PERHAPS A GIFT VOUCHER FOR MUM?: MOTHER'S DAY

Close Notification

Your cart does not contain any items

Ten Laws for Security

Eric Diehl

$130.95   $105.07

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
Springer International Publishing AG
28 April 2018
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.

By:  
Imprint:   Springer International Publishing AG
Country of Publication:   Switzerland
Edition:   Softcover reprint of the original 1st ed. 2016
Dimensions:   Height: 235mm,  Width: 155mm,  Spine: 16mm
Weight:   4.628kg
ISBN:   9783319826257
ISBN 10:   3319826255
Pages:   281
Publication Date:  
Audience:   Professional and scholarly ,  Undergraduate
Format:   Paperback
Publisher's Status:   Active

The author is the Vice President of Media and Security Technologies at Sony Pictures Entertainment. He was formerly the Vice President of the Security and Content Protection Labs at Technicolor. His main research topics are DRM for professional applications, audio and video watermarking, video fingerprinting, secure distribution of multimedia content, and copy protection. He has more than 25 years of research experience, he has filed more than 95 patents in the field, and he is involved with the main related academic conferences as an organizer and contributor.

Reviews for Ten Laws for Security

Ten laws for security approaches security standards using a framework of ten fundamental principles. ... an information security team could use these laws to establish a common vision for the goals of an information security program within an organization. Finally, through its use of cases, practical analysis, takeaways, and a detailed bibliography, this book could easily be adopted as a textbook for an upper-division or graduate class in information security management and policy. (Computing Reviews, June, 2017)


See Also