Ten Laws for Security
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protecti...
Main Author: | Diehl, Eric (Author) |
---|---|
Corporate Author: | SpringerLink (Online service) |
Format: | Electronic eBook |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2016.
|
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Similar Items
-
Watermarking Security
by: Bas, Patrick, et al.
Published: (2016) -
Trusted Computing Platforms TPM2.0 in Context /
by: Proudler, Graeme, et al.
Published: (2014) -
The Hash Function BLAKE
by: Aumasson, Jean-Philippe, et al.
Published: (2014) -
Security for Cloud Storage Systems
by: Yang, Kan, et al.
Published: (2014) -
Building the Infrastructure for Cloud Security A Solutions view /
by: Yeluri, Raghu, et al.
Published: (2014)