LEADER 02968nam 22005535 450 001 9910151661403321 005 20200705145644.0 010 $a3-319-42641-9 010 $a9783319426419$b(electronic bk.) 024 7 $a10.1007/978-3-319-42641-9 035 $a(CKB)3710000000952864 035 $a(DE-He213)978-3-319-42641-9 035 $a(MiAaPQ)EBC4744597 035 $a(PPN)197140475 035 $a(EXLCZ)993710000000952864 100 $a20161116d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTen Laws for Security /$fby Eric Diehl 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (xix, 281) $cill 311 $a3-319-42639-7 320 $aIncludes bibliographical references. 327 $aIntroduction -- Law 1, Attackers Will Always Find Their Way -- Law 2, Know the Assets to Protect -- Law 3, No Security Through Obscurity -- Law 4, Trust No One -- Law 5, Si Vis Pacem, Para Bellum -- Law 6, You Are the Weakest Link -- Law 7, Security Is No Stronger Than Its Weakest Link -- Law 8, If You Watch the Internet, the Internet Is Watching You -- Law 9, Quis Custodiet Ipsos Custodes? Law 10, Security Is Not a Product, Security Is a Process -- Conclusions -- Abbreviations -- Acronyms -- References -- App. A, A Short Introduction to Cryptography. 330 $aIn this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security. 606 $aData encryption (Computer science) 606 $aComputer security 606 $aSystem safety 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aSecurity Science and Technology$3https://scigraph.springernature.com/ontologies/product-market-codes/P31080 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aSystem safety. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aSecurity Science and Technology. 676 $a005.82 686 $a32.20.32$2EP-CLASS 686 $a32.24.48$2EP-CLASS 700 $aDiehl$b Eric$4aut$4http://id.loc.gov/vocabulary/relators/aut$0933307 906 $aBOOK 912 $a9910151661403321 996 $aTen Laws for Security$92100700 997 $aUNINA