Description
How the basic elements of cryptography, protocols, and access control translate to the new world of phones, cloud services, social media and the Internet of Things
Who the attackers are 每 from nation states and business competitors through criminal gangs to stalkers and playground bullies
What they do 每 from phishing and carding through SIM swapping and software exploits to DDoS and fake news
Security psychology, from privacy through ease-of-use to deception
The economics of security and dependability 每 why companies build vulnerable systems and governments look the other way
How dozens of industries went online 每 well or badly
How to manage security and safety engineering in a world of agile development 每 from reliability engineering to DevSecOps








Reviews
There are no reviews yet.