Secrets and Lies: Digital Security in a Networked World (Google eBook)
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more.
* Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs
* Explains what cryptography can and can't do in achieving digital security
What people are saying - Write a review
We haven't found any reviews in the usual places.
Security Engineering: A Guide to Building Dependable Distributed Systems
Ross J. Anderson
Limited preview - 2010
alarm Alice Alice and Bob Alice’s andthe attack tree audit authentication bank biometric break browser bruteforce buffer overflows bugs called canbe card numbers certificate communications companies complex computer security copy countermeasures credit card criminals cryptography cyberspace database decryption denialofservice attacks detection dictionary attacks digital signature eavesdropping electronic email encryption encryption algorithm engineering example firewall hacker hash Ifthe implement inside Internet inthe IPsec isthat look machine magnetic stripe card malicious malware Microsoft ofthe onthe operating system packets passwords plaintext Plasticash possible protect protocols public key random number risk secret security flaws security products server smart card someone steal steganography tamper resistance target thatthe theInternet There’s thesame things Thisis threats tobe tothe Trojan Trojan horse trusted users vendors virus viruses vulnerability Windows youcan