• Secrets and Lies: Digital Security in a Networked World See large image

    Secrets and Lies: Digital Security in a Networked World (Paperback) By (author) Bruce Schneier

    $16.05 - Save $3.31 17% off - RRP $19.36 Free delivery worldwide Available
    Dispatched in 3 business days
    When will my order arrive?
    Add to basket | Add to wishlist |

    DescriptionBestselling author, Bruce Schneier offers his expert guidance on achieving security on a network. Internationally recognized computer security expert, Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more. This book walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs. It explains what cryptography can and can't do in achieving digital security.


Other books

Other people who viewed this bought | Other books in this category
Showing items 1 to 10 of 10

 

Reviews | Bibliographic data
  • Full bibliographic data for Secrets and Lies

    Title
    Secrets and Lies
    Subtitle
    Digital Security in a Networked World
    Authors and contributors
    By (author) Bruce Schneier
    Physical properties
    Format: Paperback
    Number of pages: 448
    Width: 152 mm
    Height: 224 mm
    Thickness: 32 mm
    Weight: 522 g
    Language
    English
    ISBN
    ISBN 13: 9780471453802
    ISBN 10: 0471453803
    Classifications

    BIC E4L: COM
    Nielsen BookScan Product Class 3: S10.0
    B&T Book Type: NF
    B&T Modifier: Academic Level: 05
    B&T Merchandise Category: COM
    Warengruppen-Systematik des deutschen Buchhandels: 16310
    BIC subject category V2: URD
    LC subject heading:
    LC classification: QA76.9.A25
    B&T Approval Code: A93663050
    BISAC V2.8: COM053000
    DC22: 005.8
    BISAC V2.8: COM043000
    LC subject heading: , ,
    Ingram Subject Code: XE
    Libri: I-XE
    B&T General Subject: 231
    LC classification: QA76.9.A25 S352 2004
    Thema V1.0: UT
    Publisher
    John Wiley & Sons Inc
    Imprint name
    Hungry Minds Inc,U.S.
    Publication date
    30 January 2004
    Publication City/Country
    Foster City
    Author Information
    Bruce Schneier is the founder and CTO of Counterpane Internet Security, Inc., the recognized leader in network security services. The bestselling author of Beyond Fear: Thinking Sensibly About Security in an Uncertain World and Applied Cryptography, he is an internationally respected security expert.
    Review quote
    "...The security technologies available are described in a user-friendly way without going into depth..." (Computer Bulletin, January 2005) "...peppered with lively anecdotes and aphorisms, making it a really accessible read..." (The ISSG Magazine, Autumn, 2004) "...fascinating read...peppered with lively anecdotes..." (The ISSG Magazine, October 2004) "...make yourself better informed. Read this book." (CVu, The Journal of the ACCU, Vol 16(3), June 2004)
    Back cover copy
    "A primer in practical computer security aimed at those shopping, communicating, or doing business online - almost everyone, in other words." -The EconomistViruses. Identity theft. Corporate espionage. National secrets compromised. Can anyone promise security in our digital world?The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product - one that system administrators and corporate executives alike must understand to survive."This book is of value to anyone whose business depends on safe use of e-mail, the Web, or other networked communications. If that's not yet everybody, it soon will be." -Stephen H. Wildstrom, BusinessWeek"It's not often that a truly outstanding book is written for both technical users and management. Fortunately, Secrets and Lies pulls off this feat rather well." -Dustin Puryear, Linux.com"Schneier . . . peppers the book with lively anecdotes and aphorisms, making it unusually accessible." -Los Angeles Times
    Table of contents
    THE LANDSCAPE.Digital Threats.Attacks.Adversaries.Security Needs.TECHNOLOGIES.Cryptography.Cryptography in Context.Computer Security.Identification and Authentication.Networked-Computer Security.Network Security.Network Defenses.Software Reliability.Secure Hardware.Certificates and Credentials.Security Tricks.The Human Factor.STRATEGIES.Vulnerabilities and the Vulnerability Landscape.Threat Modeling and Risk Assessment.Security Policies and Countermeasures.Attack Trees.Product Testing and Verification.The Future of Products.Security Processes.Conclusion.Afterword.Resources.Index.