عرض عادي

Beyond fear : thinking sensibly about security in an uncertain world / Bruce Schneier.

بواسطة:نوع المادة : نصنصالناشر:New York : Copernicus Books, 2003وصف:295 pages ; 24 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 0387026207 (hbk)
الموضوع:تصنيف مكتبة الكونجرس:
  • HV6432 S36 2003
موارد على الانترنت:
المحتويات:
pt. 1. Sensible security -- 1. All security involves trade-offs -- 2. Security trade-offs are subjective -- 3. Security trade-offs depend on power and agenda -- part 2. How security works -- 4. Systems and how they fail -- 5. Knowing the attackers -- 6. Attackers never change their tunes, just their instruments -- 7. Technology creates security imbalances -- 8. Security is a weakest-link problem -- 9. Brittleness makes for bad security -- 10. Security revolves around people -- 11. Detection works where prevention fails -- 12. Detection is useless without response -- 13. Identification, authentication, and authorization -- 14. All countermeasures have some value, but no countermeasure is perfect -- 15. Fighting terrorism -- part 3. The game of security -- 16. Negotiating for security -- 17. Security demystified.
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة HV6432 S36 2003 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30010000088964
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة HV6432 S36 2003 (إستعراض الرف(يفتح أدناه)) C.2 المتاح 30010000088968

Includes bibliographical references and index.

pt. 1. Sensible security -- 1. All security involves trade-offs -- 2. Security trade-offs are subjective -- 3. Security trade-offs depend on power and agenda -- part 2. How security works -- 4. Systems and how they fail -- 5. Knowing the attackers -- 6. Attackers never change their tunes, just their instruments -- 7. Technology creates security imbalances -- 8. Security is a weakest-link problem -- 9. Brittleness makes for bad security -- 10. Security revolves around people -- 11. Detection works where prevention fails -- 12. Detection is useless without response -- 13. Identification, authentication, and authorization -- 14. All countermeasures have some value, but no countermeasure is perfect -- 15. Fighting terrorism -- part 3. The game of security -- 16. Negotiating for security -- 17. Security demystified.

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة