skip to content
Secrets and lies : digital security in a networked world Preview this item
ClosePreview this item
Checking...

Secrets and lies : digital security in a networked world

Author: Bruce Schneier
Publisher: Indianapolis, Indiana : John Wiley & Sons, Inc., [2015] ©2015
Edition/Format:   eBook : Document : English : 15th anniversary editionView all editions and formats
Summary:
"This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Bruce Schneier
ISBN: 1119092434 9781119092438
OCLC Number: 927382160
Description: 1 online resource : illustrations
Contents: Foreword to 2015 15th anniversary edition --
Introduction from the paperback edition --
Preface --
About the author --
Part 1: Landscape: --
Digital threats --
Attacks --
Adversaries --
Security needs --
Part 2: Technologies: --
Cryptography --
Cryptography in context --
Computer security --
Identification and authentication --
Networked-computer security --
Network security --
Network defenses --
Software reliability --
Secure hardware --
Certificates and credentials --
Security tricks --
Human factor --
Part 3: Strategies: --
Vulnerabilities and the vulnerability landscape --
Threat modeling and risk assessment --
Security policies and countermeasures --
Attack trees --
Product testing and verification --
Future of products --
Security processes --
Conclusion --
Afterword --
Resources --
Acknowledgments --
Index.
Responsibility: Bruce Schneier.

Abstract:

This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math,  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/927382160> # Secrets and lies : digital security in a networked world
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "927382160" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/inu> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/478302071#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/478302071#Topic/data_encryption_computer_science> ; # Data encryption (Computer science)
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/478302071#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:author <http://experiment.worldcat.org/entity/work/data/478302071#Person/schneier_bruce_1963> ; # Bruce Schneier
    schema:bookEdition "15th anniversary edition." ;
    schema:bookFormat schema:EBook ;
    schema:copyrightYear "2015" ;
    schema:datePublished "2015" ;
    schema:description "Foreword to 2015 15th anniversary edition -- Introduction from the paperback edition -- Preface -- About the author -- Part 1: Landscape: -- Digital threats -- Attacks -- Adversaries -- Security needs -- Part 2: Technologies: -- Cryptography -- Cryptography in context -- Computer security -- Identification and authentication -- Networked-computer security -- Network security -- Network defenses -- Software reliability -- Secure hardware -- Certificates and credentials -- Security tricks -- Human factor -- Part 3: Strategies: -- Vulnerabilities and the vulnerability landscape -- Threat modeling and risk assessment -- Security policies and countermeasures -- Attack trees -- Product testing and verification -- Future of products -- Security processes -- Conclusion -- Afterword -- Resources -- Acknowledgments -- Index."@en ;
    schema:description ""This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier's tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community."--"@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/478302071> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:name "Secrets and lies : digital security in a networked world"@en ;
    schema:productID "927382160" ;
    schema:url <http://0-www.books24x7.com.www.livermore.lib.ca.us/marc.asp?bookid=82534> ;
    schema:url <http://proquest.tech.safaribooksonline.de/9781119092438> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=82534> ;
    schema:url <http://proquest.safaribooksonline.com/9781119092438> ;
    schema:url <http://proquest.safaribooksonline.com/?fpi=9781119092438> ;
    schema:workExample <http://worldcat.org/isbn/9781119092438> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/927382160> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/478302071#Person/schneier_bruce_1963> # Bruce Schneier
    a schema:Person ;
    schema:birthDate "1963" ;
    schema:familyName "Schneier" ;
    schema:givenName "Bruce" ;
    schema:name "Bruce Schneier" ;
    .

<http://experiment.worldcat.org/entity/work/data/478302071#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/478302071#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/478302071#Topic/data_encryption_computer_science> # Data encryption (Computer science)
    a schema:Intangible ;
    schema:name "Data encryption (Computer science)"@en ;
    .

<http://proquest.tech.safaribooksonline.de/9781119092438>
    rdfs:comment "URL des Erstveröffentlichers" ;
    .

<http://worldcat.org/isbn/9781119092438>
    a schema:ProductModel ;
    schema:isbn "1119092434" ;
    schema:isbn "9781119092438" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.