Secrets and Lies: Digital Security in a Networked World

by
Edition: 1st
Format: Hardcover
Pub. Date: 2000-08-01
Publisher(s): Wiley
List Price: $32.09

Buy Used

In Stock
$22.49

Rent Book

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$20.40
*To support the delivery of the digital material to you, a non-refundable digital delivery fee of $3.99 will be charged on each digital item.
$20.40*

New Book

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more. Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs Explains what cryptography can and can2t do in achieving digital security

Author Biography

BRUCE SCHNEIER is CTO and cofounder of Counterpane Internet Security, Inc., the first managed security monitoring services firm. He is the bestselling author of Applied Cryptography (Wiley) and a contributor to numerous business and technical publications. Schneier is also a frequent keynote speaker at conferences, and a creator of the Blowfish and Twofish encryption algorithms.

Table of Contents

Preface xi
Acknowledgments xv
Introduction
1(10)
PART 1: THE LANDSCAPE 11(72)
Digital Threats
14(9)
Attacks
23(19)
Adversaries
42(17)
Security Needs
59(24)
PART 2: TECHNOLOGIES 83(188)
Cryptography
85(17)
Cryptography in Context
102(18)
Computer Security
120(15)
Identification and Authentication
135(16)
Networked-Computer Security
151(25)
Network Security
176(12)
Network Defenses
188(14)
Software Reliability
202(10)
Secure Hardware
212(13)
Certificates and Credentials
225(15)
Security Tricks
240(15)
The Human Factor
255(16)
PART 3: STRATEGIES 271(125)
Vulnerabilities and the Vulnerability Landscape
274(14)
Threat Modeling and Risk Assessment
288(19)
Security Policies and Countermeasures
307(11)
Attack Trees
318(16)
Product Testing and Verification
334(19)
The Future of Products
353(14)
Security Processes
367(22)
Conclusion
389(7)
Afterword 396(3)
Resources 399(2)
Index 401

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.