Securing the Digital Frontier
Securing the Digital Frontier
Cyber Security for Responsible Citizens and Strategic Thinkers
Martin, Andrew
Oxford University Press
05/2025
288
Dura
Inglês
9780198920137
15 a 20 dias
Descrição não disponível.
List of Figures
0. Mind Your Cybers: Introduction
Interlude I. DigiNotar: A Cautionary Tale
1. Was It Encrypted?: Applied Cryptography
2. We're Only Human: Human Factors
INTERLUDE II. Guessing Passwords
3. In the Round: Secure Systems
4. Know Your Enemy: Adversarial Behaviours
5. Choose Your Priorities: Risk Management
INTERLUDE III. Identity
6. Permission Denied: Authentication, Authorization,and Accountability
7. Who's Watching You?: Privacy and Online Rights
Interlude IV. Phil Zimmermann and Pretty Good Privacy
8. Shall I love Big Brother?: Law and Regulation
9. Getting Ahead of the Bear: Security Operations and Incident Management
10. It's All in Code: 'Software Security'
Interlude V. Device and Service Identity
11. Connections are Crucial: Network Security
12. No More White Coats: Operating Systems Security
13. Software with Malice: Malware and Attack Technologies
Interlude VI. Stuxnet: Cyber Weapons Come of Age
14. No One is in Charge of the Chains?: Distributed Systems and Distributed Ledgers
15. I Don't Want a Turing Machine: Hardware Security
Interlude VII. Turing Machine: A Conceptual Computer
16. The Internet of Everything: Cyber-Physical Systems
Afterword
Acknowledgements
Glossary
Books for Further Reading
Papers and Reports
Resources
Index
0. Mind Your Cybers: Introduction
Interlude I. DigiNotar: A Cautionary Tale
1. Was It Encrypted?: Applied Cryptography
2. We're Only Human: Human Factors
INTERLUDE II. Guessing Passwords
3. In the Round: Secure Systems
4. Know Your Enemy: Adversarial Behaviours
5. Choose Your Priorities: Risk Management
INTERLUDE III. Identity
6. Permission Denied: Authentication, Authorization,and Accountability
7. Who's Watching You?: Privacy and Online Rights
Interlude IV. Phil Zimmermann and Pretty Good Privacy
8. Shall I love Big Brother?: Law and Regulation
9. Getting Ahead of the Bear: Security Operations and Incident Management
10. It's All in Code: 'Software Security'
Interlude V. Device and Service Identity
11. Connections are Crucial: Network Security
12. No More White Coats: Operating Systems Security
13. Software with Malice: Malware and Attack Technologies
Interlude VI. Stuxnet: Cyber Weapons Come of Age
14. No One is in Charge of the Chains?: Distributed Systems and Distributed Ledgers
15. I Don't Want a Turing Machine: Hardware Security
Interlude VII. Turing Machine: A Conceptual Computer
16. The Internet of Everything: Cyber-Physical Systems
Afterword
Acknowledgements
Glossary
Books for Further Reading
Papers and Reports
Resources
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
List of Figures
0. Mind Your Cybers: Introduction
Interlude I. DigiNotar: A Cautionary Tale
1. Was It Encrypted?: Applied Cryptography
2. We're Only Human: Human Factors
INTERLUDE II. Guessing Passwords
3. In the Round: Secure Systems
4. Know Your Enemy: Adversarial Behaviours
5. Choose Your Priorities: Risk Management
INTERLUDE III. Identity
6. Permission Denied: Authentication, Authorization,and Accountability
7. Who's Watching You?: Privacy and Online Rights
Interlude IV. Phil Zimmermann and Pretty Good Privacy
8. Shall I love Big Brother?: Law and Regulation
9. Getting Ahead of the Bear: Security Operations and Incident Management
10. It's All in Code: 'Software Security'
Interlude V. Device and Service Identity
11. Connections are Crucial: Network Security
12. No More White Coats: Operating Systems Security
13. Software with Malice: Malware and Attack Technologies
Interlude VI. Stuxnet: Cyber Weapons Come of Age
14. No One is in Charge of the Chains?: Distributed Systems and Distributed Ledgers
15. I Don't Want a Turing Machine: Hardware Security
Interlude VII. Turing Machine: A Conceptual Computer
16. The Internet of Everything: Cyber-Physical Systems
Afterword
Acknowledgements
Glossary
Books for Further Reading
Papers and Reports
Resources
Index
0. Mind Your Cybers: Introduction
Interlude I. DigiNotar: A Cautionary Tale
1. Was It Encrypted?: Applied Cryptography
2. We're Only Human: Human Factors
INTERLUDE II. Guessing Passwords
3. In the Round: Secure Systems
4. Know Your Enemy: Adversarial Behaviours
5. Choose Your Priorities: Risk Management
INTERLUDE III. Identity
6. Permission Denied: Authentication, Authorization,and Accountability
7. Who's Watching You?: Privacy and Online Rights
Interlude IV. Phil Zimmermann and Pretty Good Privacy
8. Shall I love Big Brother?: Law and Regulation
9. Getting Ahead of the Bear: Security Operations and Incident Management
10. It's All in Code: 'Software Security'
Interlude V. Device and Service Identity
11. Connections are Crucial: Network Security
12. No More White Coats: Operating Systems Security
13. Software with Malice: Malware and Attack Technologies
Interlude VI. Stuxnet: Cyber Weapons Come of Age
14. No One is in Charge of the Chains?: Distributed Systems and Distributed Ledgers
15. I Don't Want a Turing Machine: Hardware Security
Interlude VII. Turing Machine: A Conceptual Computer
16. The Internet of Everything: Cyber-Physical Systems
Afterword
Acknowledgements
Glossary
Books for Further Reading
Papers and Reports
Resources
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.