Cargando…

Web security: a whitehat perspective

MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an...

Descripción completa

Detalles Bibliográficos
Autores principales: Wu, Hanqing, Zhao, Liz
Lenguaje:eng
Publicado: CRC Press 2015
Materias:
Acceso en línea:http://cds.cern.ch/record/2018948
_version_ 1780946773565505536
author Wu, Hanqing
Zhao, Liz
author_facet Wu, Hanqing
Zhao, Liz
author_sort Wu, Hanqing
collection CERN
description MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an Ongoing ProcessSecurity ElementsHow to Implement Safety AssessmentAsset ClassificationThreat AnalysisRisk AnalysisDesign of Security ProgramsArt of War of White HatPrinciples of Secure by DefaultBlacklist, WhitelistPrinciple of Least PrivilegePrinciple of Defense in DepthPrinciples of Data and Code
id cern-2018948
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2015
publisher CRC Press
record_format invenio
spelling cern-20189482021-04-21T20:18:32Zhttp://cds.cern.ch/record/2018948engWu, HanqingZhao, LizWeb security: a whitehat perspectiveComputing and ComputersMY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an Ongoing ProcessSecurity ElementsHow to Implement Safety AssessmentAsset ClassificationThreat AnalysisRisk AnalysisDesign of Security ProgramsArt of War of White HatPrinciples of Secure by DefaultBlacklist, WhitelistPrinciple of Least PrivilegePrinciple of Defense in DepthPrinciples of Data and Code CRC Pressoai:cds.cern.ch:20189482015
spellingShingle Computing and Computers
Wu, Hanqing
Zhao, Liz
Web security: a whitehat perspective
title Web security: a whitehat perspective
title_full Web security: a whitehat perspective
title_fullStr Web security: a whitehat perspective
title_full_unstemmed Web security: a whitehat perspective
title_short Web security: a whitehat perspective
title_sort web security: a whitehat perspective
topic Computing and Computers
url http://cds.cern.ch/record/2018948
work_keys_str_mv AT wuhanqing websecurityawhitehatperspective
AT zhaoliz websecurityawhitehatperspective