Secrets and lies : digital security in a networked world / Bruce Schneier.
Material type: TextPublication details: Indianapolis, Ind. : Wiley, 2004.Edition: Pbk. edDescription: xxii, 414 p. ; 23 cmISBN:- 0471453803
- 9780471453802
- Digital security in a networked world
- QA76.9.A25 S352 2000
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | MAIN General | AUE Library Collection | QA76.9.A25 S352 2000 (Browse shelf(Opens below)) | 1 | Available | 10023821 | ||
Books | MAIN General | AUE Library Collection | QA76.9.A25 S352 2000 (Browse shelf(Opens below)) | 2 | Available | 10023841 |
"With new information about post-9/11 security."--Cover.
Originally published: 2000.
Book copyrighted 2000, Chapters 1 and Introduction are copyrighted 2004.
Includes bibliographical references and index.
An expert in cryptography and electronic security explores computer systems and threats, the hacker mindset, threat modeling, preventative technologies, and the implementation of security systems.
1.. Introduction -- Part 1. The Landscape -- 2.. Digital Threats -- 3.. Attacks -- 4.. Adversaries -- 5.. Security Needs -- Part 2. Technologies -- 6.. Cryptography -- 7.. Cryptography in Context -- 8.. Computer Security -- 9.. Identification and Authentication -- 10.. Networked-Computer Security -- 11.. Network Security -- 12.. Network Defenses -- 13.. Software Reliability -- 14.. Secure Hardware -- 15.. Certificates and Credentials -- 16.. Security Tricks -- 17.. The Human Factor -- Part 3. Strategies -- 18.. Vulnerabilities and the Vulnerability Landscape -- 19.. Threat Modeling and Risk Assessment -- 20.. Security Policies and Countermeasures -- 21.. Attack Trees -- 22.. Product Testing and Verification -- 23.. The Future of Products -- 24.. Security Processes -- 25.. Conclusion.
There are no comments on this title.