did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780387026206

Beyond Fear

by
  • ISBN13:

    9780387026206

  • ISBN10:

    0387026207

  • Format: Hardcover
  • Copyright: 2003-08-01
  • Publisher: Copernicus Books

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $41.99 Save up to $26.80
  • Rent Book $22.79
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 24-48 HOURS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

Beyond Fear goes beyond the hype, and explains how we all can learn to think sensibly about security. In today's uncertain world, security is too important to be left to others. Drawing from his experience advising world business and political leaders, Schneier demonstrates the practical--and surprisingly simple steps we can all take to address the real threats faced by our families, our communities, and our nation.

Author Biography

Bruce Schneier is the author of seven books, including Applied Cryptography which Wired called "the one book the National Security Agency wanted never to be published" and Secrets and Lies, described in Fortune as a "startlingly lively jewel box of little surprises you can actually use." He is also founder and Chief Technology Officer of Counterpane Internet Security, Inc., and publishes Crypto-Gram, one of the most widely read newsletters in the field of online security.

Table of Contents

Part One: Sensible Security
1. All Security Involves Trade-offs
3(14)
2. Security Trade-offs Are Subjective
17(16)
3. Security Trade-offs Depend on Power and Agenda
33(14)
Part Two: How Security Works
4. Systems and How They Fail
47(12)
5. Knowing the Attackers
59(14)
6. Attackers Never Change Their Tunes, Just Their Instruments
73(14)
7. Technology Creates Security Imbalances
87(16)
8. Security Is a Weakest-Link Problem
103(16)
9. Brittleness Makes for Bad Security
119(14)
10. Security Revolves Around People
133(14)
11. Detection Works Where Prevention Fails
147(20)
12. Detection Is Useless Without Response
167(14)
13. Identification, Authentication, and Authorization
181(26)
14. All Countermeasures Have Some Value, But No Countermeasure Is Perfect
207(26)
15. Fighting Terrorism
233(24)
Part Three: The Game of Security
16. Negotiating for Security
257(14)
17. Security Demystified
271(11)
Author's Note 282(1)
Acknowledgments 283(2)
Index 285

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program