Hacking the Hacker. Grimes Roger A.

Читать онлайн.
Название Hacking the Hacker
Автор произведения Grimes Roger A.
Жанр Зарубежная образовательная литература
Серия
Издательство Зарубежная образовательная литература
Год выпуска 0
isbn 9781119396222



Скачать книгу

passwords based on the personal risk to themselves. Employees rarely get fired for using bad password policies. Even if a hacker steals the end‐user’s banking funds, usually they are immediately replaced. Schneier taught us that it’s us, the computer security professionals, who don’t understand the real risk. And until the real risk actually causes the end‐user harm, they won’t voluntarily change their behavior. How’s that for thinking you were the expert on a subject and it turns out the end‐user understood the risk better?

      He is the author of over 12 books, including such early books as 1996’s Applied Cryptography: Protocols, Algorithms and Source Code in C (https://www.amazon.com/Applied‐Cryptography‐Protocols‐Algorithms‐Source/dp/1119096723). He wrote a few other books on cryptography (including a couple with Niels Ferguson), but Schneier also began to follow his long‐time interest in the larger reasons why computer security was not being improved. The result was a series of books, each exploring the non‐technical reasons (trust, economics, sociology, and so on) for the continued weakness. They are filled with easy‐to‐understand theory and elucidated by example stories. Here are my favorite general‐interest Schneier books:

      ● Secrets and Lies: Digital Security in a Networked World (https://www.amazon.com/Secrets‐Lies‐Digital‐Security‐Networked/dp/0471453803)

      ● Beyond Fear: Thinking Sensibly About Security in an Uncertain World (https://www.amazon.com/Beyond‐Fear‐Thinking‐Sensibly‐Uncertain/dp/0387026207)

      ● Liars and Outliers: Enabling the Trust that Society Needs to Thrive (https://www.amazon.com/Liars‐Outliers‐Enabling‐Society‐Thrive/dp/1118143302/)

      ● Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World (https://www.amazon.com/Data‐Goliath‐Battles‐Collect‐Control/dp/039335217X/)

      If you really want to understand computer security, why it isn’t better, and its impending problems, you should read these books. You should also read Schneier’s blog (https://www.schneier.com/) and subscribe to his monthly Crypto‐Gram newsletter (https://www.schneier.com/crypto‐gram/). There is a markedly improved difference in the quality of people who regularly read Schneier compared to those who don’t. His writing style is accessible and entertaining, and he doesn’t suffer the purveyors of “fake” security lightly. His past “Doghouse” takedowns on crypto‐frauds are lessons in themselves. He writes regularly on the most important issues of the day.

      Конец ознакомительного фрагмента.

      Текст предоставлен ООО «ЛитРес».

      Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.

      Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.

/9j/4AAQSkZJRgABAQEBLAEsAAD/2wBDAAQCAwMDAgQDAwMEBAQEBQkGBQUFBQsICAYJDQsNDQ0LDAwOEBQRDg8TDwwMEhgSExUWFxcXDhEZGxkWGhQWFxb/2wBDAQQEBAUFBQoGBgoWDwwPFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhb/wAARCAAiAJ8DASIAAhEBAxEB/8QAHwAAAQUBAQEBAQEAAAAAAAAAAAECAwQFBgcICQoL/8QAtRAAAgEDAwIEAwUFBAQAAAF9AQIDAAQRBRIhMUEGE1FhByJxFDKBkaEII0KxwRVS0fAkM2JyggkKFhcYGRolJicoKSo0NTY3ODk6Q0RFRkdISUpTVFVWV1hZWmNkZWZnaGlqc3R1dnd4eXqDhIWGh4iJipKTlJWWl5iZmqKjpKWmp6ipqrKztLW2t7i5usLDxMXGx8jJytLT1NXW19jZ2uHi4+Tl5ufo6erx8vP09fb3+Pn6/8QAHwEAAwEBAQEBAQEBAQAAAAAAAAECAwQFBgcICQoL/8QAtREAAgECBAQDBAcFBAQAAQJ3AAECAxEEBSExBhJBUQdhcRMiMoEIFEKRobHBCSMzUvAVYnLRChYkNOEl8RcYGRomJygpKjU2Nzg5OkNERUZHSElKU1RVVldYWVpjZGVmZ2hpanN0dXZ3eHl6goOEhYaHiImKkpOUlZaXmJmaoqOkpaanqKmqsrO0tba3uLm6wsPExcbHyMnK0tPU1dbX2Nna4uPk5ebn6Onq8vP09fb3+Pn6/9oADAMBAAIRAxEAPwDh/wDgqNp/xA+E/wAd7fUvDPjrxTYeHPFls11Z2sGt3CRWs8ZCzxIofCqN0bgDgeZgcCvuT9ijX7HxN+yn4E1ezvpL55NEgjvbiaZpZJLuNfLuC7MSSxmWTOa4v