Secrets and lies : digital security in a networked world ; [with new information about post-9/11 security] — Paperback ed. (English)
- New search for: Schneier, Bruce
- Further information on Schneier, Bruce:
- http://d-nb.info/gnd/123003180
- New search for: Schneier, Bruce
- Further information on Schneier, Bruce:
- http://d-nb.info/gnd/123003180
2004
-
ISBN:
- Book / Print
-
Title:Secrets and lies : digital security in a networked world ; [with new information about post-9/11 security]
-
Additional title:Secrets & lies
-
Contributors:Schneier, Bruce ( author )
-
Edition:Paperback ed.
-
Publisher:
- New search for: Wiley
-
Place of publication:Indianapolis, Ind.
-
Publication date:2004
-
Size:XXIII, 414 S.
-
Remarks:24 cm
graph. Darst.
Dt. Übersetzung unter der Signatur: S oek 7401/016 -
ISBN:
-
Type of media:Book
-
Type of material:Print
-
Language:English
- New search for: 005.8
- Further information on Dewey Decimal Classification
- New search for: 54.38 / 54.32
- Further information on Basic classification
- New search for: oek 7401
-
Keywords:
-
Classification:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
IntroductionSchneier, Bruce et al. | 2015
- 11
-
The LandscapeSchneier, Bruce et al. | 2015
- 14
-
Digital ThreatsSchneier, Bruce et al. | 2015
- 23
-
AttacksSchneier, Bruce et al. | 2015
- 42
-
AdversariesSchneier, Bruce et al. | 2015
- 59
-
Security NeedsSchneier, Bruce et al. | 2015
- 83
-
TechnologiesSchneier, Bruce et al. | 2015
- 85
-
CryptographySchneier, Bruce et al. | 2015
- 102
-
Cryptography in ContextSchneier, Bruce et al. | 2015
- 120
-
Computer SecuritySchneier, Bruce et al. | 2015
- 135
-
Identification and AuthenticationSchneier, Bruce et al. | 2015
- 151
-
Networked‐Computer SecuritySchneier, Bruce et al. | 2015
- 176
-
Network SecuritySchneier, Bruce et al. | 2015
- 188
-
Network DefensesSchneier, Bruce et al. | 2015
- 202
-
Software ReliabilitySchneier, Bruce et al. | 2015
- 212
-
Secure HardwareSchneier, Bruce et al. | 2015
- 225
-
Certificates and CredentialsSchneier, Bruce et al. | 2015
- 240
-
Security TricksSchneier, Bruce et al. | 2015
- 255
-
The Human FactorSchneier, Bruce et al. | 2015
- 271
-
StrategiesSchneier, Bruce et al. | 2015
- 274
-
Vulnerabilities and the Vulnerability LandscapeSchneier, Bruce et al. | 2015
- 288
-
Threat Modeling and Risk AssessmentSchneier, Bruce et al. | 2015
- 307
-
Security Policies and CountermeasuresSchneier, Bruce et al. | 2015
- 318
-
Attack TreesSchneier, Bruce et al. | 2015
- 334
-
Product Testing and VerificationSchneier, Bruce et al. | 2015
- 353
-
The Future of ProductsSchneier, Bruce et al. | 2015
- 367
-
Security ProcessesSchneier, Bruce et al. | 2015
- 389
-
ConclusionSchneier, Bruce et al. | 2015
- 396
-
AfterwordSchneier, Bruce et al. | 2015
- 399
-
ResourcesSchneier, Bruce et al. | 2015
- 401
-
AcknowledgmentsSchneier, Bruce et al. | 2015
- 403
-
IndexSchneier, Bruce et al. | 2015
- i
-
Front MatterSchneier, Bruce et al. | 2015