Advertisement

Table of contents

  1. Front Matter
    Pages i-xix
  2. Eric Diehl
    Pages 45-66
  3. Eric Diehl
    Pages 67-79
  4. Eric Diehl
    Pages 81-123
  5. Eric Diehl
    Pages 125-140
  6. Eric Diehl
    Pages 173-205
  7. Eric Diehl
    Pages 229-240
  8. Back Matter
    Pages 257-281

About this book

Introduction

In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.

Keywords

Attacks Authentication Content Protection Cryptography DVDs IP assets Information security Internet security Security design Social engineering Threats Video Vulnerabilities Watermarking

Authors and affiliations

  • Eric┬áDiehl
    • 1
  1. 1.Sony Pictures EntertainmentCulver CityUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-42641-9
  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-42639-6
  • Online ISBN 978-3-319-42641-9
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace