Table of contents

  1. Front Matter
    Pages i-xix
  2. Eric Diehl
    Pages 45-66
  3. Eric Diehl
    Pages 67-79
  4. Eric Diehl
    Pages 81-123
  5. Eric Diehl
    Pages 125-140
  6. Eric Diehl
    Pages 173-205
  7. Eric Diehl
    Pages 229-240
  8. Back Matter
    Pages 257-281

About this book


In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.


Attacks Authentication Content Protection Cryptography DVDs IP assets Information security Internet security Security design Social engineering Threats Video Vulnerabilities Watermarking

Authors and affiliations

  • Eric┬áDiehl
    • 1
  1. 1.Sony Pictures EntertainmentCulver CityUSA

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-42639-6
  • Online ISBN 978-3-319-42641-9
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software
Consumer Packaged Goods