Book description
This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier's tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community.
Praise for Secrets and Lies
"This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That's why Secrets and Lies belongs in every manager's library."-Business Week
"Startlingly lively....a jewel box of little surprises you can actually use."-Fortune
"Secrets is a comprehensive, well-written work on a topic few business leaders can afford to neglect."-Business 2.0
"Instead of talking algorithms to geeky programmers, [Schneier] offers a primer in practical computer security aimed at those shopping, communicating or doing business online-almost everyone, in other words."-The Economist
"Schneier...peppers the book with lively anecdotes and aphorisms, making it unusually accessible."-Los Angeles Times
With a new and compelling Introduction by the author, this premium edition will become a keepsake for security enthusiasts of every stripe.
Table of contents
- Cover Page
- Title Page
- Copyright
- Dedication
- Contents
- Foreword to 2015 15 th Anniversary Edition
- Introduction from the Paperback Edition
- Preface
- About the Author
- CHAPTER 1: Introduction
- PART 1: THE LANDSCAPE
-
PART 2: TECHNOLOGIES
- CHAPTER 6: Cryptography
- CHAPTER 7: Cryptography in Context
- CHAPTER 8: Computer Security
- CHAPTER 9: Identification and Authentication
- CHAPTER 10: Networked-Computer Security
- CHAPTER 11: Network Security
- CHAPTER 12: Network Defenses
- CHAPTER 13: Software Reliability
- CHAPTER 14: Secure Hardware
- CHAPTER 15: Certificates and Credentials
- CHAPTER 16: Security Tricks
- CHAPTER 17: The Human Factor
-
PART 3: STRATEGIES
- CHAPTER 18: Vulnerabilities and the Vulnerability Landscape
- CHAPTER 19: Threat Modeling and Risk Assessment
- CHAPTER 20: Security Policies and Countermeasures
- CHAPTER 21: Attack Trees
- CHAPTER 22: Product Testing and Verification
- CHAPTER 23: The Future of Products
- CHAPTER 24: Security Processes
- CHAPTER 25: Conclusion
- Afterword
- Resources
- Acknowledgments
- Index
Product information
- Title: Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition
- Author(s):
- Release date: March 2015
- Publisher(s): Wiley
- ISBN: 9781119092438
You might also like
audiobook
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated …
book
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 9th Edition
CISSP Study Guide - fully updated for the 2021 CISSP Body of Knowledge (ISC)2 Certified Information …
book
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests, 3rd Edition
Full-length practice tests covering all CISSP domains for the ultimate exam prep The (ISC)2 CISSP Official …
book
The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks
This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual …