Hugendubel.info - Die B2B Online-Buchhandlung 

Merkliste
Die Merkliste ist leer.
Bitte warten - die Druckansicht der Seite wird vorbereitet.
Der Druckdialog öffnet sich, sobald die Seite vollständig geladen wurde.
Sollte die Druckvorschau unvollständig sein, bitte schliessen und "Erneut drucken" wählen.

Secrets and Lies

Digital Security in a Networked World, 15th Anniversary Edition
BuchGebunden
448 Seiten
Englisch
Wiley & Sonserschienen am24.04.20151. Auflage
This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts.mehr
Verfügbare Formate
BuchKartoniert, Paperback
EUR28,00
BuchGebunden
EUR31,50
E-BookEPUB2 - DRM Adobe / EPUBE-Book
EUR19,99
E-BookPDF2 - DRM Adobe / Adobe Ebook ReaderE-Book
EUR19,99

Produkt

KlappentextThis anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts.
Details
ISBN/GTIN978-1-119-09243-8
ProduktartBuch
EinbandartGebunden
Erscheinungsjahr2015
Erscheinungsdatum24.04.2015
Auflage1. Auflage
Seiten448 Seiten
SpracheEnglisch
Gewicht745 g
Artikel-Nr.33657842

Inhalt/Kritik

Inhaltsverzeichnis
Foreword to 2015 15th Anniversary Edition ix Introduction From the Paperback Edition xiii Preface xxiii About the Author xxvii 1. Introduction 1 Part 1: The Landscape 11 2. Digital Threats 14 3. Attacks 23 4. Adversaries 42 5. Security Needs 59 Part 2: Technologies 83 6. Cryptography 85 7. Cryptography in Context 102 8. Computer Security 120 9. Identification and Authentication 135 10. Networked-Computer Security 151 11. Network Security 176 12. Network Defenses 188 13. Software Reliability 202 14. Secure Hardware 212 15. Certificates and Credentials 225 16. Security Tricks 240 17. The Human Factor 255 Part 3: Strategies 271 18. Vulnerabilities and the Vulnerability Landscape 274 19. Threat Modeling and Risk Assessment 288 20. Security Policies and Countermeasures 307 21. Attack Trees 318 22. Product Testing and Verification 334 23. The Future of Products 353 24. Security Processes 367 25. Conclusion 389 Afterword 396 Resources 399 Acknowledgments 401 Index 403mehr

Autor

Bruce Schneier is an internationally renowned security technologist, called a "security guru" by The Economist. He is the author of twelve books--including his seminal work, Applied Cryptography: Protocols, Algorithms, and Source Code in C, and Secrets & Lies: Digital Security in a Networked World as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and blog "Schneier on Security" are read by over 250,000 people. Schneier is a fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic Frontier Foundation, and an Advisory Board member of the Electronic Privacy Information Center. He is also the Chief Technology Officer of Resilient Systems, Inc. You can read his blog, essays, and academic papers at www.schneier.com. He tweets at @schneierblog.