
Lýsing:
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems.
This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more. * Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs * Explains what cryptography can and can't do in achieving digital security.
Annað
- Höfundur: Bruce Schneier
- Útgáfa:1
- Útgáfudagur: 2013-03-12
- Blaðsíður: 448
- Hægt að prenta út 2 bls.
- Hægt að afrita 10 bls.
- Format:Page Fidelity
- ISBN 13: 9781118075074
- Print ISBN: 9780471453802
- ISBN 10: 1118075072
Efnisyfirlit
- Contents
- Introduction to the Paperback Edition
- Preface
- Chapter 1: Introduction
- SYSTEMS
- SYSTEMS AND SECURITY
- Part 1: The Landscape
- Chapter 2: Digital Threats
- THE UNCHANGING NATURE OF ATTACKS
- THE CHANGING NATURE OF ATTACKS
- PROACTION VS. REACTION
- Chapter 3: Attacks
- CRIMINAL ATTACKS
- PRIVACY VIOLATIONS
- PUBLICITY ATTACKS
- LEGAL ATTACKS
- Chapter 4: Adversaries
- HACKERS
- LONE CRIMINALS
- MALICIOUS INSIDERS
- INDUSTRIAL ESPIONAGE
- PRESS
- ORGANIZED CRIME
- POLICE
- TERRORISTS
- NATIONAL INTELLIGENCE ORGANIZATIONS
- INFOWARRIORS
- Chapter 5: Security Needs
- PRIVACY
- MULTILEVEL SECURITY
- ANONYMITY
- PRIVACY AND THE GOVERNMENT
- AUTHENTICATION
- INTEGRITY
- AUDIT
- ELECTRONIC CURRENCY
- PROACTIVE SOLUTIONS
- Chapter 2: Digital Threats
- Chapter 6: Cryptography
- SYMMETRIC ENCRYPTION
- TYPES OF CRYPTOGRAPHIC ATTACKS
- RECOGNIZING PLAINTEXT
- MESSAGE AUTHENTICATION CODES
- ONE-WAY HASH FUNCTIONS
- PUBLIC-KEY ENCRYPTION
- DIGITAL SIGNATURE SCHEMES
- RANDOM NUMBER GENERATORS
- KEY LENGTH
- Chapter 7: Cryptography in Context
- KEY LENGTH AND SECURITY
- ONE-TIME PADS
- PROTOCOLS
- INTERNET CRYPTOGRAPHIC PROTOCOLS
- TYPES OF PROTOCOL ATTACKS
- CHOOSING AN ALGORITHM OR PROTOCOL
- Chapter 8: Computer Security
- DEFINITIONS
- ACCESS CONTROL
- SECURITY MODELS
- SECURITY KERNELS AND TRUSTED COMPUTING BASES
- COVERT CHANNELS
- EVALUATION CRITERIA
- FUTURE OF SECURE COMPUTERS
- Chapter 9: Identification and Authentication
- PASSWORDS
- BIOMETRICS
- ACCESS TOKENS
- AUTHENTICATION PROTOCOLS
- SINGLE SIGN-ON
- Chapter 10: Networked-Computer Security
- MALICIOUS SOFTWARE
- MODULAR CODE
- MOBILE CODE
- WEB SECURITY
- Chapter 11: Network Security
- HOW NETWORKS WORK
- IP SECURITY
- DNS SECURITY
- DENIAL-OF-SERVICE ATTACKS
- DISTRIBUTED DENIAL-OF-SERVICE ATTACKS
- THE FUTURE OF NETWORK SECURITY
- Chapter 12: Network Defenses
- FIREWALLS
- DEMILITARIZED ZONES
- VIRTUAL PRIVATE NETWORKS
- INTRUSION DETECTION SYSTEMS
- HONEY POTS AND BURGLAR ALARMS
- VULNERABILITY SCANNERS
- E-MAIL SECURITY
- ENCRYPTION AND NETWORK DEFENSES
- Chapter 13: Software Reliability
- FAULTY CODE
- ATTACKS ON FAULTY CODE
- BUFFER OVERFLOWS
- THE UBIQUITY OF FAULTY CODE
- Chapter 14: Secure Hardware
- TAMPER RESISTANCE
- SIDE-CHANNEL ATTACKS
- ATTACKS AGAINST SMART CARDS
- Chapter 15: Certificates and Credentials
- TRUSTED THIRD PARTIES
- CREDENTIALS
- CERTIFICATES
- PROBLEMS WITH TRADITIONAL PKIs
- PKIS ON THE INTERNET
- Chapter 16: Security Tricks
- GOVERNMENT ACCESS TO KEYS
- DATABASE SECURITY
- STEGANOGRAPHY
- SUBLIMINAL CHANNELS
- DIGITAL WATERMARKING
- COPY PROTECTION
- ERASING DIGITAL INFORMATION
- Chapter 17: The Human Factor
- RISK
- EXCEPTION HANDLING
- HUMAN–COMPUTER INTERFACE
- HUMAN–COMPUTER TRANSFERENCE
- MALICIOUS INSIDERS
- SOCIAL ENGINEERING
- Chapter 18: Vulnerabilities and the Vulnerability Landscape
- ATTACK METHODOLOGY
- COUNTERMEASURES
- THE VULNERABILITY LANDSCAPE
- RATIONALLY APPLYING COUNTERMEASURES
- Chapter 19: Threat Modeling and Risk Assessment
- FAIR ELECTIONS
- SECURE TELEPHONES
- SECURE E-MAIL
- STORED-VALUE SMART CARDS
- RISK ASSESSMENT
- THE POINT OF THREAT MODELING
- GETTING THE THREAT WRONG
- Chapter 20: Security Policies and Countermeasures
- SECURITY POLICIES
- TRUSTED CLIENT SOFTWARE
- AUTOMATIC TELLER MACHINES
- COMPUTERIZED LOTTERY TERMINALS
- SMART CARDS VS. MEMORY CARDS
- RATIONAL COUNTERMEASURES
- Chapter 21: Attack Trees
- BASIC ATTACK TREES
- PGP ATTACK TREE
- CREATING AND USING ATTACK TREES
- Chapter 22: Product Testing and Verification
- THE FAILURE OF TESTING
- DISCOVERING SECURITY FLAWS AFTER THE FACT
- OPEN STANDARDS AND OPEN SOURCE SOLUTIONS
- REVERSE ENGINEERING AND THE LAW
- CRACKING AND HACKING CONTESTS
- EVALUATING AND CHOOSING SECURITY PRODUCTS
- Chapter 23: The Future of Products
- SOFTWARE COMPLEXITY AND SECURITY
- TECHNOLOGIES TO WATCH
- WILL WE EVER LEARN?
- Chapter 24: Security Processes
- PRINCIPLES
- DETECTION AND RESPONSE
- COUNTERATTACK
- MANAGE RISK
- OUTSOURCING SECURITY PROCESSES
- Chapter 25: Conclusion
UM RAFBÆKUR Á HEIMKAUP.IS
Bókahillan þín er þitt svæði og þar eru bækurnar þínar geymdar. Þú kemst í bókahilluna þína hvar og hvenær sem er í tölvu eða snjalltæki. Einfalt og þægilegt!Rafbók til eignar
Rafbók til eignar þarf að hlaða niður á þau tæki sem þú vilt nota innan eins árs frá því bókin er keypt.
Þú kemst í bækurnar hvar sem er
Þú getur nálgast allar raf(skóla)bækurnar þínar á einu augabragði, hvar og hvenær sem er í bókahillunni þinni. Engin taska, enginn kyndill og ekkert vesen (hvað þá yfirvigt).
Auðvelt að fletta og leita
Þú getur flakkað milli síðna og kafla eins og þér hentar best og farið beint í ákveðna kafla úr efnisyfirlitinu. Í leitinni finnur þú orð, kafla eða síður í einum smelli.
Glósur og yfirstrikanir
Þú getur auðkennt textabrot með mismunandi litum og skrifað glósur að vild í rafbókina. Þú getur jafnvel séð glósur og yfirstrikanir hjá bekkjarsystkinum og kennara ef þeir leyfa það. Allt á einum stað.
Hvað viltu sjá? / Þú ræður hvernig síðan lítur út
Þú lagar síðuna að þínum þörfum. Stækkaðu eða minnkaðu myndir og texta með multi-level zoom til að sjá síðuna eins og þér hentar best í þínu námi.
Fleiri góðir kostir
- Þú getur prentað síður úr bókinni (innan þeirra marka sem útgefandinn setur)
- Möguleiki á tengingu við annað stafrænt og gagnvirkt efni, svo sem myndbönd eða spurningar úr efninu
- Auðvelt að afrita og líma efni/texta fyrir t.d. heimaverkefni eða ritgerðir
- Styður tækni sem hjálpar nemendum með sjón- eða heyrnarskerðingu
- Gerð : 208
- Höfundur : 11939
- Útgáfuár : 2013
- Leyfi : 379