An edition of Secrets and lies (2000)

Secrets and lies

digital security in a networked world

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

Buy this book

Last edited by MARC Bot
November 12, 2023 | History
An edition of Secrets and lies (2000)

Secrets and lies

digital security in a networked world

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

"Information security expert Bruce Schneier explains what everyone in business needs to know about security in order to survive and be competitive. Pragmatic, interesting, and humorous, Schneier exposes the digital world and the realities of our networked society. He examines the entire system, from the reasons for technical insecurities to the minds behind malicious attacks.

You'll be guided through the security war zone, and learn how to understand and arm yourself against the threats of our connected world." "Secrets and Lies offers the expert guidance you'll need to make the right choices about securing your digital self."--BOOK JACKET.

Publish Date
Publisher
John Wiley
Language
English
Pages
412

Buy this book

Previews available in: English

Edition Availability
Cover of: Secrets and lies
Secrets and lies: digital security in a networked world
2000, John Wiley
in English

Add another edition?

Book Details


Published in

New York

Table of Contents

1.
Introduction -- -- pt. 1.
The landscape -- -- 2.
Digital threats -- -- 3.
Attacks -- -- 4.
Adversaries -- -- 5.
Security needs -- -- pt. 2.
Technologies -- -- 6.
Cryptography -- -- 7.
Cryptography in context -- -- 8.
Computer security -- -- 9.
Identification and authentication -- -- 10.
Networked-computer security -- -- 11.
Network security -- -- 12.
Network defenses -- -- 13.
Software reliability -- -- 14.
Secure hardware -- -- 15.
Certificates and credentials -- -- 16.
Security tricks -- -- 17.
The human factor -- -- pt. 3.
Strategies -- -- 18.
Vulnerabilities and the vulnerability landscape -- -- 19.
T.

Edition Notes

"Wiley Computer Publishing."

Includes bibliographical references (p. 399-400) and index.

Classifications

Dewey Decimal Class
005.8
Library of Congress
QA76.9.A25 S352 2000, QA76.9.A25S352 2000, QA 76.9 A25 S352 2000

The Physical Object

Pagination
xv, 412 p. ;
Number of pages
412

ID Numbers

Open Library
OL24754380M
Internet Archive
secretsliesdigit00schn
ISBN 10
0471253111
ISBN 13
9780471253112
LCCN
00042252
OCLC/WorldCat
44167178

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
November 12, 2023 Edited by MARC Bot import existing book
October 17, 2022 Edited by ImportBot import existing book
May 9, 2021 Edited by ImportBot import existing book
March 2, 2020 Edited by MARC Bot remove fake subjects
July 9, 2011 Created by ImportBot import new book