Secrets and Lies: Digital Security in a Networked World

Höfundur Bruce Schneier

Útgefandi Wiley Professional Development (P&T)

Snið Page Fidelity

Print ISBN 9780471453802

Útgáfa 1

Útgáfuár 2004

2.190 kr.

Description

Efnisyfirlit

  • Contents
  • Introduction to the Paperback Edition
  • Preface
  • Chapter 1: Introduction
  • SYSTEMS
  • SYSTEMS AND SECURITY
  • Part 1: The Landscape
  • Chapter 2: Digital Threats
  • THE UNCHANGING NATURE OF ATTACKS
  • THE CHANGING NATURE OF ATTACKS
  • PROACTION VS. REACTION
  • Chapter 3: Attacks
  • CRIMINAL ATTACKS
  • PRIVACY VIOLATIONS
  • PUBLICITY ATTACKS
  • LEGAL ATTACKS
  • Chapter 4: Adversaries
  • HACKERS
  • LONE CRIMINALS
  • MALICIOUS INSIDERS
  • INDUSTRIAL ESPIONAGE
  • PRESS
  • ORGANIZED CRIME
  • POLICE
  • TERRORISTS
  • NATIONAL INTELLIGENCE ORGANIZATIONS
  • INFOWARRIORS
  • Chapter 5: Security Needs
  • PRIVACY
  • MULTILEVEL SECURITY
  • ANONYMITY
  • PRIVACY AND THE GOVERNMENT
  • AUTHENTICATION
  • INTEGRITY
  • AUDIT
  • ELECTRONIC CURRENCY
  • PROACTIVE SOLUTIONS
  • Part 2: Technologies
  • Chapter 6: Cryptography
  • SYMMETRIC ENCRYPTION
  • TYPES OF CRYPTOGRAPHIC ATTACKS
  • RECOGNIZING PLAINTEXT
  • MESSAGE AUTHENTICATION CODES
  • ONE-WAY HASH FUNCTIONS
  • PUBLIC-KEY ENCRYPTION
  • DIGITAL SIGNATURE SCHEMES
  • RANDOM NUMBER GENERATORS
  • KEY LENGTH
  • Chapter 7: Cryptography in Context
  • KEY LENGTH AND SECURITY
  • ONE-TIME PADS
  • PROTOCOLS
  • INTERNET CRYPTOGRAPHIC PROTOCOLS
  • TYPES OF PROTOCOL ATTACKS
  • CHOOSING AN ALGORITHM OR PROTOCOL
  • Chapter 8: Computer Security
  • DEFINITIONS
  • ACCESS CONTROL
  • SECURITY MODELS
  • SECURITY KERNELS AND TRUSTED COMPUTING BASES
  • COVERT CHANNELS
  • EVALUATION CRITERIA
  • FUTURE OF SECURE COMPUTERS
  • Chapter 9: Identification and Authentication
  • PASSWORDS
  • BIOMETRICS
  • ACCESS TOKENS
  • AUTHENTICATION PROTOCOLS
  • SINGLE SIGN-ON
  • Chapter 10: Networked-Computer Security
  • MALICIOUS SOFTWARE
  • MODULAR CODE
  • MOBILE CODE
  • WEB SECURITY
  • Chapter 11: Network Security
  • HOW NETWORKS WORK
  • IP SECURITY
  • DNS SECURITY
  • DENIAL-OF-SERVICE ATTACKS
  • DISTRIBUTED DENIAL-OF-SERVICE ATTACKS
  • THE FUTURE OF NETWORK SECURITY
  • Chapter 12: Network Defenses
  • FIREWALLS
  • DEMILITARIZED ZONES
  • VIRTUAL PRIVATE NETWORKS
  • INTRUSION DETECTION SYSTEMS
  • HONEY POTS AND BURGLAR ALARMS
  • VULNERABILITY SCANNERS
  • E-MAIL SECURITY
  • ENCRYPTION AND NETWORK DEFENSES
  • Chapter 13: Software Reliability
  • FAULTY CODE
  • ATTACKS ON FAULTY CODE
  • BUFFER OVERFLOWS
  • THE UBIQUITY OF FAULTY CODE
  • Chapter 14: Secure Hardware
  • TAMPER RESISTANCE
  • SIDE-CHANNEL ATTACKS
  • ATTACKS AGAINST SMART CARDS
  • Chapter 15: Certificates and Credentials
  • TRUSTED THIRD PARTIES
  • CREDENTIALS
  • CERTIFICATES
  • PROBLEMS WITH TRADITIONAL PKIs
  • PKIS ON THE INTERNET
  • Chapter 16: Security Tricks
  • GOVERNMENT ACCESS TO KEYS
  • DATABASE SECURITY
  • STEGANOGRAPHY
  • SUBLIMINAL CHANNELS
  • DIGITAL WATERMARKING
  • COPY PROTECTION
  • ERASING DIGITAL INFORMATION
  • Chapter 17: The Human Factor
  • RISK
  • EXCEPTION HANDLING
  • HUMAN–COMPUTER INTERFACE
  • HUMAN–COMPUTER TRANSFERENCE
  • MALICIOUS INSIDERS
  • SOCIAL ENGINEERING
  • Part 3: Strategies
  • Chapter 18: Vulnerabilities and the Vulnerability Landscape
  • ATTACK METHODOLOGY
  • COUNTERMEASURES
  • THE VULNERABILITY LANDSCAPE
  • RATIONALLY APPLYING COUNTERMEASURES
  • Chapter 19: Threat Modeling and Risk Assessment
  • FAIR ELECTIONS
  • SECURE TELEPHONES
  • SECURE E-MAIL
  • STORED-VALUE SMART CARDS
  • RISK ASSESSMENT
  • THE POINT OF THREAT MODELING
  • GETTING THE THREAT WRONG
  • Chapter 20: Security Policies and Countermeasures
  • SECURITY POLICIES
  • TRUSTED CLIENT SOFTWARE
  • AUTOMATIC TELLER MACHINES
  • COMPUTERIZED LOTTERY TERMINALS
  • SMART CARDS VS. MEMORY CARDS
  • RATIONAL COUNTERMEASURES
  • Chapter 21: Attack Trees
  • BASIC ATTACK TREES
  • PGP ATTACK TREE
  • CREATING AND USING ATTACK TREES
  • Chapter 22: Product Testing and Verification
  • THE FAILURE OF TESTING
  • DISCOVERING SECURITY FLAWS AFTER THE FACT
  • OPEN STANDARDS AND OPEN SOURCE SOLUTIONS
  • REVERSE ENGINEERING AND THE LAW
  • CRACKING AND HACKING CONTESTS
  • EVALUATING AND CHOOSING SECURITY PRODUCTS
  • Chapter 23: The Future of Products
  • SOFTWARE COMPLEXITY AND SECURITY
  • TECHNOLOGIES TO WATCH
  • WILL WE EVER LEARN?
  • Chapter 24: Security Processes
  • PRINCIPLES
  • DETECTION AND RESPONSE
  • COUNTERATTACK
  • MANAGE RISK
  • OUTSOURCING SECURITY PROCESSES
  • Chapter 25: Conclusion
  • Afterword
  • Resources
  • Acknowledgments
  • Index
Show More

Additional information

Veldu vöru

Rafbók til eignar

Reviews

There are no reviews yet.

Be the first to review “Secrets and Lies: Digital Security in a Networked World”

Netfang þitt verður ekki birt. Nauðsynlegir reitir eru merktir *

Aðrar vörur

0
    0
    Karfan þín
    Karfan þín er tómAftur í búð