HOME > 상세정보

상세정보

Secrets and lies : digital security in a networked world

Secrets and lies : digital security in a networked world (6회 대출)

자료유형
단행본
개인저자
Schneier, Bruce, 1963-.
서명 / 저자사항
Secrets and lies : digital security in a networked world / Bruce Schneier.
발행사항
New York :   John Wiley,   2000.  
형태사항
xv, 412 p. ; 24 cm.
ISBN
0471253111 (alk. paper)
일반주기
"Wiley Computer Publishing."  
내용주기
1. Introduction -- pt. 1. The landscape -- 2. Digital threats -- 3. Attacks -- 4. Adversaries -- 5. Security needs -- pt. 2. Technologies -- 6. Cryptography -- 7. Cryptography in context -- 8. Computer security -- 9. Identification and authentication -- 10. Networked-computer security -- 11. Network security -- 12. Network defenses -- 13. Software reliability -- 14. Secure hardware -- 15. Certificates and credentials -- 16. Security tricks -- 17. The human factor -- pt. 3. Strategies -- 18. Vulnerabilities and the vulnerability landscape -- 19. T
일반주제명
Computer security. Computer networks -- Security measures.
000 01595camuu22003014a 4500
001 000000799775
005 20021224114106
008 000519s2000 nyu 001 0 eng
010 ▼a 00042252
015 ▼a GBA0-65469
019 ▼a 45329407
020 ▼a 0471253111 (alk. paper)
040 ▼a DLC ▼c DLC ▼d GAO ▼d UKM ▼d NOR ▼d OCLCQ ▼d 211009
042 ▼a pcc
049 1 ▼l 121068056 ▼f 과학
050 0 0 ▼a QA76.9.A25 ▼b S352 2000
082 0 0 ▼a 005.8 ▼2 21
090 ▼a 005.8 ▼b S359s
100 1 ▼a Schneier, Bruce, ▼d 1963-.
245 1 0 ▼a Secrets and lies : ▼b digital security in a networked world / ▼c Bruce Schneier.
260 ▼a New York : ▼b John Wiley, ▼c 2000.
300 ▼a xv, 412 p. ; ▼c 24 cm.
500 ▼a "Wiley Computer Publishing."
505 0 0 ▼g 1. ▼t Introduction -- ▼g pt. 1. The ▼t landscape -- ▼g 2. ▼t Digital threats -- ▼g 3. ▼t Attacks -- ▼g 4. ▼t Adversaries -- ▼g 5. ▼t Security needs -- ▼g pt. 2. ▼t Technologies -- ▼g 6. ▼t Cryptography -- ▼g 7. ▼t Cryptography in context -- ▼g 8. ▼t Computer security -- ▼g 9. ▼t Identification and authentication -- ▼g 10. ▼t Networked-computer security -- ▼g 11. ▼t Network security -- ▼g 12. ▼t Network defenses -- ▼g 13. ▼t Software reliability -- ▼g 14. ▼t Secure hardware -- ▼g 15. ▼t Certificates and credentials -- ▼g 16. ▼t Security tricks -- ▼g 17. The ▼t human factor -- ▼g pt. 3. ▼t Strategies -- ▼g 18. ▼t Vulnerabilities and the vulnerability landscape -- ▼g 19. ▼t T
650 0 ▼a Computer security.
650 0 ▼a Computer networks ▼x Security measures.

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 S359s 등록번호 121068056 (6회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more.
* Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs
* Explains what cryptography can and can't do in achieving digital security


정보제공 : Aladin

저자소개

브루스 슈나이더(지은이)

보안 관련 회사인 Counterpane Internet Security의 설립자이자 CTO이다. 세계적인 과학자이며 보안 전문가이자 강연자이다. Wiley에서 출간한 전세계 베스트셀러인 <Secrets and Lies]와 [Applied Cryptography>의 저자이기도 하다.

정보제공 : Aladin

목차


CONTENTS

PREFACE = xi

ACKNOWLEDGMENTS = xv

1. INTRODUCTION = 1

PART 1 : THE LANDSCAPE = 11

 2. DIGITAL THREATS = 14

 3. ATTACKS = 23

 4. ADVERSARIES = 42

 5. SECURITY NEEDS = 59

PART 2 : TECHNOLOGIES = 83

 6. CRYPTOGRAPHY = 85

 7. CRYPTOGRAPHY IN CONTEXT = 102

 8. COMPUTER SECURITY = 120

 9. IDENTIFICATION AND AUTHENTICATION = 135

 10. NETWORKED-COMPUTER SECURITY = 151

 11. NETWORK SECURITY = 176

 12. NETWORK DEFENSES = 188

 13. SOFTWARE RELIABILITY = 202

 14. SECURE HARDWARE = 212

 15. CERTIFICATES AND CREDENTIALS = 225

 16. SECURITY TRICKS = 240

 17. THE HUMAN FACTOR = 255

PART 3 : STRATEGIES = 271

 18. VULNERABILITIES AND THE VULNERABILITY LANDSCAPE = 274

 19. THREAT MODELING AND RISK ASSESSMENT = 288

 20. SECURITY POLICIES AND COUNTERMEASURES = 307

 21. ATTACK TREES = 318

 22. PRODUCT TESTING AND VERIFICATION = 334

 23. THE FUTURE OF PRODUCTS = 353

 24. SECURITY PROCESSES = 367

 25. CONCLUSION = 389

AFTERWORD = 396

RESOURCES = 399

INDEX = 401



관련분야 신착자료

Harvard Business Review (2025)