Cover image for Secrets and lies : digital security in a networked world
Secrets and lies : digital security in a networked world
Schneier, Bruce, 1963-
Personal Author:
Publication Information:
New York : John Wiley, 2000.
Physical Description:
xv, 412 pages ; 24 cm
General Note:
"Wiley Computer Publishing."
Format :


Call Number
Material Type
Home Location
Item Holds
QA76.9.A25 S352 2000 Adult Non-Fiction Central Closed Stacks

On Order



Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more.
* Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs
* Explains what cryptography can and can't do in achieving digital security

Author Notes

Bruce Schneier is a Fellow at the Berkman Center for Internet and Society at Harvard Law School and the CTO of Resilient Systems, Inc. He is a security expert and author of numerous books including Beyond Fear: Thinking Sensibly About Security in an Uncertain World, Carry On: Sound Advice from Schneier on Security, and Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World.

(Bowker Author Biography)

Reviews 1

Choice Review

Readers need only to pick up this book and read the introduction and they will be hooked. Secrets and Lies is a careful assessment of the state of digital security, which, simply stated, is not very promising. The book presents security consultant and engineer Schneier's perspective as a respected scientist and mathematician who knows the theoretical state of the art. His book is composed of 25 chapters, organized into three parts: "Landscape," "Technologies," and "Strategies." "Landscape," the first part, describes the attackers, what they want, and what we need to do to deal with them. "Technologies" (part 2) describes the various security technologies and the limitations of each. The final part, "Strategies," takes the requirements from part 1, the abilities and the limitations of the technology from part 2, and describes methods for developing strategies for warding off attacks to digital software of all types. The resources section at the end is invaluable. General readers; upper-division undergraduates through professionals. J. Beidler; University of Scranton

Table of Contents

Prefacep. xi
Acknowledgmentsp. xv
1. Introductionp. 1
Part 1 The Landscapep. 11
2. Digital Threatsp. 14
3. Attacksp. 23
4. Adversariesp. 42
5. Security Needsp. 59
Part 2 Technologiesp. 83
6. Cryptographyp. 85
7. Cryptography in Contextp. 102
8. Computer Securityp. 120
9. Identification and Authenticationp. 135
10. Networked-Computer Securityp. 151
11. Network Securityp. 176
12. Network Defensesp. 188
13. Software Reliabilityp. 202
14. Secure Hardwarep. 212
15. Certificates and Credentialsp. 225
16. Security Tricksp. 240
17. The Human Factorp. 255
Part 3 Strategiesp. 271
18. Vulnerabilities and the Vulnerability Landscapep. 274
19. Threat Modeling and Risk Assessmentp. 288
20. Security Policies and Countermeasuresp. 307
21. Attack Treesp. 318
22. Product Testing and Verificationp. 334
23. The Future of Productsp. 353
24. Security Processesp. 367
25. Conclusionp. 389
Afterwordp. 396
Resourcesp. 399
Indexp. 401