9780471253112

Secrets and Lies: Digital Security in a Networked World

by
  • ISBN13:

    9780471253112

  • ISBN10:

    0471253111

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 8/1/2000
  • Publisher: Wiley
  • Purchase Benefits
  • Free Shipping On Orders Over $59!
    Your order must be $59 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $29.99

Summary

Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more. Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs Explains what cryptography can and can2t do in achieving digital security

Author Biography

BRUCE SCHNEIER is CTO and cofounder of Counterpane Internet Security, Inc., the first managed security monitoring services firm. He is the bestselling author of Applied Cryptography (Wiley) and a contributor to numerous business and technical publications. Schneier is also a frequent keynote speaker at conferences, and a creator of the Blowfish and Twofish encryption algorithms.

Table of Contents

Preface xi
Acknowledgments xv
Introduction
1(10)
PART 1: THE LANDSCAPE 11(72)
Digital Threats
14(9)
Attacks
23(19)
Adversaries
42(17)
Security Needs
59(24)
PART 2: TECHNOLOGIES 83(188)
Cryptography
85(17)
Cryptography in Context
102(18)
Computer Security
120(15)
Identification and Authentication
135(16)
Networked-Computer Security
151(25)
Network Security
176(12)
Network Defenses
188(14)
Software Reliability
202(10)
Secure Hardware
212(13)
Certificates and Credentials
225(15)
Security Tricks
240(15)
The Human Factor
255(16)
PART 3: STRATEGIES 271(125)
Vulnerabilities and the Vulnerability Landscape
274(14)
Threat Modeling and Risk Assessment
288(19)
Security Policies and Countermeasures
307(11)
Attack Trees
318(16)
Product Testing and Verification
334(19)
The Future of Products
353(14)
Security Processes
367(22)
Conclusion
389(7)
Afterword 396(3)
Resources 399(2)
Index 401

Rewards Program

Write a Review