My Account Log in

1 option

Secrets and Lies : digital security in a networked world.

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Schneier, Bruce, Author.
Language:
English
Physical Description:
1 online resource (1 volume)
Edition:
15th anniversary edition.
Other Title:
Digital security in a networked world
Secrets & lies
Place of Publication:
[Place of publication not identified] John Wiley & Sons Incorporated 2015
Language Note:
English
System Details:
text file
Summary:
This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier's tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community. Praise for Secrets and Lies "This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That's why Secrets and Lies belongs in every manager's library."-Business Week "Startlingly lively....a jewel box of little surprises you can actually use."-Fortune "Secrets is a comprehensive, well-written work on a topic few business leaders can afford to neglect."-Business 2.0 "Instead of talking algorithms to geeky programmers, [Schneier] offers a primer in practical computer security aimed at those shopping, communicating or doing business online-almost everyone, in other words."-The Economist "Schneier...peppers the book with lively anecdotes and aphorisms, making it unusually accessible."-Los Angeles Times With a new and compelling Introduction by the author, this premium edition will become a keepsake for security enthusiasts of every stripe.
Contents:
Foreword to 2015 15th anniversary edition
Introduction from the paperback edition
Preface
About the author
Part 1: Landscape:
Digital threats
Attacks
Adversaries
Security needs
Part 2: Technologies:
Cryptography
Cryptography in context
Computer security
Identification and authentication
Networked-computer security
Network security
Network defenses
Software reliability
Secure hardware
Certificates and credentials
Security tricks
Human factor
Part 3: Strategies:
Vulnerabilities and the vulnerability landscape
Threat modeling and risk assessment
Security policies and countermeasures
Attack trees
Product testing and verification
Future of products
Security processes
Conclusion
Afterword
Resources
Acknowledgments
Index.
Notes:
Bibliographic Level Mode of Issuance: Monograph
Includes bibliographical references and index.
OCLC:
934725365

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account