Prix bas
CHF33.60
Habituellement expédié sous 3 semaines.
"I love you" war nicht der erste und keinesfalls der letzte weltweit verbreitete Computervirus, der das Thema Sicherheit im Netz in die Schlagzeilen der Medien brachte. Zunehmend aggressive Angriffe von Hackern auf E-Commerce-Sites zeigen, wie wichtig die Beherrschung der Technologien zum Aufbau sicherer Netzwerke derzeit ist. Informationen, Hinweise und Strategien aus erster Hand entnehmen Sie diesem äußerst praxisnah konzipierten Band: Schneier, ein führender Experte auf diesem Gebiet, schöpft hier aus seinem langjährigen Erfahrungsschatz!
This work offers practical advice on achieving security throughout computer networks and explains why protecting information is harder in the digital world.
Auteur
Bruce Schneier is the founder and CTO of Counterpane Internet Security, Inc., the recognized leader in network security services. The bestselling author of Beyond Fear: Thinking Sensibly About Security in an Uncertain World and Applied Cryptography, he is an internationally respected security expert.
Texte du rabat
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more. Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs Explains what cryptography can and can't do in achieving digital security
Contenu
Preface xi
Part 1: The Landscape 11
Digital Threats 14
Attacks 23
Adversaries 42
Security Needs 59
Part 2: Technologies 83
Cryptography 85
Cryptography in Context 102
Computer Security 120
Identification and Authentication 135
Networked-computer Security 151
Network Security 176
Network Defenses 188
Software Reliability 202
Secure Hardware 212
Certificates and Credentials 225
Security Tricks 240
The Human Factor 255
Part 3: Strategies 271
Vulnerabilities and the Vulnerability Landscape 274
Threat Modeling and Risk Assessment 288
Security Policies and Countermeasures 307
Attack Trees 318
Product Testing and Verification 334
The Future of Products 353
Security Processes 367
Conclusion 389
Afterword 396
Resources 399
Acknowledgments 401
Index 403