10 Things That Used to be Good Ideas in Data Security

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book 10 Things That Used to be Good Ideas in Data Security by Mike Winkler, Mike Winkler
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Mike Winkler ISBN: 9781311371751
Publisher: Mike Winkler Publication: July 30, 2014
Imprint: Smashwords Edition Language: English
Author: Mike Winkler
ISBN: 9781311371751
Publisher: Mike Winkler
Publication: July 30, 2014
Imprint: Smashwords Edition
Language: English

Data security has two objectives and only two: To keep our company’s assets safe from improper users, and to make it available to the proper ones.
We continually make the same human nature mistakes again and again in pursuit of these two deceptively complex objectives. In 10 Things that Used to be Good Ideas in Data Security, author Mike Winkler discusses how we let old ideas, some of which used to be good, keep us from making the right decisions; social inertia meets the pace of unending change. Data sec is a huge puzzle; a puzzle in which the edges keep moving, the shapes of the pieces change, and no matter how good or fast we are, the puzzle will never be finished in time, because it is never finished.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Data security has two objectives and only two: To keep our company’s assets safe from improper users, and to make it available to the proper ones.
We continually make the same human nature mistakes again and again in pursuit of these two deceptively complex objectives. In 10 Things that Used to be Good Ideas in Data Security, author Mike Winkler discusses how we let old ideas, some of which used to be good, keep us from making the right decisions; social inertia meets the pace of unending change. Data sec is a huge puzzle; a puzzle in which the edges keep moving, the shapes of the pieces change, and no matter how good or fast we are, the puzzle will never be finished in time, because it is never finished.

More books from Application Software

Cover of the book Excel 2019 & VBA pour les Nuls, mégapoche by Mike Winkler
Cover of the book Adobe Digital Imaging How-Tos: 100 Essential Techniques for Photoshop CS5, Lightroom 3, and Camera Raw 6 by Mike Winkler
Cover of the book Die Rhetorik der netzbasierten Innovation by Mike Winkler
Cover of the book Fundamentos de Octave by Mike Winkler
Cover of the book Stealing the Network: How to Own an Identity by Mike Winkler
Cover of the book Curves and Surfaces for CAGD by Mike Winkler
Cover of the book PCI DSS: A Pocket Guide by Mike Winkler
Cover of the book Applications and Techniques in Information Security by Mike Winkler
Cover of the book Mastering SciPy by Mike Winkler
Cover of the book E-Learning and Games by Mike Winkler
Cover of the book Mastering Entity Framework by Mike Winkler
Cover of the book Threats, Countermeasures, and Advances in Applied Information Security by Mike Winkler
Cover of the book Computer Vision – ECCV 2018 Workshops by Mike Winkler
Cover of the book Make Paperbacks with CreateSpace: Sell More Books on Amazon by Mike Winkler
Cover of the book Adobe Premiere Pro CC Classroom in a Book by Mike Winkler
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy