gogogo
Syndetics cover image
Image from Syndetics

Secrets & Lies Digital Security in a Networked World

By: Material type: TextTextPublication details: WileyISBN:
  • 9780471453802
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Standard Loan Thurles Library Main Collection 005.8 SCH (Browse shelf(Opens below)) 1 Available R16872KRCT

Enhanced descriptions from Syndetics:

Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more.
* Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs
* Explains what cryptography can and can't do in achieving digital security

Table of contents provided by Syndetics

  • Preface (p. xi)
  • 1. Introduction (p. 1)
  • Part 1 The Landscape (p. 11)
  • 2. Digital Threats (p. 14)
  • 3. Attacks (p. 23)
  • 4. Adversaries (p. 42)
  • 5. Security Needs (p. 59)
  • Part 2 Technologies (p. 83)
  • 6. Cryptography (p. 85)
  • 7. Cryptography in Context (p. 102)
  • 8. Computer Security (p. 120)
  • 9. Identification and Authentication (p. 135)
  • 10. Networked-Computer Security (p. 151)
  • 11. Network Security (p. 176)
  • 12. Network Defenses (p. 188)
  • 13. Software Reliability (p. 202)
  • 14. Secure Hardware (p. 212)
  • 15. Certificates and Credentials (p. 225)
  • 16. Security Tricks (p. 240)
  • 17. The Human Factor (p. 255)
  • Part 3 Strategies (p. 271)
  • 18. Vulnerabilities and the Vulnerability Landscape (p. 274)
  • 19. Threat Modeling and Risk Assessment (p. 288)
  • 20. Security Policies and Countermeasures (p. 307)
  • 21. Attack Trees (p. 318)
  • 22. Product Testing and Verification (p. 334)
  • 23. The Future of Products (p. 353)
  • 24. Security Processes (p. 367)
  • 25. Conclusion (p. 389)
  • Afterword (p. 396)
  • Resources (p. 399)
  • Acknowledgments (p. 401)
  • Index (p. 403)

Author notes provided by Syndetics

Bruce Schneier is a Fellow at the Berkman Center for Internet and Society at Harvard Law School and the CTO of Resilient Systems, Inc. He is a security expert and author of numerous books including Beyond Fear: Thinking Sensibly About Security in an Uncertain World, Carry On: Sound Advice from Schneier on Security, and Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World.

(Bowker Author Biography)

Powered by Koha