Skip to content

Beautiful Security Leading Security Experts Explain How They Think

Best in textbook rentals since 2012!

ISBN-10: 0596527489

ISBN-13: 9780596527488

Edition: 2008

Authors: Andy Oram, John Viega, Andy Oram

List price: $39.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

With the ever-increasing risks and rewards in today's networked world, new and more aggressive forms of defending networks have evolved. No longer content to take and assess damage after an attack, companies are looking at measured responses to protect their networks while under attack. Regardless of what you call it, whether it's aggressive self-defense or vigilantism, these techniques and technology are at the center of the biggest revolution in the history of network security. This book shows you why they are not only feasible but inevitable. In "Self-Defending Networks," the luminaries and pioneers of network security take you beyond the headlines, hype, and hearsay to provide insight…    
Customers also bought

Book details

List price: $39.99
Copyright year: 2008
Publisher: O'Reilly Media, Incorporated
Publication date: 5/19/2009
Binding: Paperback
Pages: 300
Size: 7.05" wide x 9.13" long x 0.83" tall
Weight: 1.188
Language: English

Preface
Psychological Security Traps
Learned Helplessness and Na�vet�
Confirmation Traps
Functional Fixation
Summary
Wireless Networking: Fertile Ground for Social Engineering
Easy Money
Wireless Gone Wild
Still, Wireless is the Future
Beautiful Security Metrics
Security Metrics by Analogy: Health
Security Metrics by Example
Summary
The Underground Economy of Security Breaches
The Makeup and Infrastructure of the Cyber Underground
The Payoff
How Can We Combat This Growing Underground Economy?
Summary
Beautiful Trade: Rethinking E-Commerce Security
Deconstructing Commerce
Weak Amelioration Attempts
E-Commerce Redone: A New Security Model
The New Model
Securing Online Advertising: Rustlers and sheriffs in The New Wild West
Attacks on Users
Advertisers As Victims
Creating Accountability in Online Advertising
The Evolution of PGP's Web of Trust
PGP and OpenPGP
Trust, Validity, and Authority
PGP and Crypto History
Enhancements to the Original Web of Trust Model
Interesting Areas for Further Research
References
Open Source Honeyclient: Proactive Detection of Client-Side Exploits
Enter Honeyclients
Introducing the World's First Open Source Honeyclient
Second-Generation Honeyclients
Honeyclient Operational Results
Analysis of Exploits
Limitations of the Current Honeyclient Implementation
Related Work
The Future of Honeyclients
Tomorrow's Security Cogs and Levers
Cloud Computing and Web Services: The Single Machine Is Here
Connecting People, Process, and Technology: The Potential for Business Process Management
Social Networking: When People Start Communicating, Big Things Change
Information Security Economics: Supercrunching and the New Rules of the Grid
Platforms of the Long-Tail Variety: Why the Future Will Be Different for Us All
Conclusion
Acknowledgments
Security By Design
Metrics with No Meaning
Time to Market or Time to Quality?
How a Disciplined System Development Lifecycle Can Help
Conclusion: Beautiful Security Is an Attribute of Beautiful Systems
Forcing Firms to Focus: Is Secure Software in Your Future?
Implicit Requirements Can Still Be Powerful
How One Firm Came to Demand Secure Software
Enforcing Security in Off-the-Shelf Software
Analysis: How to Make the World's Software More Secure
Oh No, Here Come The Infosecurity Lawyers!
Culture
Balance
Communication
Doing the Right Thing
Beautiful Log Handling
Logs in Security Laws and Standards
Focus on Logs
When Logs Are Invaluable
Challenges with Logs
Case Study: Behind a Trashed Server
Future Logging
Conclusions
Incident Detection: Finding The Other 68%
A Common Starting Point
Improving Detection with Context
Improving Perspective with Host Logging
Summary
Doing Real Work Without Real Data
How Data Translucency Works
A Real-Life Example
Personal Data Stored As a Convenience
Trade-offs
Going Deeper
References
Casting Spells: PC Security Theater
Growing Attacks, Defenses in Retreat
The Illusion Revealed
Better Practices for Desktop Security
Conclusion
Contributors
Index