Monday, April 18, 2011

Geekonomics: The Real Cost of Insecure Software







Publisher: Addison-Wesley | pages: 384 | 2007 | ISBN: 0321477898 | File type: PDF | 53 mb

Information Security is an issue that concerns governments, companies and, increasingly, citizens. Are the computer systems and software to which we entrust our sensitive and critical information, technologies that are out of control? David Rice has written an impotant and welcome book that goes to the heart of this issue, and points to solutions that society as a whole needs to debate and embrace. Rice reveals why the software industry is rewarded for carelessness, and how we can revamp the industry’s incentives to get the reliability and security we desperately need and deserve. You’ll discover why the software industry still has shockingly little accountability–and what we must do to fix that. Brilliantly written, utterly compelling, and thoroughly realistic, Geekonomics is a long-overdue call to arms. Whether you’re software user, decision maker, employee, or business owner this book will change your life…or even save it.

Table of Contents
 
Copyright
Dedication
Praise for Geekonomics: The Real Cost of Insecure Software
Preface
Acknowledgments
About the Author
Chapter 1. The Foundation of Civilization
Software and Cement
In the Shadow of Utility
Fragile Analogies
Chapter 2. Six Billion Crash Test Dummies: Irrational Innovation and Perverse Incentives
The Story of Crash Test Dummies
Five Stars and Rising
You Can Learn a Lot From a Dummy
Private Benefits, Social Costs
Market Failure Martini, Straight Up
The Need for Speed
The Perversity of Patching
Irrationally New
Market Failure Martini, with a Twist of Lemon
Wrap Up: The Martini Hangover
Chapter 3. The Power of Weaknesses: Broken Windows and National Security
Only the Stupid Are Caught
An Underground Market
Numbers Don’t Always Measure
Fraud and Terror
Information’s War
The Theory of Broken Windows
Broken Upon Receipt
Blind Risk
Enter the Dragons
Evil Inside
Fixing Broken Windows
Chapter 4. Myopic Oversight: Blinded by Speed, Baffled by Churn
The Law of Churn, the Decree of Speed
Free Hands Have Consequences
X-Rays Show More Than You Think
Don’t Slow Us Down, We Have Lives to Save
Discovered Only After the Damage Is Done
Knobs of Unknown Origin
We’ll Be Compliant, Later
Speed Blind
You Can Learn a Lot From an Interstate Highway System
A Matter of Trust
One of Skill in the Art
Chapter 5. Absolute Immunity: You Couldn’t Sue Us Even If You Wanted To
The Forces of Failure
Absolution for Dereliction
Victims of a Border War
Duty, Breach, Cause, Damage
Teleporting Tigers
The Least-Cost Avoider
Negligence Versus Strict Liability
Stripping Immunity
Strict Liability and Aeronautical Charts
The Tort of Negligent Enablement of Cyber Crime
The Verdict...
Chapter 6. Open Source Software: Free, But at What Cost?
Open and Shut
The History of Free and Open
An Incentive to Itch
The Question of Sustainable Security
Distributed Immunity: No Body to Kick, No Soul to Condemn
Doffing the Wizard Hats
Chapter 7. Moving Forward: Rational Incentives for a Different Future
Hands-off
An Inconvenient Tort
One Ring to Rule Them All
The Great Screw
A Market for Weakness
Closure
Epilogue
Notes


Another Computer Security Books
Download

No comments:

Post a Comment

Related Posts with Thumbnails

Put Your Ads Here!