The world is a dangerous place.
Check nearby libraries
Buy this book
"A primer in practical computer security aimed at those shopping, communication, or doing business online -- almost everyone, in other words."--Dust jacket.
Check nearby libraries
Buy this book
Previews available in: English
Showing 9 featured editions. View all 9 editions?
Edition | Availability |
---|---|
1
Secrets & Lies: Digital Security in a Networked World
2015, John Wiley & Sons, John Wiley & Sons, Inc.
in English
- 15th Anniversary Edition
1119092434 9781119092438
|
aaaa
Libraries near you:
WorldCat
|
2
Secrets and Lies: Digital Security in a Networked World
2013, Wiley & Sons, Incorporated, John
in English
1118075072 9781118075074
|
zzzz
Libraries near you:
WorldCat
|
3
Secrets and Lies: Digital Security in a Networked World
2011, Wiley & Sons, Incorporated, John
in English
1118082273 9781118082270
|
zzzz
Libraries near you:
WorldCat
|
4
Secrets and Lies: Digital Security in a Networked World
2011, Wiley & Sons, Incorporated, John
in English
1118082540 9781118082546
|
zzzz
Libraries near you:
WorldCat
|
5 |
zzzz
Libraries near you:
WorldCat
|
6 |
zzzz
Libraries near you:
WorldCat
|
7
Secrets and Lies: Digital Security in a Networked World
January 30, 2004, Wiley
in English
0471453803 9780471453802
|
zzzz
Libraries near you:
WorldCat
|
8 |
zzzz
Libraries near you:
WorldCat
|
9
Secrets and Lies: Digital Security in a Networked World
August 14, 2000, John Wiley & Sons
in English
0471253111 9780471253112
|
eeee
Libraries near you:
WorldCat
|
Book Details
First Sentence
"Rereading a book that I finished fifteen years ago —in 2000— perhaps the most surprising thing is how little things have changed."
Table of Contents
Introduction
Digital threats
Attacks
Adversaries
Security needs
Cryptography
Cryptography in context
Computer security
Identification and authentication
Networked-computer security
Network security
Network defenses
Software reliability
Secure hardware
Certificates and credentials
Security tricks
The human factor
Vulnerabilities and the vulnerability landscape
Threat modeling and risk assessment
Security policies and countermeasures
Attack trees
Product testing and verification
The future of products
Security processes
Conclusion.
Edition Notes
Originally published: 2000.
With a new introduction by the author.
Includes bibliographical references and index.
Classifications
The Physical Object
ID Numbers
Source records
marc_openlibraries_sanfranciscopubliclibrary MARC recordBetter World Books record
Internet Archive item record
Promise Item
marc_nuls MARC record
Excerpts
added anonymously.
Community Reviews (0)
Feedback?October 17, 2022 | Edited by ImportBot | import existing book |
October 13, 2022 | Edited by AgentSapphire | merge authors |
September 17, 2021 | Edited by ImportBot | import existing book |
March 2, 2021 | Edited by AgentSapphire | Merge works |
December 10, 2009 | Created by WorkBot | add works page |