The Resource Secrets and lies : digital security in a networked world, Bruce Schneier
Secrets and lies : digital security in a networked world, Bruce Schneier
Resource Information
The item Secrets and lies : digital security in a networked world, Bruce Schneier represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Internet Archive - Open Library.This item is available to borrow from all library branches.
Resource Information
The item Secrets and lies : digital security in a networked world, Bruce Schneier represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Internet Archive - Open Library.
This item is available to borrow from all library branches.
- Language
- eng
- Extent
- 1 online resource (xv, 412 pages)
- Note
- "Wiley Computer Publishing."
- Contents
-
- 4.
- Adversaries
- 5.
- Security needs
- pt. 2.
- Technologies
- 6.
- Cryptography
- 7.
- Cryptography in context
- 1.
- 8.
- Computer security
- 9.
- Identification and authentication
- 10.
- Networked-computer security
- 11.
- Network security
- 12.
- Network defenses
- Introduction
- 13.
- Software reliability
- 14.
- Secure hardware
- 15.
- Certificates and credentials
- 16.
- Security tricks
- 17.
- The human factor
- pt. 1.
- pt. 3.
- Strategies
- 18.
- Vulnerabilities and the vulnerability landscape
- 19.
- T
- The landscape
- 2.
- Digital threats
- 3.
- Attacks
- Label
- Secrets and lies : digital security in a networked world
- Title
- Secrets and lies
- Title remainder
- digital security in a networked world
- Statement of responsibility
- Bruce Schneier
- Subject
-
- Datensicherung
- fiabilité logiciel
- Réseaux d'ordinateurs -- Mesures de sûreté
- Sécurité informatique
- cryptographie
- Databescherming
- Entreprises -- Réseaux d'ordinateurs | Mesures de sûreté
- identification
- Rechnernetz
- Internet
- authentification
- Computer security
- Computernetwerken
- Réseaux d'ordinateurs -- Sécurité | Mesures
- Computer networks -- Security measures
- sécurité information
- sécurité réseau
- sécurité ordinateur
- Language
- eng
- Cataloging source
- DLC
- http://library.link/vocab/creatorDate
- 1963-
- http://library.link/vocab/creatorName
- Schneier, Bruce
- Dewey number
- 005.8
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- S352 2000
- Literary form
- non fiction
- Nature of contents
- dictionaries
- http://library.link/vocab/subjectName
-
- Computer security
- Computer networks
- Sécurité informatique
- Réseaux d'ordinateurs
- Computernetwerken
- Databescherming
- Réseaux d'ordinateurs
- Entreprises
- sécurité information
- fiabilité logiciel
- authentification
- identification
- cryptographie
- sécurité ordinateur
- sécurité réseau
- Rechnernetz
- Datensicherung
- Internet
- Label
- Secrets and lies : digital security in a networked world, Bruce Schneier
- Link
- Note
- "Wiley Computer Publishing."
- Bibliography note
- Includes bibliographical references (p. 399-400) and index
- Contents
-
- 4.
- Adversaries
- 5.
- Security needs
- pt. 2.
- Technologies
- 6.
- Cryptography
- 7.
- Cryptography in context
- 1.
- 8.
- Computer security
- 9.
- Identification and authentication
- 10.
- Networked-computer security
- 11.
- Network security
- 12.
- Network defenses
- Introduction
- 13.
- Software reliability
- 14.
- Secure hardware
- 15.
- Certificates and credentials
- 16.
- Security tricks
- 17.
- The human factor
- pt. 1.
- pt. 3.
- Strategies
- 18.
- Vulnerabilities and the vulnerability landscape
- 19.
- T
- The landscape
- 2.
- Digital threats
- 3.
- Attacks
- Extent
- 1 online resource (xv, 412 pages)
- Form of item
- online
- Specific material designation
- remote
- System control number
- (OCoLC)1036940419
- Label
- Secrets and lies : digital security in a networked world, Bruce Schneier
- Link
- Note
- "Wiley Computer Publishing."
- Bibliography note
- Includes bibliographical references (p. 399-400) and index
- Contents
-
- 4.
- Adversaries
- 5.
- Security needs
- pt. 2.
- Technologies
- 6.
- Cryptography
- 7.
- Cryptography in context
- 1.
- 8.
- Computer security
- 9.
- Identification and authentication
- 10.
- Networked-computer security
- 11.
- Network security
- 12.
- Network defenses
- Introduction
- 13.
- Software reliability
- 14.
- Secure hardware
- 15.
- Certificates and credentials
- 16.
- Security tricks
- 17.
- The human factor
- pt. 1.
- pt. 3.
- Strategies
- 18.
- Vulnerabilities and the vulnerability landscape
- 19.
- T
- The landscape
- 2.
- Digital threats
- 3.
- Attacks
- Extent
- 1 online resource (xv, 412 pages)
- Form of item
- online
- Specific material designation
- remote
- System control number
- (OCoLC)1036940419
Subject
- Computer networks -- Security measures
- Computer security
- Computernetwerken
- Databescherming
- Datensicherung
- Entreprises -- Réseaux d'ordinateurs | Mesures de sûreté
- Internet
- Rechnernetz
- Réseaux d'ordinateurs -- Mesures de sûreté
- Réseaux d'ordinateurs -- Sécurité | Mesures
- Sécurité informatique
- authentification
- cryptographie
- fiabilité logiciel
- identification
- sécurité information
- sécurité ordinateur
- sécurité réseau
Library Links
Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.archive.org/portal/Secrets-and-lies--digital-security-in-a/5wTX0uQjs4k/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.archive.org/portal/Secrets-and-lies--digital-security-in-a/5wTX0uQjs4k/">Secrets and lies : digital security in a networked world, Bruce Schneier</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.archive.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.archive.org/">Internet Archive - Open Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Secrets and lies : digital security in a networked world, Bruce Schneier
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.archive.org/portal/Secrets-and-lies--digital-security-in-a/5wTX0uQjs4k/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.archive.org/portal/Secrets-and-lies--digital-security-in-a/5wTX0uQjs4k/">Secrets and lies : digital security in a networked world, Bruce Schneier</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.archive.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.archive.org/">Internet Archive - Open Library</a></span></span></span></span></div>