Sorry, this item is not available in
Image not available for
Color:
Image not available

To view this video download Flash Player

 


or
Sign in to turn on 1-Click ordering
Kindle Edition
Read instantly on your iPad, PC, Mac, Android tablet or Kindle Fire
Buy Price: $17.27
Rent From: $8.36
 
 
 
More Buying Choices
Have one to sell? Sell yours here

Beautiful Security: Leading Security Experts Explain How They Think [Paperback]

Andy Oram , John Viega
4.7 out of 5 stars  See all reviews (11 customer reviews)

List Price: $39.99
Price: $36.75 & FREE Shipping. Details
You Save: $3.24 (8%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
In Stock.
Ships from and sold by Amazon.com. Gift-wrap available.
Want it Monday, July 14? Choose One-Day Shipping at checkout. Details
Free Two-Day Shipping for College Students with Amazon Student

Formats

Amazon Price New from Used from
 
Kindle Edition
Rent from
$17.27
$8.36
 
Paperback $36.75  
Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Book Description

May 8, 2009 0596527489 978-0596527488 1
In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found unusual solutions for writing secure code, designing secure applications, addressing modern challenges such as wireless security and Internet vulnerabilities, and much more. Among the book's wide-ranging topics, you'll learn how new and more aggressive security measures work--and where they will lead us. Topics include:
  • Rewiring the expectations and assumptions of organizations regarding security
  • Security as a design requirement
  • Evolution and new projects in Web of Trust
  • Legal sanctions to enforce security precautions
  • An encryption/hash system for protecting user data
  • The criminal economy for stolen information
  • Detecting attacks through context

Go beyond the headlines, hype, and hearsay. With Beautiful Security, you'll delve into the techniques, technology, ethics, and laws at the center of the biggest revolution in the history of network security. It's a useful and far-reaching discussion you can't afford to miss.


Frequently Bought Together

Beautiful Security: Leading Security Experts Explain How They Think + The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Price for both: $48.32

Buy the selected items together


Editorial Reviews

About the Author

Andy Oram is an editor at O'Reilly Media, a highly respected book publisher and technology information provider. An employee of the company since 1992, Andy currently specializes in free software and open source technologies. His work for O'Reilly includes the first books ever published commercially in the United States on Linux, and the 2001 title Peer-to-Peer. His modest programming and system administration skills are mostly self-taught.

John is CTO of the SaaS Business Unit at McAfee, his second stint at McAfee. Previously, he was their Chief Security Architect, after which he founded and served as CEO of Stonewall Software, which focused on making anti-virus technology faster, better and cheaper. John was also the founder of Secure Software (now part of Fortify).

John is author of many security books, including Building Secure Software (Addison-Wesley), Network Security with OpenSSL (O'Reilly), and the forthcoming Myths of Security (O'Reilly). He is responsible for numerous software security tools and is the original author of Mailman, the GNU mailing list manager. He has done extensive standards work in the IEEE and IETF and co-invented GCM, a cryptographic algorithm that NIST has standardized. John is also an active advisor to several security companies, including Fortify and Bit9. He holds a MS and BA from the University of Virginia.

Product Details

  • Paperback: 302 pages
  • Publisher: O'Reilly Media; 1 edition (May 8, 2009)
  • Language: English
  • ISBN-10: 0596527489
  • ISBN-13: 978-0596527488
  • Product Dimensions: 9.2 x 6.9 x 0.8 inches
  • Shipping Weight: 1.2 pounds (View shipping rates and policies)
  • Average Customer Review: 4.7 out of 5 stars  See all reviews (11 customer reviews)
  • Amazon Best Sellers Rank: #438,392 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Most Helpful Customer Reviews
22 of 23 people found the following review helpful
5.0 out of 5 stars Security: Bureaucratic drudgery or exciting career? June 28, 2009
Format:Paperback
This collection of essays is a very clearly written introduction to a number of current topics and techniques in computer security. It is not a how-to book, but it includes several case studies and gives you a good idea of what is happening in the field. For the most part the book does not assume prior knowledge in the field, although occasionally a bit of hacker or security jargon is used without being defined.

For me the most interesting chapters were the one with case studies. In this book you will learn how to steal people's credit card numbers at airports (run a cut-rate WiFi access point), how to scan for malicious websites without getting infected (harder than it looks, and a constant battle of measures and countermeasures), and the true history of Pretty Good Privacy, as told by its inventor, Phil Zimmermann (not as lurid as the versions you have probably heard, but still full of twists and turns). You'll learn the going rates for stolen personal and financial information (not that much, so if you're going to steal it, you need to steal a lot) and how to run your own cyber money-laundering network (which seems to be where most of the money and the risk is). Microsoft plays a prominent role in the book, sometimes as hero, sometimes as chump.

The layout and production of the book are very good, and it has a good index (a glossary would have been nice, too). I have a couple of minor gripes: the book is set in itty-bitty type (I measured it at 8 points on 12 point line spacing); and although the book has two editors, the preface is written in the first person singular (apparently by Oram, but this is not stated).
Read more ›
Comment | 
Was this review helpful to you?
4 of 5 people found the following review helpful
Format:Paperback
Beautiful Security is full of pertinent information for all of us. The book is well written, covers topics we need to know about, is very readable. Start with the first entry by Mudge: his perspective is accurate and revealing and of course he writes well so enjoy the new insights you gain by reading this book. Highly recommended.
Comment | 
Was this review helpful to you?
1 of 1 people found the following review helpful
Format:Paperback|Verified Purchase
Recently I have been asked by a lot of people how do you get in the security field? I used to say a lot of hard work and a lot of luck. My new answer is going to be to read this book and see if you are interested in the field. The book covers a wide variety of subjects across all of information security that are really quite useful. Some of these areas you won't learn a lot if you are in that particular field, but even if you are in security I am sure you will learn a lot. I learned quite a bit on the sections on metrics and software security. This is a great book to have to be able to lend to people with an interest in entering the field.
Comment | 
Was this review helpful to you?
1 of 1 people found the following review helpful
Format:Paperback
BEAUTIFUL SECURITY: LEADING SECURITY EXPERTS EXPLAIN HOW THEY THINK provides a collection of essays on digital security and comes from experts who explain how social networking and other popular trends hurt online security efforts - and how to design new networks around these trends. Analysis of criminal attempts and logic patterns offer network security libraries a solid set of case histories and examples of how to build better security measures. Highly recommended.
Comment | 
Was this review helpful to you?
1 of 1 people found the following review helpful
Format:Paperback
Like O'Reilly's Beautiful Teams, this book's a series of essays by industry experts, this time focused on security. The various authors do a great job of covering topics from social engineering to forcing firms to focus on security. The chapters are all well-written, although a few do better jobs of keeping the material interesting and flowing.

You'll find plenty of security-related history in the book. Phil Zimmerman's chapter on PGP's Web Of Trust is one example. Pieter Zatko's discussion of his work on the LH0phtCrack is another. Both stories help expose mindsets which, sadly, haven't changed a whole lot.

Security, as with testing or overall quality, is at its most fundamental roots a culture issue. Not every story focuses on this aspect, but pointing out bad culture is a common theme through many of the chapters. Zatko's discussion of "Learned Helplessness," John McManus's Security by Design, and Jim Routh's Forcing Firms to Focus are all great reads on this line. Many of the stories correctly emphasize that security isn't just about someone hacking code - it's a much broader issue.

As with any good security book, there's plenty of well-done content which will likely scare you in to re-thinking how you and your company approach security. Beautiful Security can help you identify practices, problems, and mindsets which leave you, your company, or your clients at risk.

Overall it's a very useful, highly readable book on a critical subject.
Comment | 
Was this review helpful to you?
7 of 10 people found the following review helpful
5.0 out of 5 stars An eye-opening book that will challenge you July 6, 2009
Format:Paperback
Books that collect chapters from numerous expert authors often fail to do more than be a collection of disjointed ideas. Simply combining expert essays does not always make for an interesting, cohesive read. Beautiful Security: Leading Security Experts Explain How They Think is an exception to that and is definitely worth a read. The books 16 chapters provide an interesting overview to the current and future states of security, risk and privacy. Each chapter is written by an established expert in the field and each author brings their own unique insights and approach to information security.

A premise of the book is that most people don't give security much attention until their personal or business systems are attacked or breached. The book notes that criminals often succeed by exercising enormous creativity when devising their attacks. They think outside of the box which the security people built to keep them out. Those who create defenses around digital assets must similarly use creativity when designing an information security solution.

Unfortunately, far too few organizations spend enough time thinking creatively about security. More often than not, it is simply about deploying a firewall and hoping the understaffed security team can deal with the rest of the risks.

The 16 essays, arranged in no particular theme are meant to show how fascinating information security can be. This is in defense to how security is often perceived, as an endless series of dialogue boxes and warnings, or some other block to keep a user from the web site or device they want to access. Each of the 16 essays is well-written, organized and well-argued. The following 4 chapter are particularly noteworthy.
Read more ›
Comment | 
Was this review helpful to you?
Most Recent Customer Reviews
Search Customer Reviews
Search these reviews only

What Other Items Do Customers Buy After Viewing This Item?


Forums

Topic From this Discussion
An author and someone who commented on the back cover of the book itself...
Ethics seems to be dead these days.
Nov 10, 2010 by Rusty Shackleford |  See all 2 posts
Have something you'd like to share about this product?
Start a new discussion
Topic:
First post:
Prompts for sign-in
 


Search Customer Discussions
Search all Amazon discussions


Look for Similar Items by Category