TY - BOOK AU - Schneier,Bruce TI - Secrets and lies: digital security in a networked world SN - 0471453803 AV - QA76.9.A25 S352 2000 PY - 2004/// CY - Indianapolis, Ind. PB - Wiley KW - Computer security KW - Computer networks KW - Security measures N1 - "With new information about post-9/11 security."--Cover; Originally published: 2000; Book copyrighted 2000, Chapters 1 and Introduction are copyrighted 2004; Includes bibliographical references and index; 1.. Introduction -- Part 1. The Landscape -- 2.. Digital Threats -- 3.. Attacks -- 4.. Adversaries -- 5.. Security Needs -- Part 2. Technologies -- 6.. Cryptography -- 7.. Cryptography in Context -- 8.. Computer Security -- 9.. Identification and Authentication -- 10.. Networked-Computer Security -- 11.. Network Security -- 12.. Network Defenses -- 13.. Software Reliability -- 14.. Secure Hardware -- 15.. Certificates and Credentials -- 16.. Security Tricks -- 17.. The Human Factor -- Part 3. Strategies -- 18.. Vulnerabilities and the Vulnerability Landscape -- 19.. Threat Modeling and Risk Assessment -- 20.. Security Policies and Countermeasures -- 21.. Attack Trees -- 22.. Product Testing and Verification -- 23.. The Future of Products -- 24.. Security Processes -- 25.. Conclusion N2 - An expert in cryptography and electronic security explores computer systems and threats, the hacker mindset, threat modeling, preventative technologies, and the implementation of security systems ER -