LEADER 05550nam 2200757 450 001 9910814311403321 005 20230912123048.0 010 $a1-118-79083-9 010 $a1-118-79082-0 035 $a(CKB)2670000000493621 035 $a(EBL)1568423 035 $a(SSID)ssj0001154134 035 $a(PQKBManifestationID)11608875 035 $a(PQKBTitleCode)TC0001154134 035 $a(PQKBWorkID)11161725 035 $a(PQKB)10156180 035 $a(Au-PeEL)EBL1568423 035 $a(CaPaEBR)ebr10809697 035 $a(CaONFJC)MIL576412 035 $a(OCoLC)865331162 035 $a(Au-PeEL)EBL4444823 035 $a(CaPaEBR)ebr11422807 035 $a(OCoLC)1001387726 035 $a(PPN)186164866 035 $a(CaSebORM)9781118790823 035 $a(MiAaPQ)EBC1568423 035 $a(MiAaPQ)EBC4444823 035 $a(EXLCZ)992670000000493621 100 $a20131209d2014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCarry on $esound advice from schneier on security /$fBruce Schneier 205 $a1st edition 210 1$aIndianapolis, Indiana :$cWiley,$d2014. 210 4$dİ2014 215 $a1 online resource (378 p.) 300 $aDescription based upon print version of record. 311 $a9781118790822 311 $a1-118-79081-2 320 $aIncludes bibliographical references and index. 327 $aCover; Title Page; Copyright; Contents; Chapter 1 The Business and Economics of Security; Consolidation: Plague or Progress; Prediction: RSA Conference Will Shrink Like a Punctured Balloon; How to Sell Security; Why People Are Willing to Take Risks; How to Sell Security; Why Do We Accept Signatures by Fax?; The Pros and Cons of LifeLock; The Problem Is Information Insecurity; Security ROI: Fact or Fiction?; The Data Imperative; Caveat Emptor; Social Networking Risks; Do You Know Where Your Data Are?; Be Careful When You Come to Put Your Trust in the Clouds; Is Perfect Access Control Possible? 327 $aNews Media Strategies for Survival for JournalistsSecurity and Function Creep; Weighing the Risk of Hiring Hackers; Should Enterprises Give In to IT Consumerization at the Expense of Security?; The Vulnerabilities Market and the Future of Security; So You Want to Be a Security Expert; When It Comes to Security, We're Back to Feudalism; I Pledge Allegiance to the United States of Convenience; The Good, the Bad, and the Ugly; You Have No Control Over Security on the Feudal Internet; Chapter 2 Crime, Terrorism, Spying, and War; America's Dilemma: Close Security Holes, or Exploit Them Ourselves 327 $aAre Photographers Really a Threat?CCTV Doesn't Keep Us Safe, Yet the Cameras Are Everywhere; Chinese Cyberattacks: Myth or Menace?; How a Classic Man-in-the-Middle Attack Saved Colombian Hostages; How to Create the Perfect Fake Identity; A Fetishistic Approach to Security Is a Perverse Way to Keep Us Safe; The Seven Habits of Highly Ineffective Terrorists; Why Society Should Pay the True Costs of Security; Why Technology Won't Prevent Identity Theft; Terrorists May Use Google Earth, but Fear Is No Reason to Ban It; Thwarting an Internal Hacker 327 $aAn Enterprising Criminal Has Spotted a Gap in the MarketWe Shouldn't Poison Our Minds with Fear of Bioterrorism; Raising the Cost of Paperwork Errors Will Improve Accuracy; So-Called Cyberattack Was Overblown; Why Framing Your Enemies Is Now Virtually Child's Play; Beyond Security Theater; Feeling and Reality; Refuse to Be Terrorized; Cold War Encryption Is Unrealistic in Today's Trenches; Profiling Makes Us Less Safe; Fixing Intelligence Failures; Spy Cameras Won't Make Us Safer; Scanners, Sensors Are Wrong Way to Secure the Subway; Preventing Terrorist Attacks in Crowded Areas 327 $aWhere Are All the Terrorist Attacks?Hard to Pull Off; Few Terrorists; Small Attacks Aren't Enough; Worst-Case Thinking Makes Us Nuts, Not Safe; Threat of ""Cyberwar"" Has Been Hugely Hyped; Cyberwar and the Future of Cyber Conflict; Why Terror Alert Codes Never Made Sense; Debate Club: An International Cyberwar Treaty Is the Only Way to Stem the Threat; Overreaction and Overly Specific Reactions to Rare Risks; Militarizing Cyberspace Will Do More Harm Than Good; Rhetoric of Cyber War Breeds Fear-and More Cyber War; Attacks from China; GhostNet; Profitable 327 $aThe Boston Marathon Bombing: Keep Calm and Carry On 330 $a Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon bombing, the NSA's ubiquitous surveillance programs, Chinese cyber-attacks, the privacy of cloud computing, and how to hack the Papal election. Timely as an Internet news report and always insightful, Schneier explains, debunks, and draws lessons from current events t 606 $aSecurity systems 606 $aSecurity systems$vCase studies 606 $aTerrorism$vCase studies 615 0$aSecurity systems. 615 0$aSecurity systems 615 0$aTerrorism 676 $a363.28 686 $aST 277$2rvk 700 $aSchneier$b Bruce$060872 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910814311403321 996 $aCarry on$93976144 997 $aUNINA