem, Para Bellum; 5.1 Example; 5.2 Analysis; 5.2.1 Security Is Aging; 5.3 Takeaway; 5.3.1 Active Defense; 5.3.2 Renewability; 5.3.3 Be Vigilant; 5.4 Summary; 6 Law 6: Security Is no Stronger Than Its Weakest Link; 6.1 Examples; 6.2 Analysis; 6.2.1 Design Issues; 6.2.2 Side-Channel Attacks; 6.2.3 Rollback and Backward Compatibility; 6.3 Takeaway; 6.3.1 Test; 6.3.2 Fix Security Issues Adequately; 6.3.3 Take Care of Your Keys; 6.3.4 Think Global; 6.4 Summary; 7 Law 7: You are the Weakest Link.
7.1 Examples7.2 Analysis; 7.2.1 Bring Your Own Cloud; 7.2.2 Authentication; 7.2.3 Social Engineering; 7.2.4 Biometrics; 7.2.5 Do Users Care About Security Warnings?; 7.3 Takeaway; 7.3.1 Understand Your Users; 7.3.2 Align the Interests of All Actors; 7.3.3 Awareness; 7.4 Summary; 8 Law 8: If You Watch the Internet, the Internet Is Watching You; 8.1 Examples; 8.2 Analysis; 8.2.1 Protect Your Corporate LAN; 8.3 Takeaway; 8.3.1 Assume External Systems Are Insecure; 8.3.2 Privacy; 8.3.3 Anonymity; 8.4 Summary; 9 Law 9: Quis Custodiet Ipsos Custodes?; 9.1 Examples; 9.2 Analysis; 9.2.1 CobiT.
9.3 Takeaway9.3.1 Separation of Duties; 9.3.2 Logfiles Are to Be Reviewed; 9.4 Summary; 10 Law 10: Security Is Not a Product, Security Is a Process; 10.1 Examples; 10.2 Analysis; 10.2.1 The McCumber Cube; 10.2.2 Security Mindset; 10.2.3 ISO 27005; 10.3 Takeaway; 10.3.1 What Makes a Great Hacker?; 10.3.2 Tools; 10.3.3 Written Policies; 10.3.4 Communicate Risks; 10.3.5 Think Out of the Box; 10.4 Summary; Conclusions; Conclusions; Appendix A: A Brief Introduction to Cryptography; A.1 Symmetric Cryptography; A.2 Asymmetric Cryptography; A.3 Hash Functions.
Record Nr. UCHICAGO-11269240
[Diehl, Eric, author]  
Materiale a stampa
Lo trovi qui: University of Chicago
Ten Laws for Security [electronic resource] / by Eric Diehl
Ten Laws for Security [electronic resource] / by Eric Diehl
Creatore [Diehl, Eric, author]
Estensione XIX, 281 p. 42 illus., 3 illus. in color : online resource.
Disciplina 005.82
Accesso ente SpringerLink (Online service)
ISBN 9783319426419
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Law 1, Attackers Will Always Find Their Way -- Law 2, Know the Assets to Protect -- Law 3, No Security Through Obscurity -- Law 4, Trust No One -- Law 5, Si Vis Pacem, Para Bellum -- Law 6, You Are the Weakest Link -- Law 7, Security Is No Stronger Than Its Weakest Link -- Law 8, If You Watch the Internet, the Internet Is Watching You -- Law 9, Quis Custodiet Ipsos Custodes? Law 10, Security Is Not a Product, Security Is a Process -- Conclusions -- Abbreviations -- Acronyms -- References -- App. A, A Short Introduction to Cryptography.
Record Nr. UMICH-014977445
[Diehl, Eric, author]  
Materiale a stampa
Lo trovi qui: University of Michigan Ann Arbor
Ten Laws for Security [electronic resource] / by Eric Diehl
Ten Laws for Security [electronic resource] / by Eric Diehl
Creatore [Diehl, Eric]
Estensione 1 online resource (XIX, 281 p. 42 illus., 3 illus. in color.) online resource.
Disciplina 005.82
Accesso ente SpringerLink (Online service)
Genere/Forma Electronic books
ISBN 9783319426419
9783319426396
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Law 1, Attackers Will Always Find Their Way -- Law 2, Know the Assets to Protect -- Law 3, No Security Through Obscurity -- Law 4, Trust No One -- Law 5, Si Vis Pacem, Para Bellum -- Law 6, You Are the Weakest Link -- Law 7, Security Is No Stronger Than Its Weakest Link -- Law 8, If You Watch the Internet, the Internet Is Watching You -- Law 9, Quis Custodiet Ipsos Custodes? Law 10, Security Is Not a Product, Security Is a Process -- Conclusions -- Abbreviations -- Acronyms -- References -- App. A, A Short Introduction to Cryptography.
Record Nr. DUKE-007818586
[Diehl, Eric]  
Materiale a stampa
Lo trovi qui: Duke University
Ten Laws for Security [electronic resource] / by Eric Diehl
Ten Laws for Security [electronic resource] / by Eric Diehl
Creatore [Diehl, Eric]
Estensione XIX, 281 p. 42 illus., 3 illus. in color : online resource.
Disciplina 005.82
Accesso ente SpringerLink (Online service)
ISBN 9783319426419
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Law 1, Attackers Will Always Find Their Way -- Law 2, Know the Assets to Protect -- Law 3, No Security Through Obscurity -- Law 4, Trust No One -- Law 5, Si Vis Pacem, Para Bellum -- Law 6, You Are the Weakest Link -- Law 7, Security Is No Stronger Than Its Weakest Link -- Law 8, If You Watch the Internet, the Internet Is Watching You -- Law 9, Quis Custodiet Ipsos Custodes? Law 10, Security Is Not a Product, Security Is a Process -- Conclusions -- Abbreviations -- Acronyms -- References -- App. A, A Short Introduction to Cryptography.
Record Nr. YALE-12991789
[Diehl, Eric]  
Materiale a stampa
Lo trovi qui: Yale University
Ten Laws for Security [electronic resource] / by Eric Diehl
Ten Laws for Security [electronic resource] / by Eric Diehl
Creatore [Diehl, Eric., author]
Estensione XIX, 281 p. 42 illus., 3 illus. in color. online resource.
Disciplina 005.82
Accesso ente SpringerLink (Online service)
ISBN 9783319426419
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Law 1, Attackers Will Always Find Their Way -- Law 2, Know the Assets to Protect -- Law 3, No Security Through Obscurity -- Law 4, Trust No One -- Law 5, Si Vis Pacem, Para Bellum -- Law 6, You Are the Weakest Link -- Law 7, Security Is No Stronger Than Its Weakest Link -- Law 8, If You Watch the Internet, the Internet Is Watching You -- Law 9, Quis Custodiet Ipsos Custodes? Law 10, Security Is Not a Product, Security Is a Process -- Conclusions -- Abbreviations -- Acronyms -- References -- App. A, A Short Introduction to Cryptography.
Record Nr. NYU-004849324
[Diehl, Eric., author]  
Risorse elettroniche
Lo trovi qui: New York University