\(
\def\WIPO{World Intellectual Property Organisation}
\)
Secrets and lies : digital security in a networked world / Bruce Schneier.
2004
D 102 SCH.S
Details
Title
Secrets and lies : digital security in a networked world / Bruce Schneier.
Description
xxiii, 414 pages ; 28 cm.
ISBN
0471253111
9781119183631 electronic book
1119183634 electronic book
9781118075074
1118075072
9780471253112 alk. paper
0471453803 paperback
9781118082270 electronic book
1118082273 electronic book
9780470226261
0470226269
0471117099 [v. 1] rústica
9780471117094 [v. 1] rústica
9780471453802 [v. 2] rústica
0471223573 [v. 3] papel no ácido
9780471223573 [v. 3] papel no ácido
9781119183631 electronic book
1119183634 electronic book
9781118075074
1118075072
9780471253112 alk. paper
0471453803 paperback
9781118082270 electronic book
1118082273 electronic book
9780470226261
0470226269
0471117099 [v. 1] rústica
9780471117094 [v. 1] rústica
9780471453802 [v. 2] rústica
0471223573 [v. 3] papel no ácido
9780471223573 [v. 3] papel no ácido
Alternate Call Number
D 102 SCH.S
Summary
"Information security expert Bruce Schneier explains what everyone in business needs to know about security in order to survive and be competitive. Pragmatic, interesting, and humorous, Schneier exposes the digital world and the realities of our networked society. He examines the entire system, from the reasons for technical insecurities to the minds behind malicious attacks. You'll be guided through the security war zone, and learn how to understand and arm yourself against the threats of our connected world." "Secrets and Lies offers the expert guidance you'll need to make the right choices about securing your digital self."--Jacket.
Note
"With new information about post-9/11 security."--Cover.
Book copyrighted 2000, Chapters 1 and Introduction are copyrighted 2004.
Wiley Computer Publishing.
Originally published: 2000. Reprint with new introduction.
"Wiley computer publishing".
Subtítol a coberta: "Digital security in a networked world. With new information about post-9/11 security.".
Titel op stofomslag: Secrets & lies.
THE LANDSCAPE. Digital Threats. Attacks. Adversaries. Security Needs. TECHNOLOGIES. Cryptography. Cryptography in Context. Computer Security. Identification and Authentication. Networked-Computer Security. Network Security. Network Defenses. Software Reliability. Secure Hardware. Certificates and Credentials. Security Tricks. The Human Factor. STRATEGIES. Vulnerabilities and the Vulnerability Landscape. Threat Modeling and Risk Assessment. Security Policies and Countermeasures. Attack Trees. Product Testing and Verification. The Future of Products. Security Processes. Conclusion. Afterword. Resources. Index.
Book copyrighted 2000, Chapters 1 and Introduction are copyrighted 2004.
Wiley Computer Publishing.
Originally published: 2000. Reprint with new introduction.
"Wiley computer publishing".
Subtítol a coberta: "Digital security in a networked world. With new information about post-9/11 security.".
Titel op stofomslag: Secrets & lies.
THE LANDSCAPE. Digital Threats. Attacks. Adversaries. Security Needs. TECHNOLOGIES. Cryptography. Cryptography in Context. Computer Security. Identification and Authentication. Networked-Computer Security. Network Security. Network Defenses. Software Reliability. Secure Hardware. Certificates and Credentials. Security Tricks. The Human Factor. STRATEGIES. Vulnerabilities and the Vulnerability Landscape. Threat Modeling and Risk Assessment. Security Policies and Countermeasures. Attack Trees. Product Testing and Verification. The Future of Products. Security Processes. Conclusion. Afterword. Resources. Index.
Bibliography, etc. Note
Includes bibliographical references (pages 399-400) and index.
Formatted Contents Note
Introduction
Digital threats
Attacks
Adversaries
Security needs
Cryptography
Cryptography in context
Computer security
Identification and authentication
Networked-computer security
Network security
Network defenses
Software reliability
Secure hardware
Certificates and credentials
Security tricks
The human factor
Vulnerabilities and the vulnerability landscape
Threat modeling and risk assessment
Security policies and countermeasures
Attack trees
Product testing and verification
The future of products
Security processes
Conclusion.
Digital threats
Attacks
Adversaries
Security needs
Cryptography
Cryptography in context
Computer security
Identification and authentication
Networked-computer security
Network security
Network defenses
Software reliability
Secure hardware
Certificates and credentials
Security tricks
The human factor
Vulnerabilities and the vulnerability landscape
Threat modeling and risk assessment
Security policies and countermeasures
Attack trees
Product testing and verification
The future of products
Security processes
Conclusion.
Series
Series
Schneier's cryptography classics library ; / Bruce Schneier.
Published
Indianapolis, Ind. : Wiley, [2004, 2000]
Language
English
Record Appears in
Review
"Information security expert Bruce Schneier explains what everyone in business needs to know about security in order to survive and be competitive. Pragmatic, interesting, and humorous, Schneier exposes the digital world and the realities of our networked society. He examines the entire system, from the reasons for technical insecurities to the minds behind malicious attacks. You'll be guided through the security war zone, and learn how to understand and arm yourself against the threats of our connected world." "Secrets and Lies offers the expert guidance you'll need to make the right choices about securing your digital self."--Jacket.