Summary
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more. Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs Explains what cryptography can and can2t do in achieving digital security
Author Biography
BRUCE SCHNEIER is CTO and cofounder of Counterpane Internet Security, Inc., the first managed security monitoring services firm. He is the bestselling author of Applied Cryptography (Wiley) and a contributor to numerous business and technical publications. Schneier is also a frequent keynote speaker at conferences, and a creator of the Blowfish and Twofish encryption algorithms.
Table of Contents
| Preface |
|
xi | |
| Acknowledgments |
|
xv | |
|
|
|
1 | (10) |
| PART 1: THE LANDSCAPE |
|
11 | (72) |
|
|
|
14 | (9) |
|
|
|
23 | (19) |
|
|
|
42 | (17) |
|
|
|
59 | (24) |
| PART 2: TECHNOLOGIES |
|
83 | (188) |
|
|
|
85 | (17) |
|
|
|
102 | (18) |
|
|
|
120 | (15) |
|
Identification and Authentication |
|
|
135 | (16) |
|
Networked-Computer Security |
|
|
151 | (25) |
|
|
|
176 | (12) |
|
|
|
188 | (14) |
|
|
|
202 | (10) |
|
|
|
212 | (13) |
|
Certificates and Credentials |
|
|
225 | (15) |
|
|
|
240 | (15) |
|
|
|
255 | (16) |
| PART 3: STRATEGIES |
|
271 | (125) |
|
Vulnerabilities and the Vulnerability Landscape |
|
|
274 | (14) |
|
Threat Modeling and Risk Assessment |
|
|
288 | (19) |
|
Security Policies and Countermeasures |
|
|
307 | (11) |
|
|
|
318 | (16) |
|
Product Testing and Verification |
|
|
334 | (19) |
|
|
|
353 | (14) |
|
|
|
367 | (22) |
|
|
|
389 | (7) |
| Afterword |
|
396 | (3) |
| Resources |
|
399 | (2) |
| Index |
|
401 | |