Cargando…
Web security: a whitehat perspective
MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an...
Autores principales: | , |
---|---|
Lenguaje: | eng |
Publicado: |
CRC Press
2015
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2018948 |
_version_ | 1780946773565505536 |
---|---|
author | Wu, Hanqing Zhao, Liz |
author_facet | Wu, Hanqing Zhao, Liz |
author_sort | Wu, Hanqing |
collection | CERN |
description | MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an Ongoing ProcessSecurity ElementsHow to Implement Safety AssessmentAsset ClassificationThreat AnalysisRisk AnalysisDesign of Security ProgramsArt of War of White HatPrinciples of Secure by DefaultBlacklist, WhitelistPrinciple of Least PrivilegePrinciple of Defense in DepthPrinciples of Data and Code |
id | cern-2018948 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2015 |
publisher | CRC Press |
record_format | invenio |
spelling | cern-20189482021-04-21T20:18:32Zhttp://cds.cern.ch/record/2018948engWu, HanqingZhao, LizWeb security: a whitehat perspectiveComputing and ComputersMY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an Ongoing ProcessSecurity ElementsHow to Implement Safety AssessmentAsset ClassificationThreat AnalysisRisk AnalysisDesign of Security ProgramsArt of War of White HatPrinciples of Secure by DefaultBlacklist, WhitelistPrinciple of Least PrivilegePrinciple of Defense in DepthPrinciples of Data and Code CRC Pressoai:cds.cern.ch:20189482015 |
spellingShingle | Computing and Computers Wu, Hanqing Zhao, Liz Web security: a whitehat perspective |
title | Web security: a whitehat perspective |
title_full | Web security: a whitehat perspective |
title_fullStr | Web security: a whitehat perspective |
title_full_unstemmed | Web security: a whitehat perspective |
title_short | Web security: a whitehat perspective |
title_sort | web security: a whitehat perspective |
topic | Computing and Computers |
url | http://cds.cern.ch/record/2018948 |
work_keys_str_mv | AT wuhanqing websecurityawhitehatperspective AT zhaoliz websecurityawhitehatperspective |