Zen and the Art of Information Security -  Ira Winkler

Zen and the Art of Information Security (eBook)

(Autor)

eBook Download: PDF
2011 | 1. Auflage
192 Seiten
Elsevier Science (Verlag)
978-0-08-055474-7 (ISBN)
Systemvoraussetzungen
25,53 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler's experiences making security understandable to the business world. Mr. Winkler is one of the most popular and highly rated speakers in the field of security, and lectures to tens of thousands of people a year. Zen and the Art of Information Security is based on one of his most well received international presentations.

*Written by an internationally renowned author of Spies Among Us who travels the world making security presentations to tens of thousands of people a year
* This short and concise book is specifically for the business, consumer, and technical user short on time but looking for the latest information along with reader friendly analogies
* Describes the REAL security threats that you have to worry about, and more importantly, what to do about them
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler's experiences making security understandable to the business world. Mr. Winkler is one of the most popular and highly rated speakers in the field of security, and lectures to tens of thousands of people a year. Zen and the Art of Information Security is based on one of his most well received international presentations. - Written by an internationally renowned author of Spies Among Us who travels the world making security presentations to tens of thousands of people a year- This short and concise book is specifically for the business, consumer, and technical user short on time but looking for the latest information along with reader friendly analogies- Describes the REAL security threats that you have to worry about, and more importantly, what to do about them

Front Cover 1
Zen and the Art of Information Security 6
Copyright Page 7
Contents 14
Introduction 20
Why You Shouldn't Buy This Book 20
Chapter 1. Zen and the Art of Cybersecurity 26
Philosophy of Security 32
Chapter 2. Why l Don't Like the Title of This Book 34
What Makes a Scientist 35
Why Some People are Better Scientists 37
Putting it All Together 41
Applying Science 42
Chapter 3. What is Security? 44
Risk 45
What is a Security Program? 55
Optimizing Risk 56
Consciously Accept Risk 60
Chapter 4. A Bad Question 62
Value has Nothing to do With Computers 64
A Typical Security Budget 65
Determining A Security Budget 66
Multiyear Budgets 67
Remind the CIO the I means Information 67
Making Risk a Conscious Decision 68
Chapter 5. What Makes a Master 70
Mastering Computer Security 73
Chapter 6. Knights and Dragons 82
The FUD Factor 84
Dragons Forgive Incompetency 85
Terrorists Really Aren't That Good 86
The People You Really Have to Worry About 88
Look for Snakes, Not Dragons 91
Don't Suffer Death By 1,000 Cuts 91
Chapter 7. Cyberterrorism is Not Effective 94
Anthrax vs. Nimda 96
It is Easier to Blow Things Up 97
What is a Terrorist? 98
Chapter 8. Common Sense and Common Knowledge 100
Wanting Benefit Without the Associated Costs 102
Some People Are Just Stupid 105
The Wizard of Oz 106
Chapter 9. Never Underestimate the Stupidity of a Criminal 110
There is a Difference Between Being Good and Being Effective 117
Understanding your Adversary 118
The Criminal Mindset 125
Your Kids are Notas Smart as You Think 128
Chapter 10. Information Security Is INFORMATION Security 130
Chapter 11. Is Security a Should or a Must? 134
Management Must Believe Security is a Must 138
So is Security a Should or a Must For You? 139
Chapter 12. If You Don't Remember History, You Will Repeat It 142
Chapter 13. Ira's Golden Rules 148
Take Responsibility 149
Decide Security is a Must 150
Educate Yourself 151
Remember, You are Protecting Information 151
Protecting Your Computer 152
Note on Security Software 156
The 95/5 Rule 157
Chapter 14. Chance Favors the Prepared 158
Ubiquitous Security 159
The Purpose of This Book 160
Technology is Still Important 161
Security is Really Risk Management 161
Be Responsible 162
Appendix A: Critical Moments in Computer Security History 164
Index 170
Syngress: The Definition of a Serious Security Library 179

PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99