Secrets and Lies: Digital Security in a Networked WorldJohn Wiley & Sons, 25. mar. 2011 - 432 síður Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more. * Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs * Explains what cryptography can and can't do in achieving digital security |
Efni
22 hluta | |
23 hluta | |
24 hluta | |
25 hluta | |
26 hluta | |
27 hluta | |
28 hluta | |
29 hluta | |
9 hluta | |
10 hluta | |
11 hluta | |
12 hluta | |
13 hluta | |
14 hluta | |
15 hluta | |
16 hluta | |
17 hluta | |
18 hluta | |
19 hluta | |
20 hluta | |
21 hluta | |
30 hluta | |
31 hluta | |
32 hluta | |
33 hluta | |
34 hluta | |
35 hluta | |
36 hluta | |
37 hluta | |
38 hluta | |
39 hluta | |
40 hluta | |
41 hluta | |
Aðrar útgáfur - View all
Common terms and phrases
access control alarm Alice and Bob Alice's attack tree audit authentication bank biometric break browser buffer overflows bugs called certificate companies complex computer security cookie copy countermeasures credit card numbers criminals cryptography cyberspace database decryption denialofservice attacks detection dictionary attacks digital signature eavesdropping electronic email encryption encryption algorithm engineering example exploit firewall fraud going hacker hacking hash implement insecure inside Internet lock look machine magnetic stripe card malicious malware merchant Microsoft operating system packets passphrase password person plaintext possible private key protect protocol public key random number risk secret security flaws security problems security products security system server smart card someone steal steganography talk tamper resistance target telephone there's things Trojan horse trusted third party vendor virus viruses vulnerability Windows