10 Things That Used to be Good Ideas in Data Security

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book 10 Things That Used to be Good Ideas in Data Security by Mike Winkler, Mike Winkler
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Mike Winkler ISBN: 9781311371751
Publisher: Mike Winkler Publication: July 30, 2014
Imprint: Smashwords Edition Language: English
Author: Mike Winkler
ISBN: 9781311371751
Publisher: Mike Winkler
Publication: July 30, 2014
Imprint: Smashwords Edition
Language: English

Data security has two objectives and only two: To keep our company’s assets safe from improper users, and to make it available to the proper ones.
We continually make the same human nature mistakes again and again in pursuit of these two deceptively complex objectives. In 10 Things that Used to be Good Ideas in Data Security, author Mike Winkler discusses how we let old ideas, some of which used to be good, keep us from making the right decisions; social inertia meets the pace of unending change. Data sec is a huge puzzle; a puzzle in which the edges keep moving, the shapes of the pieces change, and no matter how good or fast we are, the puzzle will never be finished in time, because it is never finished.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Data security has two objectives and only two: To keep our company’s assets safe from improper users, and to make it available to the proper ones.
We continually make the same human nature mistakes again and again in pursuit of these two deceptively complex objectives. In 10 Things that Used to be Good Ideas in Data Security, author Mike Winkler discusses how we let old ideas, some of which used to be good, keep us from making the right decisions; social inertia meets the pace of unending change. Data sec is a huge puzzle; a puzzle in which the edges keep moving, the shapes of the pieces change, and no matter how good or fast we are, the puzzle will never be finished in time, because it is never finished.

More books from Application Software

Cover of the book Advanced R by Mike Winkler
Cover of the book Let's (not) Play. Wie Games noch als Video faszinieren by Mike Winkler
Cover of the book Information Security Breaches by Mike Winkler
Cover of the book Computer Security by Mike Winkler
Cover of the book Die Seuquenzanalyse des Covers von Nirvanas 'Nevermind'. Interpretation der emotionalen Reaktion by Mike Winkler
Cover of the book Inventing the Cloud Century by Mike Winkler
Cover of the book Information Warfare by Mike Winkler
Cover of the book PowerPoint 真.密技字典 by Mike Winkler
Cover of the book Qualitätswandel des Kommunizierens - Vom Morsegerät bis zum Internet by Mike Winkler
Cover of the book Flash 8: The Missing Manual by Mike Winkler
Cover of the book ETABS 2016 Black Book by Mike Winkler
Cover of the book Designing Bots by Mike Winkler
Cover of the book Enterprise Information Systems by Mike Winkler
Cover of the book Sicher surfen per VPN by Mike Winkler
Cover of the book Mobile Security and Privacy by Mike Winkler
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy