26,40 €*
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
?The Economist
Viruses. Identity theft. Corporate espionage. National secrets compromised. Can anyone promise security in our digital world?
The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product ? one that system administrators and corporate executives alike must understand to survive.
"This book is of value to anyone whose business depends on safe use of e-mail, the Web, or other networked communications. If that?s not yet everybody, it soon will be."
?Stephen H. Wildstrom, BusinessWeek
"It?s not often that a truly outstanding book is written for both technical users and management. Fortunately, Secrets and Lies pulls off this feat rather well."
?Dustin Puryear, [...]
"Schneier . . . peppers the book with lively anecdotes and aphorisms, making it unusually accessible."
?Los Angeles Times
?The Economist
Viruses. Identity theft. Corporate espionage. National secrets compromised. Can anyone promise security in our digital world?
The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product ? one that system administrators and corporate executives alike must understand to survive.
"This book is of value to anyone whose business depends on safe use of e-mail, the Web, or other networked communications. If that?s not yet everybody, it soon will be."
?Stephen H. Wildstrom, BusinessWeek
"It?s not often that a truly outstanding book is written for both technical users and management. Fortunately, Secrets and Lies pulls off this feat rather well."
?Dustin Puryear, [...]
"Schneier . . . peppers the book with lively anecdotes and aphorisms, making it unusually accessible."
?Los Angeles Times
Preface xi
1. Introduction 1
Part 1: The Landscape 11
2. Digital Threats 14
3. Attacks 23
4. Adversaries 42
5. Security Needs 59
Part 2: Technologies 83
6. Cryptography 85
7. Cryptography in Context 102
8. Computer Security 120
9. Identification and Authentication 135
10. Networked-computer Security 151
11. Network Security 176
12. Network Defenses 188
13. Software Reliability 202
14. Secure Hardware 212
15. Certificates and Credentials 225
16. Security Tricks 240
17. The Human Factor 255
Part 3: Strategies 271
18. Vulnerabilities and the Vulnerability Landscape 274
19. Threat Modeling and Risk Assessment 288
20. Security Policies and Countermeasures 307
21. Attack Trees 318
22. Product Testing and Verification 334
23. The Future of Products 353
24. Security Processes 367
25. Conclusion 389
Afterword 396
Resources 399
Acknowledgments 401
Index 403
Erscheinungsjahr: | 2004 |
---|---|
Fachbereich: | EDV |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Thema: | Lexika |
Medium: | Taschenbuch |
Inhalt: | 432 S. |
ISBN-13: | 9780471453802 |
ISBN-10: | 0471453803 |
Sprache: | Englisch |
Herstellernummer: | 14645380000 |
Einband: | Kartoniert / Broschiert |
Autor: | Schneier, Bruce |
Hersteller: |
Wiley
John Wiley & Sons |
Verantwortliche Person für die EU: | Wiley-VCH GmbH, Boschstr. 12, D-69469 Weinheim, product-safety@wiley.com |
Maße: | 229 x 152 x 23 mm |
Von/Mit: | Bruce Schneier |
Erscheinungsdatum: | 30.01.2004 |
Gewicht: | 0,622 kg |
Preface xi
1. Introduction 1
Part 1: The Landscape 11
2. Digital Threats 14
3. Attacks 23
4. Adversaries 42
5. Security Needs 59
Part 2: Technologies 83
6. Cryptography 85
7. Cryptography in Context 102
8. Computer Security 120
9. Identification and Authentication 135
10. Networked-computer Security 151
11. Network Security 176
12. Network Defenses 188
13. Software Reliability 202
14. Secure Hardware 212
15. Certificates and Credentials 225
16. Security Tricks 240
17. The Human Factor 255
Part 3: Strategies 271
18. Vulnerabilities and the Vulnerability Landscape 274
19. Threat Modeling and Risk Assessment 288
20. Security Policies and Countermeasures 307
21. Attack Trees 318
22. Product Testing and Verification 334
23. The Future of Products 353
24. Security Processes 367
25. Conclusion 389
Afterword 396
Resources 399
Acknowledgments 401
Index 403
Erscheinungsjahr: | 2004 |
---|---|
Fachbereich: | EDV |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Thema: | Lexika |
Medium: | Taschenbuch |
Inhalt: | 432 S. |
ISBN-13: | 9780471453802 |
ISBN-10: | 0471453803 |
Sprache: | Englisch |
Herstellernummer: | 14645380000 |
Einband: | Kartoniert / Broschiert |
Autor: | Schneier, Bruce |
Hersteller: |
Wiley
John Wiley & Sons |
Verantwortliche Person für die EU: | Wiley-VCH GmbH, Boschstr. 12, D-69469 Weinheim, product-safety@wiley.com |
Maße: | 229 x 152 x 23 mm |
Von/Mit: | Bruce Schneier |
Erscheinungsdatum: | 30.01.2004 |
Gewicht: | 0,622 kg |