0471253111 9781119183631 electronic book 1119183634 electronic book 9781118075074 1118075072 9780471253112 alk. paper 0471453803 paperback 9781118082270 electronic book 1118082273 electronic book 9780470226261 0470226269 0471117099 [v. 1] rústica 9780471117094 [v. 1] rústica 9780471453802 [v. 2] rústica 0471223573 [v. 3] papel no ácido 9780471223573 [v. 3] papel no ácido
Alternate Call Number
D 102 SCH.S
Summary
"Information security expert Bruce Schneier explains what everyone in business needs to know about security in order to survive and be competitive. Pragmatic, interesting, and humorous, Schneier exposes the digital world and the realities of our networked society. He examines the entire system, from the reasons for technical insecurities to the minds behind malicious attacks. You'll be guided through the security war zone, and learn how to understand and arm yourself against the threats of our connected world." "Secrets and Lies offers the expert guidance you'll need to make the right choices about securing your digital self."--Jacket.
Note
"With new information about post-9/11 security."--Cover. Book copyrighted 2000, Chapters 1 and Introduction are copyrighted 2004. Wiley Computer Publishing. Originally published: 2000. Reprint with new introduction. "Wiley computer publishing". Subtítol a coberta: "Digital security in a networked world. With new information about post-9/11 security.". Titel op stofomslag: Secrets & lies. THE LANDSCAPE. Digital Threats. Attacks. Adversaries. Security Needs. TECHNOLOGIES. Cryptography. Cryptography in Context. Computer Security. Identification and Authentication. Networked-Computer Security. Network Security. Network Defenses. Software Reliability. Secure Hardware. Certificates and Credentials. Security Tricks. The Human Factor. STRATEGIES. Vulnerabilities and the Vulnerability Landscape. Threat Modeling and Risk Assessment. Security Policies and Countermeasures. Attack Trees. Product Testing and Verification. The Future of Products. Security Processes. Conclusion. Afterword. Resources. Index.
Bibliography, etc. Note
Includes bibliographical references (pages 399-400) and index.
Formatted Contents Note
Introduction Digital threats Attacks Adversaries Security needs Cryptography Cryptography in context Computer security Identification and authentication Networked-computer security Network security Network defenses Software reliability Secure hardware Certificates and credentials Security tricks The human factor Vulnerabilities and the vulnerability landscape Threat modeling and risk assessment Security policies and countermeasures Attack trees Product testing and verification The future of products Security processes Conclusion.
"Information security expert Bruce Schneier explains what everyone in business needs to know about security in order to survive and be competitive. Pragmatic, interesting, and humorous, Schneier exposes the digital world and the realities of our networked society. He examines the entire system, from the reasons for technical insecurities to the minds behind malicious attacks. You'll be guided through the security war zone, and learn how to understand and arm yourself against the threats of our connected world." "Secrets and Lies offers the expert guidance you'll need to make the right choices about securing your digital self."--Jacket.