It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_columbia

Record ID marc_columbia/Columbia-extract-20221130-014.mrc:24276479:3041
Source marc_columbia
Download Link /show-records/marc_columbia/Columbia-extract-20221130-014.mrc:24276479:3041?format=raw

LEADER: 03041cam a22003614a 4500
001 6615329
005 20221122042340.0
008 071231t20082008nju b 001 0 eng
010 $a 2007052580
020 $a0321502787 (hardback : alk. paper)
020 $a9780321502780 (hardback : alk. paper)
024 $a40015352156
035 $a(OCoLC)ocn181142577
035 $a(OCoLC)181142577
035 $a(NNC)6615329
035 $a6615329
040 $aDLC$cDLC$dBTCTA$dBAKER$dYDXCP$dC#P$dOrLoB-B
050 00 $aHD30.2$b.S563 2008
082 00 $a658.4/78$222
100 1 $aShostack, Adam.$0http://id.loc.gov/authorities/names/n2007091500
245 14 $aThe new school of information security /$cAdam Shostack and Andrew Stewart.
260 $aUpper Saddle River, NJ :$bAddison-Wesley,$c[2008], ©2008.
300 $axiv, 238 pages ;$c24 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
504 $aIncludes bibliographical references (p. 213-228) and index.
505 00 $tObserving the World and Asking Why -- $tSpam, and Other Problems with Email -- $tHostile Code -- $tSecurity Breaches -- $tIdentity and the Theft of Identity -- $tShould We Just Start Over? -- $tThe Need for a New School -- $tThe Security Industry -- $tWhere the Security Industry Comes From -- $tOrientations and Framing -- $tWhat Does the Security Industry Sell? -- $tHow Security Is Sold -- $tOn Evidence -- $tThe Trouble with Surveys -- $tThe Trade Press -- $tVulnerabilities -- $tInstrumentation on the Internet -- $tOrganizations and Companies with Data -- $tThe Rise of the Security Breach -- $tHow Do Companies Lose Data? -- $tDisclose Breaches -- $tPossible Criticisms of Breach Data -- $tMoving from Art to Science -- $tGet Involved -- $tAmateurs Study Cryptography: Professionals Study Economics -- $tThe Economics of Information Security -- $tPsychology -- $tSociology -- $tSpending -- $tReasons to Spend on Security Today -- $tNon-Reasons to Spend on Security -- $tEmerging Reasons to Spend -- $tHow Much Should a Business Spend on Security? -- $tThe Psychology of Spending -- $tOn What to Spend -- $tLife in the New School -- $tPeople Are People -- $tBreach Data Is Not Actuarial Data -- $tPowerful Externalities -- $tThe Human Computer Interface and Risk Compensation -- $tThe Use and Abuse of Language -- $tSkills Shortages, Organizational Structure, and Collaboration -- $tA Call to Action -- $tJoin the New School -- $tEmbrace the New School -- $tMake Money from the New School.
650 0 $aInformation technology$xSecurity measures.$0http://id.loc.gov/authorities/subjects/sh2009127217
650 0 $aComputer security.$0http://id.loc.gov/authorities/subjects/sh90001862
650 0 $aComputer security equipment industry.$0http://id.loc.gov/authorities/subjects/sh92004015
650 0 $aBusiness$xData processing$xSecurity measures.$0http://id.loc.gov/authorities/subjects/sh2009117958
700 1 $aStewart, Andrew,$d1975-$0http://id.loc.gov/authorities/names/n2008002152
852 00 $boff,bus$hHD30.2$i.S563 2008