| 000 | 01595camuu22003014a 4500 | |
| 001 | 000000799775 | |
| 005 | 20021224114106 | |
| 008 | 000519s2000 nyu 001 0 eng | |
| 010 | ▼a 00042252 | |
| 015 | ▼a GBA0-65469 | |
| 019 | ▼a 45329407 | |
| 020 | ▼a 0471253111 (alk. paper) | |
| 040 | ▼a DLC ▼c DLC ▼d GAO ▼d UKM ▼d NOR ▼d OCLCQ ▼d 211009 | |
| 042 | ▼a pcc | |
| 049 | 1 | ▼l 121068056 ▼f 과학 |
| 050 | 0 0 | ▼a QA76.9.A25 ▼b S352 2000 |
| 082 | 0 0 | ▼a 005.8 ▼2 21 |
| 090 | ▼a 005.8 ▼b S359s | |
| 100 | 1 | ▼a Schneier, Bruce, ▼d 1963-. |
| 245 | 1 0 | ▼a Secrets and lies : ▼b digital security in a networked world / ▼c Bruce Schneier. |
| 260 | ▼a New York : ▼b John Wiley, ▼c 2000. | |
| 300 | ▼a xv, 412 p. ; ▼c 24 cm. | |
| 500 | ▼a "Wiley Computer Publishing." | |
| 505 | 0 0 | ▼g 1. ▼t Introduction -- ▼g pt. 1. The ▼t landscape -- ▼g 2. ▼t Digital threats -- ▼g 3. ▼t Attacks -- ▼g 4. ▼t Adversaries -- ▼g 5. ▼t Security needs -- ▼g pt. 2. ▼t Technologies -- ▼g 6. ▼t Cryptography -- ▼g 7. ▼t Cryptography in context -- ▼g 8. ▼t Computer security -- ▼g 9. ▼t Identification and authentication -- ▼g 10. ▼t Networked-computer security -- ▼g 11. ▼t Network security -- ▼g 12. ▼t Network defenses -- ▼g 13. ▼t Software reliability -- ▼g 14. ▼t Secure hardware -- ▼g 15. ▼t Certificates and credentials -- ▼g 16. ▼t Security tricks -- ▼g 17. The ▼t human factor -- ▼g pt. 3. ▼t Strategies -- ▼g 18. ▼t Vulnerabilities and the vulnerability landscape -- ▼g 19. ▼t T |
| 650 | 0 | ▼a Computer security. |
| 650 | 0 | ▼a Computer networks ▼x Security measures. |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 S359s | 등록번호 121068056 (6회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more.
* Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs
* Explains what cryptography can and can't do in achieving digital security
정보제공 :
저자소개
목차
CONTENTS PREFACE = xi ACKNOWLEDGMENTS = xv 1. INTRODUCTION = 1 PART 1 : THE LANDSCAPE = 11 2. DIGITAL THREATS = 14 3. ATTACKS = 23 4. ADVERSARIES = 42 5. SECURITY NEEDS = 59 PART 2 : TECHNOLOGIES = 83 6. CRYPTOGRAPHY = 85 7. CRYPTOGRAPHY IN CONTEXT = 102 8. COMPUTER SECURITY = 120 9. IDENTIFICATION AND AUTHENTICATION = 135 10. NETWORKED-COMPUTER SECURITY = 151 11. NETWORK SECURITY = 176 12. NETWORK DEFENSES = 188 13. SOFTWARE RELIABILITY = 202 14. SECURE HARDWARE = 212 15. CERTIFICATES AND CREDENTIALS = 225 16. SECURITY TRICKS = 240 17. THE HUMAN FACTOR = 255 PART 3 : STRATEGIES = 271 18. VULNERABILITIES AND THE VULNERABILITY LANDSCAPE = 274 19. THREAT MODELING AND RISK ASSESSMENT = 288 20. SECURITY POLICIES AND COUNTERMEASURES = 307 21. ATTACK TREES = 318 22. PRODUCT TESTING AND VERIFICATION = 334 23. THE FUTURE OF PRODUCTS = 353 24. SECURITY PROCESSES = 367 25. CONCLUSION = 389 AFTERWORD = 396 RESOURCES = 399 INDEX = 401
