Ten Laws for Security
Springer International Publishing (Verlag)
978-3-319-42639-6 (ISBN)
The author is the Vice President of Media and Security Technologies at Sony Pictures Entertainment. He was formerly the Vice President of the Security and Content Protection Labs at Technicolor. His main research topics are DRM for professional applications, audio and video watermarking, video fingerprinting, secure distribution of multimedia content, and copy protection. He has more than 25 years of research experience, he has filed more than 95 patents in the field, and he is involved with the main related academic conferences as an organizer and contributor.
Introduction.- Law 1, Attackers Will Always Find Their Way.- Law 2, Know the Assets to Protect.- Law 3, No Security Through Obscurity.- Law 4, Trust No One.- Law 5, Si Vis Pacem, Para Bellum.- Law 6, You Are the Weakest Link.- Law 7, Security Is No Stronger Than Its Weakest Link.- Law 8, If You Watch the Internet, the Internet Is Watching You.- Law 9, Quis Custodiet Ipsos Custodes? Law 10, Security Is Not a Product, Security Is a Process.- Conclusions.- Abbreviations.- Acronyms.- References.- App. A, A Short Introduction to Cryptography.
"Ten laws for security approaches security standards using a framework of ten fundamental principles. ... an information security team could use these laws to establish a common vision for the goals of an information security program within an organization. Finally, through its use of cases, practical analysis, takeaways, and a detailed bibliography, this book could easily be adopted as a textbook for an upper-division or graduate class in information security management and policy." (Computing Reviews, June, 2017)
Erscheinungsdatum | 06.12.2016 |
---|---|
Zusatzinfo | XIX, 281 p. 42 illus., 3 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Attacks • authentication • Computer Science • content protection • cryptography • data encryption • DVDs • Information Security • Internet Security • IP assets • Security Design • Security Science and Technology • social engineering • systems and data security • threats • Video • Vulnerabilities • Watermarking |
ISBN-10 | 3-319-42639-7 / 3319426397 |
ISBN-13 | 978-3-319-42639-6 / 9783319426396 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich