- Format
- Häftad (Paperback)
- Språk
- Engelska
- Antal sidor
- 410
- Utgivningsdatum
- 2004-01-01
- Upplaga
- 1
- Förlag
- WILEY
- Illustratör/Fotograf
- illustrations
- Illustrationer
- illustrations
- Dimensioner
- 230 x 155 x 30 mm
- Vikt
- Antal komponenter
- 1
- SAB
- Pubds
- ISBN
- 9780471453802
- 500 g
Du kanske gillar
-
We Have Root
Bruce Schneier
HäftadData and Goliath
Bruce Schneier
InbundenSecrets & Lies: Digital Security In a Networked World (Paperback)
149Skickas inom 7-10 vardagar.
Gratis frakt inom Sverige över 159 kr för privatpersoner.Passar bra ihop
De som köpt den här boken har ofta också köpt Designing Security Architecture Solutions av Jay Ramachandran (häftad).
Köp båda 2 för 728 krKundrecensioner
Har du läst boken? Sätt ditt betyg »Fler böcker av Bruce Schneier
-
Click Here to Kill Everybody
Bruce Schneier
-
Cryptography Engineering, Design Principles and Practical Applications
Niels Ferguson, Bruce Schneier, Tadayoshi Kohno
-
Data and Goliath
Bruce Schneier
-
Secrets and Lies
Bruce Schneier
Recensioner i media
The security technologies available are described in a user friendly way without going into depth... (Computer Bulletin, January 2005) peppered with lively anecdotes and aphorisms, making it a really accessible read... (The ISSG Magazine, Autumn, 2004) fascinating read peppered with lively anecdotes (The ISSG Magazine, October 2004) "...make yourself better informed. Read this book." (CVu, The Journal of the ACCU, Vol 16(3), June 2004)
Övrig information
Bruce Schneier is the founder and CTO of Counterpane Internet Security, Inc., the recognized leader in network security services. The bestselling author of Beyond Fear: Thinking Sensibly About Security in an Uncertain World and Applied Cryptography, he is an internationally respected security expert.
Innehållsförteckning
THE LANDSCAPE.
Digital Threats.
Attacks.
Adversaries.
Security Needs.
TECHNOLOGIES.
Cryptography.
Cryptography in Context.
Computer Security.
Identification and Authentication.
Networked-Computer Security.
Network Security.
Network Defenses.
Software Reliability.
Secure Hardware.
Certificates and Credentials.
Security Tricks.
The Human Factor.
STRATEGIES.
Vulnerabilities and the Vulnerability Landscape.
Threat Modeling and Risk Assessment.
Security Policies and Countermeasures.
Attack Trees.
Product Testing and Verification.
The Future of Products.
Security Processes.
Conclusion.
Afterword.
Resources.
Index.