About this book
Introduction
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.
Keywords
Attacks Authentication Content Protection Cryptography DVDs IP assets Information security Internet security Security design Social engineering Threats Video Vulnerabilities Watermarking
Bibliographic information
- DOI https://doi.org/10.1007/978-3-319-42641-9
- Copyright Information Springer International Publishing Switzerland 2016
- Publisher Name Springer, Cham
- eBook Packages Computer Science
- Print ISBN 978-3-319-42639-6
- Online ISBN 978-3-319-42641-9
- About this book
- Industry Sectors
- Automotive
- Electronics
- Telecommunications
- Consumer Packaged Goods
- Aerospace