10 Things That Used to be Good Ideas in Data Security

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book 10 Things That Used to be Good Ideas in Data Security by Mike Winkler, Mike Winkler
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Mike Winkler ISBN: 9781311371751
Publisher: Mike Winkler Publication: July 30, 2014
Imprint: Smashwords Edition Language: English
Author: Mike Winkler
ISBN: 9781311371751
Publisher: Mike Winkler
Publication: July 30, 2014
Imprint: Smashwords Edition
Language: English

Data security has two objectives and only two: To keep our company’s assets safe from improper users, and to make it available to the proper ones.
We continually make the same human nature mistakes again and again in pursuit of these two deceptively complex objectives. In 10 Things that Used to be Good Ideas in Data Security, author Mike Winkler discusses how we let old ideas, some of which used to be good, keep us from making the right decisions; social inertia meets the pace of unending change. Data sec is a huge puzzle; a puzzle in which the edges keep moving, the shapes of the pieces change, and no matter how good or fast we are, the puzzle will never be finished in time, because it is never finished.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Data security has two objectives and only two: To keep our company’s assets safe from improper users, and to make it available to the proper ones.
We continually make the same human nature mistakes again and again in pursuit of these two deceptively complex objectives. In 10 Things that Used to be Good Ideas in Data Security, author Mike Winkler discusses how we let old ideas, some of which used to be good, keep us from making the right decisions; social inertia meets the pace of unending change. Data sec is a huge puzzle; a puzzle in which the edges keep moving, the shapes of the pieces change, and no matter how good or fast we are, the puzzle will never be finished in time, because it is never finished.

More books from Application Software

Cover of the book Aufgaben und Ziele des Service Catalogue Management nach ITIL by Mike Winkler
Cover of the book The Finite Element Analysis Program MSC Marc/Mentat by Mike Winkler
Cover of the book Spinning Up ServiceNow by Mike Winkler
Cover of the book Jim Blinn's Corner: Notation, Notation, Notation by Mike Winkler
Cover of the book Getting Started with VMware Virtual SAN by Mike Winkler
Cover of the book Digital Signal Processing with Matlab Examples, Volume 2 by Mike Winkler
Cover of the book Parameter Estimation and Inverse Problems by Mike Winkler
Cover of the book Introducing Autodesk Maya 2016 by Mike Winkler
Cover of the book Electronic Multimedia Publishing by Mike Winkler
Cover of the book Trustworthy Execution on Mobile Devices by Mike Winkler
Cover of the book Excel 2007 VBA Programmer's Reference by Mike Winkler
Cover of the book Hacking the Code by Mike Winkler
Cover of the book Windows 8 by Mike Winkler
Cover of the book Web Application Firewall Assurance by Mike Winkler
Cover of the book Financial Cryptography and Data Security by Mike Winkler
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy