Details

Secrets and Lies


Secrets and Lies

Digital Security in a Networked World
1. Aufl.

von: Bruce Schneier

19,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 25.03.2011
ISBN/EAN: 9781118082270
Sprache: englisch
Anzahl Seiten: 432

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network<br /> Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more.<br /> * Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs<br /> * Explains what cryptography can and can't do in achieving digital security
<p>Preface xi</p> <p>1. Introduction 1</p> <p><b>Part 1: The Landscape 11</b></p> <p>2. Digital Threats 14</p> <p>3. Attacks 23</p> <p>4. Adversaries 42</p> <p>5. Security Needs 59</p> <p><b>Part 2: Technologies 83</b></p> <p>6. Cryptography 85</p> <p>7. Cryptography in Context 102</p> <p>8. Computer Security 120</p> <p>9. Identification and Authentication 135</p> <p>10. Networked-computer Security 151</p> <p>11. Network Security 176</p> <p>12. Network Defenses 188</p> <p>13. Software Reliability 202</p> <p>14. Secure Hardware 212</p> <p>15. Certificates and Credentials 225</p> <p>16. Security Tricks 240</p> <p>17. The Human Factor 255</p> <p><b>Part 3: Strategies 271</b></p> <p>18. Vulnerabilities and the Vulnerability Landscape 274</p> <p>19. Threat Modeling and Risk Assessment 288</p> <p>20. Security Policies and Countermeasures 307</p> <p>21. Attack Trees 318</p> <p>22. Product Testing and Verification 334</p> <p>23. The Future of Products 353</p> <p>24. Security Processes 367</p> <p>25. Conclusion 389</p> <p>Afterword 396</p> <p>Resources 399</p> <p>Acknowledgments 401</p> <p>Index 403</p>
“…The security technologies available are described in a user-friendly way without going into depth...” (<i>Computer Bulletin</i>, January 2005) <p>“…peppered with lively anecdotes and aphorisms, making it a really accessible read...” (<i>The ISSG Magazine</i>, Autumn, 2004)</p> <p>“…fascinating read…peppered with lively anecdotes…” (<i>The ISSG Magazine</i>, October 2004)</p> <p>"...make yourself better informed. Read this book." (<i>CVu, The Journal of the ACCU</i>, Vol 16(3), June 2004)</p>
Bruce Schneier is the founder and CTO of Counterpane Internet Security, Inc., the recognized leader in network security services. The bestselling author of Beyond Fear: Thinking Sensibly About Security in an Uncertain World and Applied Cryptography, he is an internationally respected security expert.
"A primer in practical computer security aimed at those shopping, communicating, or doing business online – almost everyone, in other words."<br /> –The Economist <p>Viruses. Identity theft. Corporate espionage. National secrets compromised. Can anyone promise security in our digital world?</p> <p>The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.</p> <p>"This book is of value to anyone whose business depends on safe use of e-mail, the Web, or other networked communications. If that’s not yet everybody, it soon will be."<br /> –Stephen H. Wildstrom, BusinessWeek</p> <p>"It’s not often that a truly outstanding book is written for both technical users and management. Fortunately, Secrets and Lies pulls off this feat rather well."<br /> –Dustin Puryear, Linux.com</p> <p>"Schneier . . . peppers the book with lively anecdotes and aphorisms, making it unusually accessible."<br /> –Los Angeles Times</p>

Diese Produkte könnten Sie auch interessieren:

Symbian OS Explained
Symbian OS Explained
von: Jo Stichbury
PDF ebook
32,99 €
Symbian OS Internals
Symbian OS Internals
von: Jane Sales
PDF ebook
56,99 €
Parallel Combinatorial Optimization
Parallel Combinatorial Optimization
von: El-Ghazali Talbi
PDF ebook
120,99 €