Andrew Martin (Professor of Systems Professor of Systems Security
Securing the Digital Frontier
Cyber Security for Responsible Citizens and Strategic Thinkers
Andrew Martin (Professor of Systems Professor of Systems Security
Securing the Digital Frontier
Cyber Security for Responsible Citizens and Strategic Thinkers
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book explains why cyber security is in the state it is, with daily incidents hitting the headlines. It doesn't offer easy solutions, or attribute blame, but instead looks at the complex mix of technical and human systems which contribute to the challenge.
Andere Kunden interessierten sich auch für
Christine RosenThe Extinction of Experience16,99 €
Brad SmithTools and Weapons10,99 €
Nello CristianiniThe Shortcut26,99 €
Ray KurzweilThe Singularity is Nearer19,99 €
Peter GregoryCISM Certified Information Security Manager All-in-One Exam Guide38,99 €
Mike Chapple(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle63,99 €
Graham ThompsonCertificate of Cloud Security Knowledge (CCSK v5) Official Study Guide37,99 €-
-
-
This book explains why cyber security is in the state it is, with daily incidents hitting the headlines. It doesn't offer easy solutions, or attribute blame, but instead looks at the complex mix of technical and human systems which contribute to the challenge.
Produktdetails
- Produktdetails
- Verlag: Oxford University Press
- Seitenzahl: 288
- Erscheinungstermin: 1. Mai 2025
- Englisch
- Abmessung: 237mm x 154mm x 27mm
- Gewicht: 584g
- ISBN-13: 9780198920137
- ISBN-10: 019892013X
- Artikelnr.: 72177649
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Oxford University Press
- Seitenzahl: 288
- Erscheinungstermin: 1. Mai 2025
- Englisch
- Abmessung: 237mm x 154mm x 27mm
- Gewicht: 584g
- ISBN-13: 9780198920137
- ISBN-10: 019892013X
- Artikelnr.: 72177649
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
* List of Figures
* 0. Mind Your Cybers: Introduction
* Interlude I. DigiNotar: A Cautionary Tale
* 1. Was It Encrypted?: Applied Cryptography
* 2. We're Only Human: Human Factors
* INTERLUDE II. Guessing Passwords
* 3. In the Round: Secure Systems
* 4. Know Your Enemy: Adversarial Behaviours
* 5. Choose Your Priorities: Risk Management
* INTERLUDE III. Identity
* 6. Permission Denied: Authentication, Authorization,and
Accountability
* 7. Who's Watching You?: Privacy and Online Rights
* Interlude IV. Phil Zimmermann and Pretty Good Privacy
* 8. Shall I love Big Brother?: Law and Regulation
* 9. Getting Ahead of the Bear: Security Operations and Incident
Management
* 10. It's All in Code: 'Software Security'
* Interlude V. Device and Service Identity
* 11. Connections are Crucial: Network Security
* 12. No More White Coats: Operating Systems Security
* 13. Software with Malice: Malware and Attack Technologies
* Interlude VI. Stuxnet: Cyber Weapons Come of Age
* 14. No One is in Charge of the Chains?: Distributed Systems and
Distributed Ledgers
* 15. I Don't Want a Turing Machine: Hardware Security
* Interlude VII. Turing Machine: A Conceptual Computer
* 16. The Internet of Everything: Cyber-Physical Systems
* Afterword
* Acknowledgements
* Glossary
* Books for Further Reading
* Papers and Reports
* Resources
* Index
* 0. Mind Your Cybers: Introduction
* Interlude I. DigiNotar: A Cautionary Tale
* 1. Was It Encrypted?: Applied Cryptography
* 2. We're Only Human: Human Factors
* INTERLUDE II. Guessing Passwords
* 3. In the Round: Secure Systems
* 4. Know Your Enemy: Adversarial Behaviours
* 5. Choose Your Priorities: Risk Management
* INTERLUDE III. Identity
* 6. Permission Denied: Authentication, Authorization,and
Accountability
* 7. Who's Watching You?: Privacy and Online Rights
* Interlude IV. Phil Zimmermann and Pretty Good Privacy
* 8. Shall I love Big Brother?: Law and Regulation
* 9. Getting Ahead of the Bear: Security Operations and Incident
Management
* 10. It's All in Code: 'Software Security'
* Interlude V. Device and Service Identity
* 11. Connections are Crucial: Network Security
* 12. No More White Coats: Operating Systems Security
* 13. Software with Malice: Malware and Attack Technologies
* Interlude VI. Stuxnet: Cyber Weapons Come of Age
* 14. No One is in Charge of the Chains?: Distributed Systems and
Distributed Ledgers
* 15. I Don't Want a Turing Machine: Hardware Security
* Interlude VII. Turing Machine: A Conceptual Computer
* 16. The Internet of Everything: Cyber-Physical Systems
* Afterword
* Acknowledgements
* Glossary
* Books for Further Reading
* Papers and Reports
* Resources
* Index
* List of Figures
* 0. Mind Your Cybers: Introduction
* Interlude I. DigiNotar: A Cautionary Tale
* 1. Was It Encrypted?: Applied Cryptography
* 2. We're Only Human: Human Factors
* INTERLUDE II. Guessing Passwords
* 3. In the Round: Secure Systems
* 4. Know Your Enemy: Adversarial Behaviours
* 5. Choose Your Priorities: Risk Management
* INTERLUDE III. Identity
* 6. Permission Denied: Authentication, Authorization,and
Accountability
* 7. Who's Watching You?: Privacy and Online Rights
* Interlude IV. Phil Zimmermann and Pretty Good Privacy
* 8. Shall I love Big Brother?: Law and Regulation
* 9. Getting Ahead of the Bear: Security Operations and Incident
Management
* 10. It's All in Code: 'Software Security'
* Interlude V. Device and Service Identity
* 11. Connections are Crucial: Network Security
* 12. No More White Coats: Operating Systems Security
* 13. Software with Malice: Malware and Attack Technologies
* Interlude VI. Stuxnet: Cyber Weapons Come of Age
* 14. No One is in Charge of the Chains?: Distributed Systems and
Distributed Ledgers
* 15. I Don't Want a Turing Machine: Hardware Security
* Interlude VII. Turing Machine: A Conceptual Computer
* 16. The Internet of Everything: Cyber-Physical Systems
* Afterword
* Acknowledgements
* Glossary
* Books for Further Reading
* Papers and Reports
* Resources
* Index
* 0. Mind Your Cybers: Introduction
* Interlude I. DigiNotar: A Cautionary Tale
* 1. Was It Encrypted?: Applied Cryptography
* 2. We're Only Human: Human Factors
* INTERLUDE II. Guessing Passwords
* 3. In the Round: Secure Systems
* 4. Know Your Enemy: Adversarial Behaviours
* 5. Choose Your Priorities: Risk Management
* INTERLUDE III. Identity
* 6. Permission Denied: Authentication, Authorization,and
Accountability
* 7. Who's Watching You?: Privacy and Online Rights
* Interlude IV. Phil Zimmermann and Pretty Good Privacy
* 8. Shall I love Big Brother?: Law and Regulation
* 9. Getting Ahead of the Bear: Security Operations and Incident
Management
* 10. It's All in Code: 'Software Security'
* Interlude V. Device and Service Identity
* 11. Connections are Crucial: Network Security
* 12. No More White Coats: Operating Systems Security
* 13. Software with Malice: Malware and Attack Technologies
* Interlude VI. Stuxnet: Cyber Weapons Come of Age
* 14. No One is in Charge of the Chains?: Distributed Systems and
Distributed Ledgers
* 15. I Don't Want a Turing Machine: Hardware Security
* Interlude VII. Turing Machine: A Conceptual Computer
* 16. The Internet of Everything: Cyber-Physical Systems
* Afterword
* Acknowledgements
* Glossary
* Books for Further Reading
* Papers and Reports
* Resources
* Index







