Secrets and Lies: Digital Security in a Networked World by Bruce SchneierSecrets and Lies: Digital Security in a Networked World by Bruce Schneier

Secrets and Lies: Digital Security in a Networked World

byBruce Schneier

Paperback | January 30, 2004

Pricing and Purchase Info

$21.81 online 
$21.95 list price
Earn 109 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more.
* Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs
* Explains what cryptography can and can't do in achieving digital security
Bruce Schneier is the founder and CTO of Counterpane Internet Security, Inc., the recognized leader in network security services. The bestselling author of Beyond Fear: Thinking Sensibly About Security in an Uncertain World and Applied Cryptography, he is an internationally respected security expert.
Loading
Title:Secrets and Lies: Digital Security in a Networked WorldFormat:PaperbackDimensions:448 pages, 9 × 6 × 1.19 inPublished:January 30, 2004Publisher:WileyLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:0471453803

ISBN - 13:9780471453802

Reviews

Table of Contents

THE LANDSCAPE.

Digital Threats.

Attacks.

Adversaries.

Security Needs.

TECHNOLOGIES.

Cryptography.

Cryptography in Context.

Computer Security.

Identification and Authentication.

Networked-Computer Security.

Network Security.

Network Defenses.

Software Reliability.

Secure Hardware.

Certificates and Credentials.

Security Tricks.

The Human Factor.

STRATEGIES.

Vulnerabilities and the Vulnerability Landscape.

Threat Modeling and Risk Assessment.

Security Policies and Countermeasures.

Attack Trees.

Product Testing and Verification.

The Future of Products.

Security Processes.

Conclusion.

Afterword.

Resources.

Index.

Editorial Reviews

“ … The security technologies available are described in a user-friendly way without going into depth...” ("Computer Bulletin," January 2005) “ … peppered with lively anecdotes and aphorisms, making it a really accessible read...” ("The ISSG Magazine," Autumn, 2004) “ … fascinating read… peppered with lively anecdotes… ” ("The ISSG Magazine," October 2004) ..."make yourself better informed. Read this book." ("CVu, The Journal of the ACCU," Vol 16(3), June 2004)