Secrets and lies : digital security in a networked world /
Digital security in a networked world.
Bruce Schneier.
- Pbk. ed.
- Indianapolis, Ind. : Wiley, 2004.
- xxii, 414 p. ; 23 cm.
"With new information about post-9/11 security."--Cover. Originally published: 2000. Book copyrighted 2000, Chapters 1 and Introduction are copyrighted 2004.
Includes bibliographical references and index.
1.. Introduction -- Part 1. The Landscape -- 2.. Digital Threats -- 3.. Attacks -- 4.. Adversaries -- 5.. Security Needs -- Part 2. Technologies -- 6.. Cryptography -- 7.. Cryptography in Context -- 8.. Computer Security -- 9.. Identification and Authentication -- 10.. Networked-Computer Security -- 11.. Network Security -- 12.. Network Defenses -- 13.. Software Reliability -- 14.. Secure Hardware -- 15.. Certificates and Credentials -- 16.. Security Tricks -- 17.. The Human Factor -- Part 3. Strategies -- 18.. Vulnerabilities and the Vulnerability Landscape -- 19.. Threat Modeling and Risk Assessment -- 20.. Security Policies and Countermeasures -- 21.. Attack Trees -- 22.. Product Testing and Verification -- 23.. The Future of Products -- 24.. Security Processes -- 25.. Conclusion.
An expert in cryptography and electronic security explores computer systems and threats, the hacker mindset, threat modeling, preventative technologies, and the implementation of security systems.