Stories about hacking, stolen credit card numbers, computer viruses, andidentity theft are all around us, but what do they really mean to us? The goal ofthis book, quite simply, is to help educate people on the issues with high-techcrimes, to help answer that question. The goal being not to only talk aboutthese issues, but understand them.There are many books on the market that explain how hackers exploitcomputer and networks. They explain the details of the exploits and methodsto protect against them, and as such are targeted for those with strong technicalknowledge. That is *not* the case here. Readers will not learn the intricacies ofthe latest hacking attack. Readers will learn how hackers use these exploits, whythey use them, and in some cases how they get caught.With Branigan's background as a sworn law-enforcement officer (cop), systemadministrator (geek), computer programmer (geek), Internet security consultant(geek with tie), and network security researcher (geek in shorts), he offers aunique perspective to help people better understand the many issues with hightechcrime and how they might be affected.
Shows you how to safeguard digital possessions. This book is a practical guide to the essentials of computer cryptography. It explains secret keys and secret key methods like DES, public and private keys, and public key methods like RSA; how keys are distributed through digital certificates; and three real-world systems.
This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version.
The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations
Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.
Continue reading “Security Metrics: Replacing Fear, Uncertainty, and Doubt”
You already know the endless list of security "do's and don'ts": run AV software and firewalls, lock everything down, encrypt everything, watch all your network traffic, follow checklists… But even if you're spending a fortune doing all that, you're at greater risk than ever: even the world's most security-focused organizations are being victimized by massive attacks. Something is terribly wrong. We're protecting the wrong things, damaging productivity, and making it way too hard for our people to help us.
Today, getting security right requires more than checklists; it requires careful thinking about your actual threats and technologies. That's what this book is about: how to think about security. Most security books just give you "do's and don'ts." Thinking Security tells you why, and helps you design a security architecture that truly fits your organization.
Continue reading “Thinking Security: Stopping Next Year’s Hackers (Addison-Wesley Professional Computing Series)”