Record ID | marc_loc_updates/v38.i38.records.utf8:10827278:1768 |
Source | Library of Congress |
Download Link | /show-records/marc_loc_updates/v38.i38.records.utf8:10827278:1768?format=raw |
LEADER: 01768nam a22003257a 4500
001 2010275793
003 DLC
005 20100916165910.0
008 100304s2009 caua b 001 0 eng c
010 $a 2010275793
015 $aGBA868263$2bnb
016 7 $a014621056$2Uk
020 $a9780596527488 (pbk.)
020 $a0596527489 (pbk.)
035 $a(OCoLC)ocn150370629
040 $aUKM$cUKM$dBTCTA$dBAKER$dYDXCP$dBWX$dCDX$dTXA$dCOO$dVP@$dYBM$dDLC
042 $apcc
050 00 $aTK5105.59$b.B424 2009
245 00 $aBeautiful security /$cedited by Andy Oram and John Viega.
246 1 $iCover subtitle :$aLeading security experts explain how they think
250 $a1st ed.
260 $aSebastopol, CA :$bO'Reilly,$cc2009.
300 $axv, 281 p. :$bill. ;$c24 cm.
490 1 $aTheory in practice
504 $aIncludes bibliographical references and index.
505 0 $aPsychological security traps -- Wireless networking: fertile ground for social engineering -- Beautiful security metrics -- The underground economy of security breaches -- Beautiful trade: rethinking E-commerce security -- Securing online advertising: rustlers and sheriffs in the new wild west -- The evolution of PGP's web of trust -- Open source honeyclient: proactive detection of client-side exploits -- Tomorrow's security cogs and levers -- Security by design -- Forcing firms to focus: is secure software in your future? -- Oh no, here come the infosecurity lawyers! -- Beautiful log handling -- Incident detection: Finding the other 68% -- Doing real work without real data -- Casting spells: PC security theater.
650 0 $aComputer networks$xSecurity measures.
700 1 $aOram, Andrew.
700 1 $aViega, John.
830 0 $aTheory in practice (Sebastopol, Calif.)