In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found unusual solutions for writing secure code, designing secure applications, addressing modern challenges such as wireless security and Internet vulnerabilities, and much more. Among the book's wide-ranging topics, you'll learn how new and more aggressive security measures work--and where they will lead us. Topics include: Go beyond the headlines, hype, and hearsay. With Beautiful Security , you'll delve into the techniques, technology, ethics, and laws at the center of the biggest revolution in the history of network security. It's a useful and far-reaching discussion you can't afford to miss.
This book is a collection of 16 essays from different writers. Essays were fairly short and well written. However, I found only about one third of the essays interesting. Especially Mudge's "Psychological Security Traps" and Curphey's "Tomorrow's Security Cogs and Levers" were great. Other topics included for example security metrics, honeyclients, evolution of PGP web of trust and software security. I'm bit disappointed, because so many of essays were either trivial or non-interesting to me, but since the overall quality of texts were good, I'll recommend the book anyway.
This book was pretty bad. As with many collections of chapters by disparate authors, this quality was highly variable. There were a couple of bright spots but overall it was pretty terrible. It isn't clear who the target audience for this book is. It seems targetted at either CIOs or others who have a passing interest in very shallow security or newcomers to the field that have a business or consulting background. This book isn't very technical.
A very pragmatic book on real-world computer security issues, directed more toward black-hat intrusion than privacy or other issues. Not particularly what I was looking for, but probably perfectly good for what it is.