MARC details
000 -LEADER |
fixed length control field |
01990cam a2200301Ia 4500 |
001 - CONTROL NUMBER |
control field |
a4042 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
SIRSI |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
040304r20042000inu b 001 0 eng |
019 ## - |
-- |
53393497 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0471453803 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780471453802 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(Sirsi) i9780471453802 |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
S352 2000 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Schneier, Bruce, |
Dates associated with a name |
1963- |
245 10 - TITLE STATEMENT |
Title |
Secrets and lies : |
Remainder of title |
digital security in a networked world / |
Statement of responsibility, etc. |
Bruce Schneier. |
246 30 - VARYING FORM OF TITLE |
Title proper/short title |
Digital security in a networked world. |
250 ## - EDITION STATEMENT |
Edition statement |
Pbk. ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Indianapolis, Ind. : |
Name of publisher, distributor, etc. |
Wiley, |
Date of publication, distribution, etc. |
2004. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxii, 414 p. ; |
Dimensions |
23 cm. |
500 ## - GENERAL NOTE |
General note |
"With new information about post-9/11 security."--Cover. |
500 ## - GENERAL NOTE |
General note |
Originally published: 2000. |
500 ## - GENERAL NOTE |
General note |
Book copyrighted 2000, Chapters 1 and Introduction are copyrighted 2004. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
An expert in cryptography and electronic security explores computer systems and threats, the hacker mindset, threat modeling, preventative technologies, and the implementation of security systems. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
1.. Introduction -- Part 1. The Landscape -- 2.. Digital Threats -- 3.. Attacks -- 4.. Adversaries -- 5.. Security Needs -- Part 2. Technologies -- 6.. Cryptography -- 7.. Cryptography in Context -- 8.. Computer Security -- 9.. Identification and Authentication -- 10.. Networked-Computer Security -- 11.. Network Security -- 12.. Network Defenses -- 13.. Software Reliability -- 14.. Secure Hardware -- 15.. Certificates and Credentials -- 16.. Security Tricks -- 17.. The Human Factor -- Part 3. Strategies -- 18.. Vulnerabilities and the Vulnerability Landscape -- 19.. Threat Modeling and Risk Assessment -- 20.. Security Policies and Countermeasures -- 21.. Attack Trees -- 22.. Product Testing and Verification -- 23.. The Future of Products -- 24.. Security Processes -- 25.. Conclusion. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |