Secrets and Lies
John Wiley & Sons Inc (Verlag)
978-1-119-09243-8 (ISBN)
Praise for Secrets and Lies
"This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That's why Secrets and Lies belongs in every manager's library."-Business Week
"Startlingly lively....a jewel box of little surprises you can actually use."-Fortune
"Secrets is a comprehensive, well-written work on a topic few business leaders can afford to neglect."-Business 2.0
"Instead of talking algorithms to geeky programmers, [Schneier] offers a primer in practical computer security aimed at those shopping, communicating or doing business online-almost everyone, in other words."-The Economist
"Schneier...peppers the book with lively anecdotes and aphorisms, making it unusually accessible."-Los Angeles Times
With a new and compelling Introduction by the author, this premium edition will become a keepsake for security enthusiasts of every stripe.
Bruce Schneier is an internationally renowned security technologist, called a "security guru" by The Economist. He is the author of twelve booksincluding his seminal work, Applied Cryptography: Protocols, Algorithms, and Source Code in C, and Secrets & Lies: Digital Security in a Networked World as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and blog "Schneier on Security" are read by over 250,000 people. Schneier is a fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic Frontier Foundation, and an Advisory Board member of the Electronic Privacy Information Center. He is also the Chief Technology Officer of Resilient Systems, Inc. You can read his blog, essays, and academic papers at www.schneier.com. He tweets at @schneierblog.
Foreword to 2015
15th Anniversary Edition ix
Introduction From the Paperback Edition xiii
Preface xxiii
About the Author xxvii
1. Introduction 1
Part 1: The Landscape 11
2. Digital Threats 14
3. Attacks 23
4. Adversaries 42
5. Security Needs 59
Part 2: Technologies 83
6. Cryptography 85
7. Cryptography in Context 102
8. Computer Security 120
9. Identification and Authentication 135
10. Networked-Computer Security 151
11. Network Security 176
12. Network Defenses 188
13. Software Reliability 202
14. Secure Hardware 212
15. Certificates and Credentials 225
16. Security Tricks 240
17. The Human Factor 255
Part 3: Strategies 271
18. Vulnerabilities and the Vulnerability Landscape 274
19. Threat Modeling and Risk Assessment 288
20. Security Policies and Countermeasures 307
21. Attack Trees 318
22. Product Testing and Verification 334
23. The Future of Products 353
24. Security Processes 367
25. Conclusion 389
Afterword 396
Resources 399
Acknowledgments 401
Index 403
Erscheint lt. Verlag | 24.4.2015 |
---|---|
Verlagsort | New York |
Sprache | englisch |
Maße | 152 x 234 mm |
Gewicht | 748 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
ISBN-10 | 1-119-09243-4 / 1119092434 |
ISBN-13 | 978-1-119-09243-8 / 9781119092438 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich