Cargando…

Secrets and lies : digital security in a networked world /

"This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cr...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Schneier, Bruce, 1963- (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Indiana : John Wiley & Sons, Inc., [2015]
Edición:15th anniversary edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mi 4500
001 OR_ocn927382160
003 OCoLC
005 20231017213018.0
006 m o d
007 cr mn|||||||||
008 151016t20152015inua ob 001 0 eng d
010 |a  2015932613 
040 |a CtWfDGI  |b eng  |e rda  |e pn  |c STF  |d OCLCO  |d B24X7  |d COO  |d OCLCF  |d UMI  |d DEBBG  |d OCLCQ  |d VT2  |d LIV  |d OCLCA  |d CEF  |d OCLCQ  |d WYU  |d UAB  |d AU@  |d SOE  |d INARC  |d OCLCO  |d OCLCQ 
019 |a 934725365  |a 993450666  |a 1066526895  |a 1103280803  |a 1129363135  |a 1152975479  |a 1192335109  |a 1240517347  |a 1287870610 
020 |a 1119092434  |q (Trade Cloth) 
020 |a 9781119092438  |q (Trade Cloth) 
020 |z 9781119092438 
024 3 |a 9781119092438 
029 1 |a DEBBG  |b BV043968646 
029 1 |a DEBSZ  |b 485791536 
029 1 |a GBVCP  |b 876244347 
035 |a (OCoLC)927382160  |z (OCoLC)934725365  |z (OCoLC)993450666  |z (OCoLC)1066526895  |z (OCoLC)1103280803  |z (OCoLC)1129363135  |z (OCoLC)1152975479  |z (OCoLC)1192335109  |z (OCoLC)1240517347  |z (OCoLC)1287870610 
037 |a CL0500000702  |b Safari Books Online 
050 4 |a QA76.9.A25  |b S352 2015eb 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Schneier, Bruce,  |d 1963-  |e author. 
245 1 0 |a Secrets and lies :  |b digital security in a networked world /  |c Bruce Schneier. 
250 |a 15th anniversary edition. 
264 1 |a Indianapolis, Indiana :  |b John Wiley & Sons, Inc.,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
588 0 |a Online resource; title from title screen (Books24x7.com, viewed October 16, 2015). 
520 |a "This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier's tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community."--  |c Unedited summary from book. 
504 |a Includes bibliographical references and index. 
505 0 |a Foreword to 2015 15th anniversary edition -- Introduction from the paperback edition -- Preface -- About the author -- Part 1: Landscape: -- Digital threats -- Attacks -- Adversaries -- Security needs -- Part 2: Technologies: -- Cryptography -- Cryptography in context -- Computer security -- Identification and authentication -- Networked-computer security -- Network security -- Network defenses -- Software reliability -- Secure hardware -- Certificates and credentials -- Security tricks -- Human factor -- Part 3: Strategies: -- Vulnerabilities and the vulnerability landscape -- Threat modeling and risk assessment -- Security policies and countermeasures -- Attack trees -- Product testing and verification -- Future of products -- Security processes -- Conclusion -- Afterword -- Resources -- Acknowledgments -- Index. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data encryption (Computer science) 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Chiffrement (Informatique) 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
776 0 8 |i Print version:  |a Schneier, Bruce, 1963-  |t Secrets and lies.  |b 15th anniversary edition.  |d ©2015  |w (DLC) 2015932613 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119092438/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Internet Archive  |b INAR  |n secretsliesdigit0000schn_n2e3 
938 |a Books 24x7  |b B247  |n bks00082534 
994 |a 92  |b IZTAP