Image from Google Jackets

Secrets and lies : digital security in a networked world / Bruce Schneier.

By: Material type: TextTextPublication details: Indianapolis, Ind. : Wiley, 2004.Edition: Pbk. edDescription: xxii, 414 p. ; 23 cmISBN:
  • 0471453803
  • 9780471453802
Other title:
  • Digital security in a networked world
Subject(s): LOC classification:
  • QA76.9.A25  S352 2000
Contents:
1.. Introduction -- Part 1. The Landscape -- 2.. Digital Threats -- 3.. Attacks -- 4.. Adversaries -- 5.. Security Needs -- Part 2. Technologies -- 6.. Cryptography -- 7.. Cryptography in Context -- 8.. Computer Security -- 9.. Identification and Authentication -- 10.. Networked-Computer Security -- 11.. Network Security -- 12.. Network Defenses -- 13.. Software Reliability -- 14.. Secure Hardware -- 15.. Certificates and Credentials -- 16.. Security Tricks -- 17.. The Human Factor -- Part 3. Strategies -- 18.. Vulnerabilities and the Vulnerability Landscape -- 19.. Threat Modeling and Risk Assessment -- 20.. Security Policies and Countermeasures -- 21.. Attack Trees -- 22.. Product Testing and Verification -- 23.. The Future of Products -- 24.. Security Processes -- 25.. Conclusion.
Summary: An expert in cryptography and electronic security explores computer systems and threats, the hacker mindset, threat modeling, preventative technologies, and the implementation of security systems.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books MAIN General AUE Library Collection QA76.9.A25 S352 2000 (Browse shelf(Opens below)) 1 Available 10023821
Books Books MAIN General AUE Library Collection QA76.9.A25 S352 2000 (Browse shelf(Opens below)) 2 Available 10023841
Browsing MAIN shelves, Shelving location: General, Collection: AUE Library Collection Close shelf browser (Hides shelf browser)
QA76.9 .A25 S35 1996 Applied cryptography : QA76.9 .A25 S35 1996 Applied cryptography : QA76.9.A25 S352 2000 Secrets and lies : QA76.9.A25 S352 2000 Secrets and lies : QA76.9 .A25 S3523 2007 Information assurance for the enterprise : QA76.9 .A25 S3523 2007 Information assurance for the enterprise : QA76.9.A25 S55 2011 Hands-on ethical hacking and network defense /

"With new information about post-9/11 security."--Cover.

Originally published: 2000.

Book copyrighted 2000, Chapters 1 and Introduction are copyrighted 2004.

Includes bibliographical references and index.

An expert in cryptography and electronic security explores computer systems and threats, the hacker mindset, threat modeling, preventative technologies, and the implementation of security systems.

1.. Introduction -- Part 1. The Landscape -- 2.. Digital Threats -- 3.. Attacks -- 4.. Adversaries -- 5.. Security Needs -- Part 2. Technologies -- 6.. Cryptography -- 7.. Cryptography in Context -- 8.. Computer Security -- 9.. Identification and Authentication -- 10.. Networked-Computer Security -- 11.. Network Security -- 12.. Network Defenses -- 13.. Software Reliability -- 14.. Secure Hardware -- 15.. Certificates and Credentials -- 16.. Security Tricks -- 17.. The Human Factor -- Part 3. Strategies -- 18.. Vulnerabilities and the Vulnerability Landscape -- 19.. Threat Modeling and Risk Assessment -- 20.. Security Policies and Countermeasures -- 21.. Attack Trees -- 22.. Product Testing and Verification -- 23.. The Future of Products -- 24.. Security Processes -- 25.. Conclusion.

There are no comments on this title.

to post a comment.