In this book the author presents ten key laws governing information
security. He addresses topics such as attacks, vulnerabilities,
threats, designing security, identifying key IP assets,
authentication, and social engineering. The informal style draws on
his experience in the area of video protection and DRM, while the
text is supplemented with introductions to the core formal
technical ideas. It will be of interest to professionals and
researchers engaged with information security.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!