1 option
Secrets and Lies : digital security in a networked world.
- Format:
- Book
- Author/Creator:
- Schneier, Bruce, Author.
- Language:
- English
- Physical Description:
- 1 online resource (1 volume)
- Edition:
- 15th anniversary edition.
- Other Title:
- Digital security in a networked world
- Secrets & lies
- Place of Publication:
- [Place of publication not identified] John Wiley & Sons Incorporated 2015
- Language Note:
- English
- System Details:
- text file
- Summary:
- This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier's tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community. Praise for Secrets and Lies "This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That's why Secrets and Lies belongs in every manager's library."-Business Week "Startlingly lively....a jewel box of little surprises you can actually use."-Fortune "Secrets is a comprehensive, well-written work on a topic few business leaders can afford to neglect."-Business 2.0 "Instead of talking algorithms to geeky programmers, [Schneier] offers a primer in practical computer security aimed at those shopping, communicating or doing business online-almost everyone, in other words."-The Economist "Schneier...peppers the book with lively anecdotes and aphorisms, making it unusually accessible."-Los Angeles Times With a new and compelling Introduction by the author, this premium edition will become a keepsake for security enthusiasts of every stripe.
- Contents:
- Foreword to 2015 15th anniversary edition
- Introduction from the paperback edition
- Preface
- About the author
- Part 1: Landscape:
- Digital threats
- Attacks
- Adversaries
- Security needs
- Part 2: Technologies:
- Cryptography
- Cryptography in context
- Computer security
- Identification and authentication
- Networked-computer security
- Network security
- Network defenses
- Software reliability
- Secure hardware
- Certificates and credentials
- Security tricks
- Human factor
- Part 3: Strategies:
- Vulnerabilities and the vulnerability landscape
- Threat modeling and risk assessment
- Security policies and countermeasures
- Attack trees
- Product testing and verification
- Future of products
- Security processes
- Conclusion
- Afterword
- Resources
- Acknowledgments
- Index.
- Notes:
- Bibliographic Level Mode of Issuance: Monograph
- Includes bibliographical references and index.
- OCLC:
- 934725365
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.