Secrets and Lies: Digital Security in a Networked WorldBestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more. * Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs * Explains what cryptography can and can't do in achieving digital security |
Contents
Section 22 | |
Section 23 | |
Section 24 | |
Section 25 | |
Section 26 | |
Section 27 | |
Section 28 | |
Section 29 | |
Section 9 | |
Section 10 | |
Section 11 | |
Section 12 | |
Section 13 | |
Section 14 | |
Section 15 | |
Section 16 | |
Section 17 | |
Section 18 | |
Section 19 | |
Section 20 | |
Section 21 | |
Section 30 | |
Section 31 | |
Section 32 | |
Section 33 | |
Section 34 | |
Section 35 | |
Section 36 | |
Section 37 | |
Section 38 | |
Section 39 | |
Section 40 | |
Section 41 | |
Other editions - View all
Common terms and phrases
access control alarm Alice and Bob Alice's attack tree audit authentication bank biometric break browser buffer overflows bugs called certificate companies complex computer security cookie copy countermeasures credit card numbers criminals cryptography cyberspace database decryption denialofservice attacks detection dictionary attacks digital signature eavesdropping electronic email encryption encryption algorithm engineering example exploit firewall fraud going hacker hacking hash implement insecure inside Internet lock look machine magnetic stripe card malicious malware merchant Microsoft operating system packets passphrase password person plaintext possible private key protect protocol public key random number risk secret security flaws security problems security products security system server smart card someone steal steganography talk tamper resistance target telephone there's things Trojan horse trusted third party vendor virus viruses vulnerability Windows